Recent questions in Computer Fundamentals

No documents found, press Enter to search

Principle Computer Architecture

A computer system needs 256 bytes of RAM, 1024 x 16 of ROM and two I/O interface modules with 256 registers each with each register size is 8-bits. Build the memory system of the new computer using a 128 x 8 RAM and 512 x 8 ROM. 1. Compute the total number of bits required to address the memory system. 2. Design the memory-address map for the above system.
0

How can i get good result in RedHat EX300 certification?

Anyone suggest me the best study material for RedHat EX300 certification..
0

computing devices is an area that deals with the History of computer system from old MEchanical to the present Digital

1.List three computing devices that belongs to each of: (a) 19th century and (b) 20th century periods ​ ​ ​ ​ ​ ​ ​
0

Any one here who can provide the definition of a programming pblock.

I have a major quiz tomorrow. Following topic is included.
0

Principle Computer Architecture

A computer system needs 256 bytes of RAM, 1024 x 16 of ROM and two I/O interface modules with 256 registers each with each register size is 8-bits. Build the memory system of the new computer using a 128 x 8 RAM and 512 x 8 ROM. 1. Compute the total number of bits required to address the memory system. 2. Design the memory-address map for the above system.
0

How can i get good result in RedHat EX300 certification?

Anyone suggest me the best study material for RedHat EX300 certification..
0

computing devices is an area that deals with the History of computer system from old MEchanical to the present Digital

1.List three computing devices that belongs to each of: (a) 19th century and (b) 20th century periods ​ ​ ​ ​ ​ ​ ​
0

How many passwords are possible in this system

At a large US university, student account passwords must be between 6 and 8 characters in length. They can contain upper case letters, lower case letters, numbers, and certain valid special characters like punctuation marks. If there are 15 valid special characters, and each password must contain at least one number, how many passwords are possible in this system?
2
1-6 of 377

Is there a method using which any function can use other functions variables.

Can some one out in the Docsity world provide the details.
6
tiuw-avatar
over 12 years ago

Kindly provide the data representation method of EBCDIC.

Hey guys! One more question stuck, anyone?
1

Is it possible to share variables between functions?

Is there any one who can kindly provide the solution. Thanks in Advance.
6
tiuw-avatar
over 12 years ago

Some one elaborate ASCII as a Data Representation method.

Can some one out in the Docsity world provide the details.
6

Explain the concept of local variables.

i want to understand the basic ideology behind local variables in functions.
6
tiuw-avatar
over 12 years ago

Please provide some information on Data Representation method of Unicode text-code set.

What is the meaning of Data Representation Method of a Unicode Text Set and what are the major concepts associated with it?
6
1-6 of 377
Computer Fundamentals