AssignmentAce
Home
Master Computers and Technology with Fun Quizzes & Brain Teasers!
Computers And Technology
High School
if rafael is creating a webpage in , what kind of object will he use to display the picture of the vacationers
Computers And Technology
High School
what function can automatically return the value in excel indeed
Computers And Technology
High School
a) a memory system has 16mb. the memory is organized into blocks of 16b each, and the cache has total 512kb, organized into cache block frames of 16b each. i) how many bits are needed to address all bytes in the memory system? ii) how many memory blocks we have in the memory system? how many bits are needed to address all memory blocks? iii) how many block frames are there in the cache? how many bits are needed to address all block frames? iv) for direct cache mapping, what would be the block address (concatenate tag with block frame index), tag, bf index and byte in hex form for the following byte addresses? address block addr tag block frame index byte a1
Computers And Technology
High School
determine the number of memory chips required to build a 2-byte-wide by 3g word memory using 1g 8 memory chips.
Computers And Technology
High School
what type of data file cannot be opened and viewed in an editor such as notepad?
Computers And Technology
High School
wls is preferred to ols when an important variable has been omitted from the model. true or false
Computers And Technology
High School
Consider a computer with the following cache and main memory The block size B = 8 bytes. The cache has a total of C = 64 bytes. The main memory has a total of M = 4096 bytes, and uses byte addressing.The number of cache blocks is =The number of main memory blocks is =The number of bits of a main memory address =
Computers And Technology
High School
Modern file systems are implemented using the following data structures.O Threads, Processes and SignalsO Linker, Table, and IndexO Trees, Graphs, and StacksO Stacks, Queues, and Maps
Computers And Technology
High School
Which of these is NOT a part of the organizational change model used to support change management for Information security requirements. a. freezing b. unfreezing c. moving d. security training
Computers And Technology
High School
the rule followed in soliciting members of a database is on the basis of
Computers And Technology
High School
when running on its 11.4 vv battery, a laptop computer uses 8.3 ww. the computer can run on battery power for 8.0 hh before the battery is depleted. True or false ?
Computers And Technology
High School
what is displayed when the following code is executed? empty_string = '' print(len(empty_string))
Computers And Technology
High School
what messages are passed, and in what direction, when a client successfully leases an ip address from a dhcp server? explain your answer briefly.
Computers And Technology
High School
what is the more modern way to handle memory management
Computers And Technology
High School
Assume you have a page reference string for a process with E frames (initially all empty). The page reference string has length L with D distinct page numbers occurring in it. For any page-replacement algorithm, assuming pure demand paging, what would be the minimum number of page faults that could occur. a L/F b D c None of the others d L/D
Computers And Technology
High School
Determine whether each description is True or falseWhen we create a table in MS Access, we can modify datatype in the Design View and data in the Datasheet View
Computers And Technology
High School
public static int foo(int x, int y) {if (y == 0) {return x;} else if (x
Computers And Technology
High School
If P NP then all problems in NP require exponential time.TrueFalse
Computers And Technology
High School
Consider the following mutual authentication and key establishment protocol, where the session key is given by K = gab mod p.Suppose that Alice attempts to initiate a connection with Bob using this protocol.a. Show that Trudy can attack the protocol so that both of the following will occur.i. Alice and Bob authenticate each other.ii. Trudy knows Alice's session key.Hint: Consider a man-in-the-middle attack.b. Is this attack of any use to Trudy?
Computers And Technology
High School
True/FalseDisruptive technologies : they come to market with a set of performance attributes that existing customers dont value.
Computers And Technology
High School
true or false: the ride-sharing company uber is an example of technological convergence.
Computers And Technology
High School
tcp/ip first gain traction in a __________ case that was the basis for e-mail among the researchers on arpanet
Computers And Technology
High School
Which of the following can help to avoid problems with reused encryption keys? Select all that apply.Group of answer choicesd) Combine the key with a noncec) Change the internal keyb) Clear your computer's RAMa) Use the same passphrase
Computers And Technology
High School
explain the major challenges you may encounter when you implement an eer with a superclass/subclass relationship
« Previous
Page 55
Next »