Preview

BCA 1040: Unit 1 Logic Design

Satisfactory Essays
Open Document
Open Document
4533 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
BCA 1040: Unit 1 Logic Design
BCA SEM I / BCA 1040 / Unit 1 Logic Design

Self Assessment Questions 1.2
1. Decimal means base __________.
2. The decimal value of the bit pattern 11111111 is _________.
3. The range of values represented by an 8-bit binary number is _____.
4. The binary equivalent of 228 is _________.
5. The result of 7 – 2 using 1’s complement notation is
6. The bit pattern 1011 in 1’s complement notation is
7. The result of 7 – 2 using 2’s complement notation is
8. The bit pattern 1110 in 2’s complement notation is
9. The range of numbers that can be represented using the Excess-2N-1 notation is _________.
10. The significant digits of 0012340 are _______.
11. The bit pattern 1101 Excess Number converted value is ________. Answers to Self
…show more content…
Primary computer memory is made up of __________.
5. The unique number that names a memory cell is called ________.

Self Assessment Questions
6. Computers use a memory cell whose contents are limited to a number between _________ & __________.
7. For example, the nine digit number 123456789 is stored as the number
_________ and ________ in the next cell.

Self Assessment Questions
8. ____________ is the main memory of a computer system used for storing programs and data.
9. Volatile random access memory devices may be further divided into
_______________.
10. _________ is a memory device for reading and writing information wherein multi-layer ferromagnetic thin films.

Self Assessment Questions
11. EEPROM stands for ___________.
12. ___________ Memory is a type of EEPROM device that can be erased and reprogrammed in blocks instead of one byte at a time.

Self Assessment Questions
13. External memory is for the long term storage of information.
(True/False)
14. External memory which is sometimes called backing store or secondary memory. (True/False)

Self Assessment Questions
15. The first floppy drives used an 8-inch disk which later got smaller
…show more content…
Real-time (RT) operating systems were developed to meet the response requirements of such applications. (True/False)

Self Assessment Questions
5. ______ is a collection of related information defined by its creator.
6. ________ System is a collection of processors that do not share memory, peripheral devices, or a clock.
7. The main function of a command interpreter is to get and execute the next user specified command. (True/False)

Self Assessment Questions
8. An error in one part of the system may cause malfunctioning of the complete system. (True/False)
9. ________involves the allocating and de-allocating memory, CPU scheduling in case of multi-process.

Self Assessment Questions
10. __________ are computers or groups of computers that provides services to other computers, connected via network.
11__________are more powerful versions of personal computers.

6.10 Answers
Self Assessment Questions
1. Abstraction
2. operating system
3. True
4. True
5. File
6. Distributed
7. True
8. True
9. Running a program
10. Servers
11. Workstations
12. Embedded

BCA SEM I / BCA 1010 /Unit7 / Communication System Concepts
Self Assessment Questions
1. _____________ is used to convert the information into another

You May Also Find These Documents Helpful

  • Better Essays

    Fire can be very unpredictable and is very dangerous. It can quickly multiply its size if not acted quickly. If a fire occurs, the main is to let everyone know. This can be done by pressing the fire alarm for everyone to know and another person to ring the emergency services. As being a service provider you must not leave the building unless all the service users are evacuated and safe. Your main priority will be to help the vulnerable people such as children, people with disability or visual/hearing impairment. One of your priorities during this incident would be to think about what kind of environment everyone is in. For example- if it’s in a hospital, there will be hospital…

    • 1730 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    CW3 Smith (DODDAC Alignment) - BC is requesting a complete roll-up for all units w/in ASG awaiting re-alignment. CW3 Smith per our conversation on 19Mar, the following information noted:…

    • 81 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Which of the following answers are true about random-access memory (RAM) as it is normally used inside a personal computer? ( choose two answers)…

    • 957 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Referential Integrity empowers you to support a predictable and accepted database. For instance, in a patient database you may need to guarantee that no patients might be entered into the framework without an extraordinary patient ID. Else, you could wind up with a failure to rapidly record, sort and discover patients who have relating scenes of forethought, arrangements, authentic cases, and so forth.…

    • 1097 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Using the table given the encryption strategy for Richmond investments would go as follows. I will be using the privacy or confidentiality objective. The basic description for the privacy or confidentiality objective is to keep information secret from all person or persons, except those who are authorized to see it have access. In other words, no one without authorization will be able to gain access to sensitive company information or client information, such as addresses, names, billing information, credit card information, and other personal information. The security option needs to be implemented on all networks in the company’s domain. The public key infrastructure is a set of hardware, software people policies and procedures needed to create, manage, distribute use store and revoke digital certificates. In this case will be using PKI cards, which will allow entrance into the facility, it will also allow entrance into specific areas of the building, allow employees to clock in and out and will allow for signing off and on of company computers. All employees will be issued a card with their name employee ID and photo on the face the card on the backside of the card will be company contact information such as departmental phone numbers, etc. the implementation of a company encryption strategy is extremely important to protect the company. The company’s clients and the overall day-to-day activities, the employees involved themselves in to keep the company running.…

    • 250 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Notes for Module 7 DBA

    • 1950 Words
    • 7 Pages

    Neurons: A nerve cell, the fundamental unit of the nervous system that conducts electrical signals through the body.…

    • 1950 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Unit 1 Dbq Essay

    • 761 Words
    • 4 Pages

    They sailed over from England, all seeking glorified opportunities. These English colonists sought out an opportunity when boarding ships and leaving the Old World to travel to the exciting unknown; but each person had their own unique desire. These unique desires led to the many diverse societies that spread all throughout the eastern sea board of the New World by the 1700’s. Religious tolerance, organization in government, and economic stability were all contributing factors to the differences New England and Chesapeake Bay regions had.…

    • 761 Words
    • 4 Pages
    Good Essays
  • Better Essays

    A benefit of a relational database would be that the data is only stored once. This means you don’t have to change multiple records and it doesn’t take up much storage space. For the veterinary practise this is ideal for them, as this is the main reason to why they’re changing from paper to Microsoft Access. Having everything on Access and not on paper means they can search for information quicker through the search bar and also it can all be stored on a hard drive. This will save money on buying filing cabinets, on storage space, time spent looking for information and on buying materials such as paper and ink.…

    • 3057 Words
    • 9 Pages
    Better Essays
  • Satisfactory Essays

    Processor Transistor count Date of introduction Manufacturer Process Area Intel 4004 2,300 1971 Intel 10 µm 12 mm² Intel 8008 3,500 1972 Intel 10 µm 14 mm² MOS Technology 6502 3,510[1] 1975 MOS Technology 8 μm 21 mm² Motorola 6800 4,100 1974 Motorola 6 μm 16 mm² Intel 8080 4,500 1974 Intel 6 μm 20 mm² RCA 1802 5,000 1974 RCA 5 μm 27 mm² Intel 8085 6,500 1976 Intel 3 μm 20 mm² Zilog Z80 8,500 1976 Zilog 4 μm 18 mm² Motorola 6809 9,000 1978 Motorola 5 μm 21 mm² Intel 8086 29,000 1978 Intel 3 μm 33 mm² Intel 8088 29,000 1979 Intel 3 μm 33 mm² Intel 80186 55,000 1982 Intel 3 μm Motorola 68000 68,000 1979…

    • 400 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Based on the reading from Moore’s Law; the number of transistors and integrated circuits double every two years.…

    • 363 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    BUL6810 ACA Paper

    • 2536 Words
    • 6 Pages

    CNN Library. (2014, September 2). 25 Deadliest Mass Shootings in U.S. History Fast Facts. Retrieved from http://www.cnn.com/2013/09/16/us/20-deadliest-mass-shootings-in-u-s-history-fast-facts/…

    • 2536 Words
    • 6 Pages
    Good Essays
  • Good Essays

    As all of the components of the client-server architecture need to be connected over a network from server to server, performance problems arrive with bottlenecks on the server side of things. This problem could cause a system to be a failure or not be able to adapt well over time. A natural solution to this problem would be to try and remove those bottlenecks by splitting the server side of things into several servers, which all do different things with the data. This approach is called the multi-tiered architecture. The three-tiered architecture is the most common of these, and will be evaluated for its applicability to a banking software system.…

    • 584 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    4 . When a program or module uses another module, you can refer to the main program as the ____ program.…

    • 2498 Words
    • 10 Pages
    Satisfactory Essays
  • Powerful Essays

    Arithmetic Logic Unit

    • 927 Words
    • 4 Pages

    ARITHMETIC LOGIC UNIT Submitted By, M.GOVINDHASAMY. K.GOWTHAM. K.A.GOWTHAMRAJ. ARITHMETIC LOGIC UNIT AIM: To verify the Function table of 4 bit ALU. APPARATUS REQUIRED: IC 74181.…

    • 927 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Logic Circuit

    • 3503 Words
    • 15 Pages

    Subqueries and derived tables can add great versatility to SQL statements, cut down complexity, but can occasionally be a curse when their effect on performance is poorly understood. Surely everyone understands the various types of subqueries and how they are used? If you felt a twinge of doubt, here is Rob Sheldon's easy guide to the subject.…

    • 3503 Words
    • 15 Pages
    Good Essays

Related Topics