Question
pls answer all questions
1) A step-by-step solution to a problem is called a. hardware b. an operating system c. a computer language d. an algorithm 2
19 ) 14) The controller is a serial device that connects slow devices such as the keyboard and mouse to the computer. a. SCSI
27) is a basic algorithm that finds the smallest of a list of numbers. a. Summation b.Product c.Smallest d.Largest 26) In sor
36)Changeability, correctability flexibility,and testability are factors important to the of software. a.operability b.mainta
0 0
Add a comment Improve this question Transcribed image text
Answer #1

1. An Algorithm.

2. High Level Programming Languages.

3. Unicode.

4. Quantized.

5. Sign and magnitude.

6. 8

7. Mantissa.

8. 8

9. Two 1s.

10. AND

11. All of the above.

12. 1000000000000 bytes.

13. Seek time.

14. USB

15. Presentation Layer.

16. Application Layer.

17. Bus Topology.

18. Application Layer.

19. An operating system.

20. Distributed

21. Partitioning.

22. Deadlock.

23. An algorithm.

24. Flowchart.

25. Smallest.

26. Selection sort.

27. High-level language.

28. Loader.

29. Object-oriented.

30. Encapsulation.

31. Int.

32. Design.

33. The system test engineer.

34. Coupling.

35. Stamp coupling.

36. Longevity.

37. Multidimentional.

38. Data and Link.

39. Beginning.

40. Private key.

Add a comment
Know the answer?
Add Answer to:
pls answer all questions 1) A step-by-step solution to a problem is called a. hardware b....
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Answer the following Questions Question 1 Convert the followings: [a, b, c and d: 1 mark...

    Answer the following Questions Question 1 Convert the followings: [a, b, c and d: 1 mark each; e: 3 marks. Total 7 marks] a. 0x2ED1 to Binary b. −29.6610 to Binary c. 1001111001102 to Hexadecimal d. 11101110 (8-bit 2’s complement representation) to decimal e. A computer stores the following using the IEEE754 single precision format. What value in decimal it is representing for: 1 01111110 11000000000000000000000

  • A ______ controls how computer hardware communicates with the operating system. a. command line interface b....

    A ______ controls how computer hardware communicates with the operating system. a. command line interface b. device driver c. GUI d. power switch Which of these is not a programming language? a. Python b. Boa c. Java d. C Which of the following is not an example of a cloud computing application? a. Adobe Photoshop b. Google mail c. Google Docs d. Facebook Which of these programming languages is closest to machine language? a. Swift b. Python c. Assembly language...

  • a) Name and explain the seven commonly accepted layers of a computer level architecture. How does...

    a) Name and explain the seven commonly accepted layers of a computer level architecture. How does this help us understand computer systems? b) Does cloud computing eliminate all of an organization's c) Represent the decimal number -27 in binary 8-bit in two's d) Why are hamming codes useful in data transmission? concerns about computing? Explain. complement representation. e) State whether the following statement is true or false "Using the Hamming algorithm, we can not only detect single bit errors in...

  • seven-layer model? (Select twa.) A. Cables B. Hub C. Network protocol D. Session software the data...

    seven-layer model? (Select twa.) A. Cables B. Hub C. Network protocol D. Session software the data 13. Which components work at Layer I of the os La a. Which layer of the 0Sl model makes sure ls in a readable format for the Application layer A. Application layer B. Presentation layer Ex do C. Session layer D. Transport layer 9. At which layer of the TCP/1P model are UDP 14. Andalyn says complete 48-bit MAC ed to NIC manufacturers from...

  • TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

    TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...

  • Multiple Choice 11. The ________ is the agreed-upon interface between all the software that runs on...

    Multiple Choice 11. The ________ is the agreed-upon interface between all the software that runs on the machine and the hardware that executes it. It allows you to talk to the machine. A) hardware protocol B) software protocol C) machine control architecture D) instruction set architecture 12. A ________ consists of an arithmetic logic unit and a control unit. A) processor B) computer C) register D) program 13. ________ are typically used by companies for specific applications such as data...

  • Write a program using C/C++ to demonstrate the memory leak problem. Execute the program until it cannot proceed anymore. You may have to allocate big chunks of memory iteratively to reach to this poin...

    Write a program using C/C++ to demonstrate the memory leak problem. Execute the program until it cannot proceed anymore. You may have to allocate big chunks of memory iteratively to reach to this point quickly. This is even more so if you are running the program on a 64-bit operating system. Based on your observation and your understanding of the principles of a paging memory management system, answer the following questions: A. How much memory has the program used when...

  • 8. All of the following are advantages to using laser printers except a. сos b. speed....

    8. All of the following are advantages to using laser printers except a. сos b. speed. c. quality of printing. d. efficiency. 9. An application program is software that is designed to perform a variety of tasks, such as word processing., database functions, and patient b. provide the computer with a set of basic instructions for executing other programs. ыling oul 13 interpret the program instructions. d. All of the above dhe 10. A series of computers that are linked,...

  • Answer the following questions: a) What is the relationship between operating systems and computer hardware? b)...

    Answer the following questions: a) What is the relationship between operating systems and computer hardware? b) What are the four basic function modules of an operating system? c) Differentiate between an abstract resource and a physical resource. Give two examples of each. d) Briefly describe the differences between an interrupt and a trap.

  • answer for all questions.... How do modern operating systems solve this? [3 marks] i) This is...

    answer for all questions.... How do modern operating systems solve this? [3 marks] i) This is a snapshot of a page table and a translation look aside buffer (TLB) of an operating system (Assume that these are the only populated entries). Toble 1: Page Table Entry Virtual Page Page Frame Time Loaded Time R bit M bit number Referenced 2 0 60 161 0 1 1 1 130 0 160 1 2 26 162 0 1 30 3 20 163...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT