What is The significance of the term megahertz?
Megahertz is ACTUALLY a measurement of the speed of a microprocessor.
How fast a computer can process instructions depends partially on the speed of the microprocessor, which is determined by it's clock speed, word size, and cach size, and whether it is single or dual core. Clock speed is measured in megahertz (MHz), millions of cycles per second, or in gigahertz (GHz), billions of cycles per second.
What is booting in compiler design?
bootstrapping is a process of writing a compiler in the target programing language which it is intended to compile
Optical media.
To decide whether given processor is using little endian format or big endian format?
There are n no. of ways for determining endianness of your machine. Here is one quick way of doing the same.#include <stdio.h>
int main()
{
unsigned int i = 1;
char *c = (char*)&i;
if (*c)
printf("Little endian");
else
printf("Big endian");
getchar();
return 0;
}
In the above program, a character pointer c is pointing to an integer i. Since size of character is 1 byte when the character pointer is de-referenced it will contain only first byte of integer. If machine is little endian then *c will be 1 (because last byte is stored first) and if machine is big endian then *c will be 0.
How do you limit the current of 3 amp power supply to 1 amp?
You are wagging the wrong end of the dog. A power supply that is constant voltage (the regular ones) may have a LIMIT of 3A at a certain voltage. The reduce the current you either turn down the voltage or add a resistor E=IR to the circuit.
AnswerHow would I do it?I would put together an ancillary, current limiting, circuit which could be connected across the output.
What are peripherals and give two examples?
As a noun, a peripheral means a piece of equipment that is connected to a computer but is not an essential part of it. An example of this would be a printer or a speaker.
What is a latch in microprocessor?
A latch is a type of flip-flop circuit that is used to store digital information in a microprocessor or other digital system. A latch is essentially a digital memory element that can hold a single bit of information (i.e. a "1" or "0"). Latches can be used to store data that needs to be held temporarily, such as the current state of a program, or to create a temporary buffer for data that is being moved between different parts of a system.
What FSMO placement considerations do you know of?
Windows 2000/2003 Active Directory domains utilize a Single Operation Master method called FSMO (Flexible Single Master Operation), as described in Understanding FSMO Roles in Active Directory.
In most cases an administrator can keep the FSMO role holders (all 5 of them) in the same spot (or actually, on the same DC) as has been configured by the Active Directory installation process. However, there are scenarios where an administrator would want to move one or more of the FSMO roles from the default holder DC to a different DC.
Windows Server 2003 Active Directory is a bit different than the Windows 2000 version when dealing with FSMO placement. In this article I will only deal with Windows Server 2003 Active Directory, but you should bear in mind that most considerations are also true when planning Windows 2000 AD FSMO roles
If you're not even getting the normal startup information about the bios, and you're not getting any "beep codes" during the "power on self test" (POST) then there is a problem with the motherboard.
Are fiber optic cables wireless?
fiber optic cables are immune to electromagnetic interference. An added benefit of fiber optic cables is that they are not a fire hazard. So the answer of this question would be "NO", they are not
Difference between a USB and an Ethernet connection?
Well usb has charging capabilitys for cell phones, ipods, ect and is usually not used as an internet cable. Also most computers have a few USB ports. Now ethernet connection is used for connecting your computer to let say your router/modem to use internet. It is not used for much else at all. Hope this helped
How can you copy a DVD if it is encrypted?
Most commercially-produced DVD movies have some kind of copy protection scheme that deter consumers in making copies of DVDs. Such schemes can be any or all of the following:
Content Scramble System (CSS)
Anti-ripping schemes such as ProtectDISC Video or SecureBurn
Regional Codes
User Operations Prohibition (UOP), which takes away user-features, such as selection menus, chapters, or subtitle choices
As protection schemes naturally disallow consumers to make duplicates of a copyrighted material, it also prevents the casual copying of movies, such as making backups, transferring it to a better media, archiving, etc. Making duplicates of these copy protected DVDs using any of the popular DVD burning software will create inferior or even unplayable versions of your movie.
There are capable DVD burning software that can bypass these protection schemes though. These software will allow you to burn copy protected DVDs without hassle.
What device is used on a LAN and offers guaranteed bandwidth to each port?
Bridges can compensate for speed discrepancies of WAN and LAN connections by using its buffering capabilities. This is done by storing the incoming data in on-board buffers and sending it over the serial link at a rate that the serial link can accommodate.
It's a form of the verb "to enable" meaning to make possible. E.g. "The airfoil enables the aircraft to fly."
Why do computer manufacturers prefer to built computers from separate standard components?
It makes them cheaper to build. Therefore they can sell them at a competitive price.
What is an Integrated Access Device IAD?
An integrated access device is installed at a customer's home to give them access to both voice and data services through a single provider. An example of this would be the lines connecting DSL and phone service through the same system.
The interface through which external devices are connected to your computer is an?
The interface through which external devices are connected to your computer is commonly known as a port. Ports can come in different shapes and sizes, with various types of connectors used to attach external devices such as printers, keyboards, and mice to a computer.
Some common types of ports include USB (Universal Serial Bus) ports, which are widely used to connect a range of devices to computers and other devices, as well as HDMI (High-Definition Multimedia Interface) ports, which are commonly used to connect computers and other devices to displays such as TVs and monitors.
Other types of ports include Ethernet ports, which are used for networking and connecting computers to the internet, and audio ports, which are used for connecting headphones, speakers, and microphones to a computer.
Overall, the use of ports is essential for connecting external devices to computers and other devices, enabling users to expand their capabilities and interact with a wider range of hardware and peripherals.
What type of devices does Deezer work on?
You can use Deezer on multiple common devices not only including mobile phones and computers but also smartwatches like Apple Watch, Galaxy Watch, etc; smart audio speakers like Amazon Echo; smart digital TVs like Samsung TVs as well as cars. For the details, you can take a look at the official page from Deezer.
As long as you have a premium account for Deezer, you can stream your Deezer tracks on any Deezer-supported device. However, if you're about to listen to Deezer tracks on an unauthorized device, you will need a tool to help, such as Tunelf Deetrack Music Converter.
Tunelf Deetrack Music Converter allows you to download music songs from Deezer and enable you to play them on any compatible device with ease. Meanwhile, you'll not need to use subscriptions to access these songs after you downloaded them via Tunelf. The downloaded songs will always be available and can be played forever. You can give it a try if you're in need.
upgrade your computer components
How do you find your PC specs?
You can find your PC specs by going into BIOS.
Most of the computers open BIOS when 'del' key is pressed on booting the system.
BIOS contains all the hardware specs of the system.
How can you receive your husbands text messages to your computer?
My first advice would be to use a discreet means whereby by he does not know you are up to this task at hand and I can say Hackbybernard(>)gmai.. so with that you can be able to get it done and he can not suspect anything throughout…
Is data entry and filing the same?
No, data entry is using an alphanumeric keyboard and/or ten key to enter data into a computer or data base. Filing is organizing data either alphabetically or relevant data into files or folders.