answersLogoWhite

0

📱

Computer Science

Computer Science is the systematic study of algorithmic processes that describe and transform information. It includes the theoretical foundations of information and computation and the practical techniques of applying those foundations to computer systems. Among the many subfields of Computer Science are computer graphics, computer programming, computational complexity theory, and human-computer interaction. Questions about Computer Science, terms such as algorithms and proofs, and methodologies are encouraged in this category.

1,839 Questions

What comes after a geobyte?

well since a geobyte is really just a 1 with 29! zeros after it there is really no need to have more and plus the ram sytem would have to be the size of a car to fit that much so even trying to get 1 after would have to be much greater in size

There is

Saganbyte (SB) -> as Geobyte 1024

Jotabyte (JB) -> as Saganbyte 1024

Gatobyte (GAB) -> as Jotabyte 1024

What is a macro in computer science?

A macro is a small 'program' or 'computer' instruction, usually created via a scripting language, the instruction represents a larger sequence of instructions. For example say every morning when you get to work you * open email * open a workspace * open the calculator * open a calendar * log into a webpage well you could record or write all of these as a macro and instead of clicking this that and the other you could click one thing - the macro you recorded or wrote and go get a cup of coffee and when you got back your system would be ready for you to go to work!

How can computers be distinguished from other machines or devices?

The Main difference between a computer and a machine that computer is an intelligent device which has the ability to decide by its own through processing different data analysis while machine is least intelligent and is always waiting for user

BSIT 1y1-5 OLFU

What are the different types of testing technique?

Software testing can be black box testing and while box testing.
To get the complete information of it, please visit www.istqbsoftwaretesting.blogspot.com
Here you can get free istqb software testing tutorial and software testing study material.

Difference between hardware and software failure?

Should be obvious. Hardware faults are problems with the hardware. Software faults are problems with the software. Hardware = physical components of the computer (i.g. motherboard, hard drive, power supply). Software = computer programs

Can tester test software without software specifications?

According software testing procedure the tester should be provided with software specification without understanding the procedure the tester is going to test nothing

What is ODBC in computing?

ODBS in computer stands for Open database connectivity. Whenever we are working on a project let it be java or php the to store the data in our project we need a database. For this this we need to create a database connection that is ODBC.

Uses misuses of computer?

They are many ways you could use a computer unethically. Some of the most common ones will be by creating viruses, sending spam mail, spywere, etc.

Another way one could used a computer in an unethical way, is by using a computer with restrictions to do tasks outside your privileges, for example, in a business watching pornography material, in a school by accessing restricted sites. Also it is consider to use a computer unethically, when one illegally download copyrighted material being, music, videos, games, etc.

What are the characteristics of system analysis?

Characteristics of system analysis:

1. The system analyst must be able to communicate in writing and orally.

2. The analyst must easily get along with people.

3. The analyst must be a good listener and be able to react to what people say.

Define Busy waiting?

"Busy waiting" is the act of actively waiting for some condition to change.

In programming microcontrollers, one might want to wait for a pin to become high or low before continuing with the program.

A "busy waiting loop" in C would look like this:

...

while(PIN1 != HIGH)

;

...

This essentially does nothing but check the value of "PIN1" time after time, waiting for it to become "HIGH".

Now, if PIN1 were to become "HIGH", the processor "breaks out" of this busy-waiting loop and continues with the program.

How long does it take to obtain a BS in computer science?

A bachelor's degree in most areas can require between 124 to 128 college credits particular to a specific program of study. This would be based on a college or university that operates on a regular two semester academic year which is the most common. For institutions that operate on a tri-semester or quarter-semester it would be quite different. That being said, the Bachelor's degree - in most cases - is designed as a four year program of study, provided the student is full-time and follows their chosen program of study as prescribed by the college or university, and also provided the individual does not require prerequisite or developmental coursework as a result of basic skills testing. The minimum credit load for a full-time student is no less than 12 credits per semester. However, to complete the degree within the four years, a credit load of approximately 15 to 18 credits is recommended. For individuals who work or who have other responsibilities that would prohibit them from attending full-time, completion of the degree may take twice as long. Still, some of this time can be cut down by attending summer sessions and/or interim sessions. In addition, the bachelors and associate degrees are referred to as undergraduate degrees while the Masters and Doctorate degrees referred to as graduate degrees.

What is an 16 bit microprocessor?

In computer architecture, 32-bit integers, memory addresses, or other data units are those that are at most 32 bits (4 octets) wide. Also, 32-bit CPU and ALU architecturesare those that are based on registers, address buses, or data buses of that size. 32-bitis also a term given to a generation of computers in which 32-bit processors were the norm.

The range of integer values that can be stored in 32 bits is 0 through 4,294,967,295 or −2,147,483,648 through 2,147,483,647 using two's complement encoding. Hence, a processor with 32-bit memory addresses can directly access 4 GB of byte-addressablememory.

The external address and data buses are often wider than 32 bits but both of these are stored and manipulated internally in the processor as 32-bit quantities. For example, the Pentium Pro processor is a 32-bit machine, but the external address bus is 36 bits wide, and the external data bus is 64 bits wide.

32-bit - Computers or software programs capable of transferring data 32-bits at a time. Examples of 32-bit operating systems are OS/2 and Windows NT. The first true 32-bit processor was the Intel 80386. 32-bit can also refer to the amount of colours a video card is displaying. 32-bit is the same as 16.7 million colours (24 bit colour with a 8-bit alpha channel).

Explain the short cut keys in the computer?

Ctrl+C=Copy

Ctrl+Z=Undo

Ctrl+X=Cut

Ctrl+A=Select All

Ctrl+V=Paste

Ctrl+B=Bold

Ctrl+I=Italics

Ctrl+P=Print

Ctrl+Y=Redo

And finally Ctrl+Alt+Del=Windows Task Manager

Is it hard to get a collge degree in computer science?

It is not difficult to get a college degree like computer science or related computer degree, just make sure you are a person with dedication and focus to your choosen career or major.

Answer:

Well, it's not easy and may involve completing complex courses like algorithms, logic structures, programming languages, networking concepts, etc. It's good to take courses in math and physics in high school to prepare for a Computer Science degree.

What is the steps of call life cycle?

Life cycle is the process of creating software in a systematic manner. There are basically five steps in a s/w development life cycle . The five steps are gathering requirements, designing, testing and maintenance.

What are some major limitations of twisted-pair wire?

Obviously the hardware router of wi fi signal has a malfunction. So a process known as magnetic repulsion is used so that the twisted pairs oof wires do not interfere within the wireless networking.

P.s these are not the disadvantages

The control unit is one component of the?

its located in the central processing unit which is your microprocessor in simple words.

its job is to check device status and control computer components

What is the function of the scanner?

A Scanner Is A Device That Lets ou Scan And Edit Pictures. You Can Also Photocopy The Pictures Or Crop The Picture To Make Them Smaller.
MRI scanner can be used to look at almost any part of the body

A Scanner Is A Device That Lets ou Scan And Edit Pictures. You Can Also Photocopy The Pictures Or Crop The Picture To Make Them Smaller.

Scan files can be sent to or stored on a computer, and you can specify the format of a scan file according to how the file will be used.

  • Sending by e-mail

    You can send scan files to specified e-mail addresses.

    For details, see chapter 1 "Sending Scan Files by E-mail".

  • Sending to folders

    Scan files can be stored in shared network folders, or on FTP or Netware servers.

    For details, see chapter 2 "Sending Scan Files to Folders".

  • Sending using WSD

    You can use Web Services on Devices (WSD) to send scan files to a client computer.

    For details, see chapter 3 "Sending Scan Files Using WSD".

  • Delivering

    You can deliver scan files using a delivery server.

    For details, see chapter 6 "Delivering Scan Files".

Scanning originals from a client computer (TWAIN Scanner)

You can use the TWAIN driver to scan files from a networked or directly connected computer.

Scan files can be stored on the machine's hard disk or saved on a removable memory device.

  • Storing files on the machine's hard disk

    You can do various things with files that are stored on the hard disk, such as save them in shared folders or send them by e-mail.

    For details, see chapter 4 "Storing Files Using the Scanner Function".

  • Saving files on a removable memory device

    You can save scan files on a removable memory device such as a USB memory stick or an SD card.


It is used to store a photograph into a computer and input printed data or image directly into the computer from hard copy.
- To digitise picture or text.

- To look for (and deal to) files for virus's or spyware

- To psychically grok a human brain and force feedback overload to the point of exploding.
Barcode scanners begin by illuminating the code with red light. The sensor of the barcode scanner detects the reflected light from the illumination system and then generates.

http://www.carolinabarcode.com/how-barcode-scanners-work-a-69.html

Importance of workshop in computer science and engineering?

The importance of a workshop in computer science and engineering lay mostly in the ability to utilize the workshop for hands on training. Computer science and engineering both require plenty of real world practice.

What are the functions of a keyboard?

The main function of a keyboard is to input data to the computer.