answersLogoWhite

0

📱

Computer Science

Computer Science is the systematic study of algorithmic processes that describe and transform information. It includes the theoretical foundations of information and computation and the practical techniques of applying those foundations to computer systems. Among the many subfields of Computer Science are computer graphics, computer programming, computational complexity theory, and human-computer interaction. Questions about Computer Science, terms such as algorithms and proofs, and methodologies are encouraged in this category.

1,839 Questions

What is a supervisor call interrupt?

SVC (supervisor-call): A request from the user-program to the kernel (or supervisor), to do something like open a file, allocate memory, create a new process etc.

In x86 platform SVCs are executed via "INT nn" machine instruction, that's what Intel calls 'software interrupt'.

What are arrays in gwbasic?

These are memory locations to store a vast amount of data. Usually a limited no. of variables are handled while programming in GW Basic. Sometimes you need to bother a plenty of variables and this colud make programming tiresome. To save yourself from a lot of manual inputs, Arrays can help you.

Difference between deterministic finite automata and non deterministic finite automata?

A deterministic finite automaton will have a single possible output for a given input. The answer is deterministic because you can always tell what the output will be.

A nondeterministic finite automaton will have at least one input which will cause a "choice" to be made during a state transition. Unlike a DFA, one input can cause multiple outputs for a given NFA.

Create a 5 by 5 matrix. Each element is randomly generated between 0 and 100.Output the matrix one by one and Output the sum of each row?

I dont know how to generate the nos. randomly.I think it should follow some logic.So the following prog is made upon the inputs given by a user.
#include
#include
void main()
{ int a[5][5],i,j,s;
printf("\nEnter elements of the 5X5 matrics:\n");
for(i=0;i<5;i++)
{ for(j=0;j<5;j++)
{ scanf("%d",&a[i][j]);
if(a[i][j]<0 a[i][j]>100)
{ printf("\nThe no. should be between 1 & 100\nEnter Again:");
scanf("%d",&a[i][j]);
}
}
}
printf("\nThe given matrix is:\n");
for(i=0;i<5;i++)
{ for(j=0;j<5;j++)
printf("%d",a[i][j]);
printtf("\n");
}
printf("\nThe sum of each row:");
for(i=0;i<5;i++)
{ for(j=0;j<5;j++)
s+=a[i][j];
printf("%d->%d\n",i+1,s);
}
getch();
}
Hope this would help you.

What is a supermarket checkout system?

All these processes are very helpful for the purposes of dealing with an individual customer's purchases. However, when computers are linked in a network, many new uses are possible.

Now, I am going to draw a different system boundary. The components of this supermarket checkout system are the checkout terminal, the network and the database server. A database server is used to make the data in databases available to other computers on the network, and therefore to users. You met a specialised form of database server in Section 14.2: the FirstClass server. In the following sections, I'll focus on the network first and then look at the database server.

You might be wondering about the users of the system: the customer and the checkout operator. For the time being, we are focusing on the computers and network, rather than thinking about the end users.

To count the no of digits in an integer?

Say you have some integer a. a

First take it's absolute value. |a|

Next log it base 10. log10 |a|

Truncate this value, then add 1. trunc ( log10 |a| ) + 1

You now have the number of digits.

What are the 4 basic things a CPU does with 2 pieces of info?

There are way more than 4 things - and even "basic" things - a computer can do with two pieces of information. For example, add, subtract, multiply, divide, get the remainder of a division (modulos), compare, boolean AND, boolean OR, boolean XOR, exchange the two values.

What is justified alignment?

There are four "main" types of text alignment.

  1. Left justified - Probably the most common, all text is aligned to the left side of the page.
  2. Right justified - Probably the least common, all text is aligned to the right side of the page.
  3. Center justified - The entire line of text is centered on the page.
  4. "Justified" - Sort of a mix between the other types. Text begins aligned to the left, but lines will "extend" themselves (by increasing the space between words) in order to completely fill the line with text. This type of alignment wants both the left and right sides of text to have straight edges.
See the related links section for some examples.

What do ICT mean?

Information and Communications Technology.

What are the main advantages and disadvantages of using a layered network architecture?

The following are the advantages of a layered architecture:

Layered architecture increases flexibility, maintainability, and scalability. In a Layered architecture we separate the user interface from the business logic, and the business logic from the data access logic. Separation of concerns among these logical layers and components is easily achieved with the help of layered architecture.

Multiple applications can reuse the components. For example if we want a windows user interface rather than a web browser interface, this can be done in an easy and fast way by just replacing the UI component. All the other components like business logic, data access and the database remains the same. Layered architecture allows to swap and reuse components at will.

Layered architecture enables teams to work on different parts of the application parallely with minimal dependencies on other teams.

Layered architecture enables develop loosely coupled systems.

Different components of the application can be independently deployed, maintained, and updated, on different time schedules.

Layered architecture also makes it possible to configure different levels of security to different components deployed on different boxes. sO Layered architecture, enables you to secure portions of the application behind the firewall and make other components accessible from the Internet.

Layered architecture also helps you to test the components independently of each other.

The following are the disadvantages of a layered architecture:

There might be a negative impact on the performance as we have the extra overhead of passing through layers instead of calling a component directly.

Development of user-intensive applications can sometime take longer if the layering prevents the use of user interface components that directly interact with the database.

The use of layers helps to control and encapsulate the complexity of large applications, but adds complexity to simple applications.

Changes to lower level interfaces tend to percolate to higher levels, especially if the relaxed layered approach is used.

How many bits in a nibble?

A group of half a byte (4 bits) is referred to as a nibble.

What would be the best choice of study for a 50-year-old who wants to change his career path and get into the field of Computer Science or IT?

I would suggest you start with a visit to your home county community college. They are typically more community oriented, and open to prospective students in your type of situation. You can request to speak to an enrollment specialist in the Admissions Office who will be able to guide and direct you. The community college - to start with - is also less expensive, smaller class size, and better student to professor ratio. This means more individualized attention. Today, colleges are a mixed bag in terms of ages with many individuals - because of the job market - changing careers. You should fair well there.

Are general purpose computers used mostly to control something else?

No.

It is possible to program them for that purpose, but they have many more uses that have nothing to do with control.

Is it true or false that modern OSs are interrupt driven?

Modern OSs making use of multi-tasking tend to be interrupt-driven.

What is the size of L1 and L2 cache?

Usually the size of the L2 cache will be larger than the L1 cache so that if data hit in L 1 cache occurs, it can look for it in L 2 cache.. If data is not in both of the caches, then it goes to the main memory...

Threads belonging to the same process share the?

Threads belonging to the same process share the same resources and address space.

Was the first computer HAL?

No, HAL is a fictitious computer that appears in the Arthur C. Clark book and Stanley Kubrick movie 2001 a Space Odyssey. No such machine exists nor is one likely to ever exist.