What do you mean of GIP in computer term?
In computer terms, GIP typically refers to "Graphics Interface Protocol," which is a set of standards or guidelines for handling graphics data and interactions between hardware and software. It can also refer to "Generic Internet Protocol," which is a broader term encompassing protocols used for data transmission over the internet. However, context is important, as GIP can have different meanings in various technical discussions. Always check the specific domain to understand its precise usage.
What is development the systematic process of transforming an idea into functional software?
Development is the structured approach to turning an idea into operational software through a series of defined stages. This process typically includes requirements gathering, design, coding, testing, and deployment, ensuring that the final product meets user needs and specifications. By following methodologies like Agile or Waterfall, developers can manage complexity and enhance collaboration, ultimately delivering reliable and efficient software solutions.
To solve for the CRC using modulo 2 arithmetic, represent the binary values P (1101) and M (101011) as polynomials. Perform polynomial long division by dividing M by P, where the coefficients are binary (0 or 1) and the division is done using XOR operations instead of subtraction. The remainder after the division will be your CRC; append this remainder to the original message M to create the transmitted codeword.
What are the three factors that affect the size of a sound file?
(1.)Material density determines the speed and how much and what frequencies of sound will be sent and received, not absorbed.( 2.)The temperature of the medium and the (3.) intensity (amplitude) of the signals source.
What is a cray family? A cray family is a This surname was derived from the Gaelic 'Macrath' meaning 'the son of grace or prosperity'. Early records of the name mention Patrick M'Re who was a tenant in Tybris parish, Scotland in the year 1376. Dugall McRay was a witness at Kilmun in the year 1476. The clan appears to have inhabited the lands of Clunes in the Beauly district in the 12th and 13th centuries and removed to Kintail in the 14th century. The founder of the Kintail branch is said to be Fionnla Dubh MacGillechriosd who died in 1416. The Macraes were loyal followers of the MacKenzies, Lord of Kintail and Earls of Seaforth. The use of fixed surnames or descriptive names appears to have commenced in France about the year 1000, and such names were introduced into Scotland through the Normans a little over one hundred years later, although the custom of using them was by no means common for many years afterwards. During the reign of Malcolm Ceannmor (1057-1093) the latter directed his chief subjects, after the custom of other nations, to adopt surnames from their territorial possessions, and there created 'The first erlis that euir was in Scotland'. Leading figures of the name include Duncan, 5th Lord of Kintail, who in 1539 slew Donald Gorm of Sleat with an arrow and was later granted the lands of Inverinate. Duncan of the Silver Cups was the 17th century Gaelic poet and compiler of the famous Fernaig Manuscripts. James MacRae (1677-1744) was the Governor of Madras. At first the coat of arms was a practical matter which served a function on the battlefield and in tournaments. With his helmet covering his face, and armour encasing the knight from head to foot, the only means of identification for his followers, was the insignia painted on his shield, and embroidered on his surcoat, the draped and flowing garment worn over the armour. Alba, the country which became Scotland, was once shared by four races; the Picts who controlled most of the land north of the Central Belt; the Britons, who had their capital at Dumbarton and held sway over the south west, including modern Cumbria; the Angles, who were Germanic in origin and annexed much of the Eastern Borders in the seventh century, and the Scots. The latter came to Alba from the north of Ireland late in the 5th century to establish a colony in present day Argyll, which they named Dalriada, after their homeland. The Latin name SCOTTI simply means a Gaelic speaker.
Object-oriented databases use small, reusable chunks of software called objects. The objects themselves are stored in the object-oriented database. Each object consists of two elements: 1) a piece of data (e.g., sound, video, text, or graphics), and 2) the instructions, or software programs called methods, for what to do with the data. Part two of this definition requires a little more explanation. The instructions contained within the object are used to do something with the data in the object. For example, test scores would be within the object as would the instructions for calculating average test score.
Object-oriented databases have two disadvantages. First, they are more costly to develop. Second, most organizations are reluctant to abandon or convert from those databases that they have already invested money in developing and implementing. However, the benefits to object-oriented databases are compelling. The ability to mix and match reusable objects provides incredible multimedia capability. Healthcare organizations, for example, can store, track, and recall CAT scans, X-rays, electrocardiograms and many other forms of crucial data.
Does the number 255 hold any special significance to computer coders?
Yes - it's the largest number that can be represented in Binary code with 8 bits
How do you draw a complete schematic diagram of a computer?
you can ask someone to help or a teacher or you can find out at a library or on the computer
What is the role of DMA controllers in microprocessor based systems?
A DMA (Direct Memory Access) controller is a device that can request control of the memory bus from the CPU, and then transfer data to or from memory without the support of the CPU. It is often used in high speed I/O, such as hard drives, because polled and interrupt modes incur too much overhead.
What advantage is there to having a CPU with on-chip cache?
The CPU cache exists because modern processors are very very fast. If they had to read from main memory every time they performed a read operation, computers would be limited by RAM speeds. By using a very fast cache, the CPU is able to perform a single read to fill in a cache line, then execute its instructions on that entire cache line very efficiently.
There is a cache in between the CPU and main memory for the same reason there is main memory in between the CPU and the hard drive; the CPU is far faster than any storage device on your computer. Without these tiers of increasingly fast (and expensive) memory, we would be limited by HDD read/write speed.
How does a computer recognize the mouse click on the screen?
The computer recognizes the click by monitoring the state of the physical button built into the mouse (or trackpad or similar device). When the button is activated (pressed), the operating system is notified of this fact.
In the next step, the operating system needs to identify the X and Y coordinates on the screen (and, in case of a multi-screen system, the screen number S) to which the click applies. This is pretty simple: the operating system draws the mouse cursor, so it knows its location at any time. Thus, the location of the mouse cursor at the time of the click allow the computer to recognize the mouse click event.
In the next step, the operating system needs to work along the visual items in viewing order to identify which window and which control (button, text area, icon, etc) was hit by this event. Following is a series of software notifications to the affected applications, windows and controls, allowing those to respond to the mouse click as appropriate.
How do you say 'computer science' in Italian?
I used Google translate and it said that it was "informatica".
Why insertion sort is not suitable for large volume of data?
Mainly because of speed. Insertion sort moves data every time a value is inserted, so execution time rises more or less exponentially with volume of data. There are much better sorting algorithms for large amounts of data, for example quicksort, which moves data fewer times before the list is fully sorted.
This seems like a question from a computer science training course, and is probably best answered by referring to your course materials.
You may or may not get lucky here, depending on whether someone else feels like writing an answer for you to save you from having to do your own homework!
It's your test question, not ours, and there won't always be someone else to ask for the answer.
Earn your diploma. <><><> direct modethe operand resides in the memory and its the address which is given directly by the address field of the instruction. indirect mode the address field specifies the location of the address of an operand or the result. thus the process has to access the memory twice in memory indirect mode: once to fetch this address and again to fetch the operand or the result
Give four methods of analysing an existing system?
1. Interpreting the customer's requirements.
2. collecting data from the existing system.
3. Description of the current system - establishing the inputs, outputs and processing being done.
4. identification of the problems with the current system.
What is the zip password for the iwifihack.ipa?
WikiAnswers does not give out information about passwords for anything.
Which three protocols are associated with email?
POP3 and IMAP are a common misconception. They actually are:
MDA - Mail Delivery Agent
MTA - Mail Transfer Agent
MUA - Mail User Agent
Hope this helps you
Luke Addington - BSc Computer Science
Which type of interrupt can not be masked by software?
The TRAP interrupt can not be masked by software, unless there is hardware in place to allow that, perhaps by anding an output bit with the TRAP request line.
Notes on different generation of computer?
generations of computers
There are actually FIVE generations of computers.
The first generation of electronic computers were made of vacuum tubes and they were big as a room.
Computer science syllabus of hsc maharashtra board?
Computer Science 1(Software)- 1.Operating Systems
2.Classes and Objects
3.Constructors and Destructors
4.Operator Overloading and Type Conversions
5.Inheritance:Extending Classes
6.Pointers,Virtual Functions and Polymorphism
7.Data Structures
8.C++
9.HTML
10.Visual Basics(Only for Practicals)
Computer Science 2(Hardware)- 1.Introduction to Microprocessors and
Organisation Of 8085
2.Instruction Set and Programming Of 8085
3.Introduction to Intel X86 Family
4.Introduction to Microcontrollers
5.Networking Technology
-CSB.... ;P
There are 250 2-address instructions. There are only a total of 256 2-address instructions allowed if we have 32-bit instructions (two addresses take up 24 bits, leaving only 8 bits for the opcode). Looking at the 8 bit opcode, assume bit patterns 00000000 (0) through 11111001 (249) are used for the 250 two-address instructions. Then there are 6 bit patterns left for one address instructions. However, each one of these can use the remaining 12 bits gained from having only one operand, so we have 6 * 212. 00000000 11111001 11111010 11111010 ... 11111111 11111111 ______________________________________________________________________________ xxxxxxxxxxxx xxxxxxxxxxxx 000000000000 111111111111 000000000000 xxxxxxxxxxxx 111111111111 xxxxxxxxxxxx xxxxxxxxxxxx xxxxxxxxxxxx xxxxxxxxxxxx xxxxxxxxxxxx 250 2-address instructions 212 212 6 * 212 1-address instructions
What is web server and name any three web servers?
A web server can refer to the physical server or the software running on an internet-connected server (such as Apache or Microsoft IIS) that responds to http requests and delivers an HTML response.
What are the Negative impacts of IT?
Although Information technology could have a wider meaning in today's time however it is a general term that describes any technology that helps to produce, store and distribute information mostly computer based. Even TV, cell phones and Internet could come under this umbrella as communicators.
With communications system being what it is today there is the fear of information going into wrong hands resulting in dire consequences. Terrorists using information that is so easily available is a fear that the world is most concerned about.
This approach has kept people at bay. There is no interaction with one another. The real world is slowly getting transformed into a virtual world and people seem to be opting for that approach for keeping in touch with each other. The human touch is sadly missing.
This mechanized approach has also reduced the number of jobs specially in the clerical field as manual data collection is no longer necessary. Joblessness means more unrest among the youth
The close contact with the devices that produce, store and disseminate information is hazardous to health and cancer is one of the diseases that have been attributed to such contacts.
With the rush for jobs in the filed of Information Technology as more and more youth opt for this line there is an unrealistic imbalance in the various jobs available and the candidates who are fit to take up the various jobs other than those pertaining to Information Technology.
No one knows what the future holds. With a thirst for fine tuning more shocks could be in store.