Explore BrainMass
Share

Explore BrainMass

    Processor Architectures

    Ref11) Stack elements and Instructions

    Assume a stack-oriented processor that includes the stack operations PUSH and POP. Arithmetic operations automatically involve the top one or two stack elements. Begin with an empty stack. What stack elements remain after the following instructions are executed? PUSH 4 PUSH 7 PUSH 8 ADD PUSH 10 SUB MUL

    Time Taken to Get the Status and Service the I/O Device

    Timer alerts processor for a status scan of I/O device every 20 ms. I/O device interface has two 8-bit ports: status and data output. Compute the time it takes to get the status and service the device, with an 8-MHz processor clock rate. All instructions take 12 clock cycles. State your assumptions, if any.

    Components - Memory Management

    I need help with the following problem. Decribe in a few paragraphs Which of the following components is responsible for loading the initial value in the program counter for an application program before it starts running: • Compiler • Linker • Loader • Boot module or boot ROM Identify three styles of swit

    Information Systems Security

    1. For each of the following concepts, research the internet for information on the topic and provide an explanation as to: (a) what the concept means, (b) how is it realized mathematically, and (c) what are its practical benefits. Identify the source(s) for your information. i. Blind signatures ii. Identity-based encrypt

    System Architecture

    System Architecture. 20 questions. See attached file for full problem description.

    Linux Features

    Please help me find the answers for the problem below (at least 6-10 features and outline the main ideas of each features). Outline of the important features of Linux.

    Of the two types of Intrusion Alarm Systems why are there two?

    Of the two types of Intrusion Alarm Systems why are there two? Why is one not sufficient Intrusion detection systems, or IDSs, have become an important component in the Security Officer's toolbox. However, many security experts are still in the dark about IDS, unsure about what IDS tools do, how to use them, or why they must. Th

    In MS_DOS the command to clear the screen is cls

    Use the function call system ("cls") or system (clear") so that the screan is clear on the begining of the pogram What happend when the output is redirected In file heads_or_tails.h: #include <stdio.h> #include <stdlib.h> #define MAXWORLD 100 int get_call-from user(void) void paly (int how_many); void prn_fina

    Executive Report and Discuss SQL

    Tom Ashton started Ashton Manufacturing Inc (AMI) several years ago. The Company has grown quickly from a small operation to the mid-sized organization it is today. AMI has an opportunity to take on an additional customer. This arrangement will allow AMI to grow to a large organization operating nearly 24 hours a day / 7 days a

    History of Computers

    Go back 15 years from today to discover what operating system advances were taking place. Describe how these advances were revolutionizing the business world. Compare these advances to the ones we are experiencing today. Please provide references.

    Network Hardware

    You are currently working for Surebank, a mid-size financial institution. The organization has approximately 80 people working in their main location where your office is located. The bank also has two branch locations. You have been very successful in your career as a Network Operation Specialist, serving at the help desk, assi

    Database Back up

    Please discuss what you believe to be a good backup and crisis management strategy considering the following scenario. Provide a detailed explanation of your choices. Be sure to cite your sources. You work for a small consulting firm with a sterling reputation for high-quality work and outstanding technical aptitude. You've

    How are Pentium chips manufactured?

    Please answer the following questions and don't forget to site your sources... 1. How are Pentium chips manufactured? 2. What is memory access? 3. Discuss how registers are used in CPU design.

    Network & Computer Security V

    Introduction: The First Bank of Paradise (FBP) operates primarily within the state of Hawaii, although it has one branch office on Da Kine Island in the South Pacific. FBP has 27 branch offices around the state. See the attached document for the bank's wide area network. (The diagram in the attachment does not exactly match

    (HCI) Human Computer Interaction

    23) Use drawings where necessary. (a) Explain the concept of "mental model" and say how this concept relates to Card, Moran and Newell's "Model Human Processor". (b) Explain the concept of interactivity and say how it relates to the idea of an interface, using examples and referring to the translations in Abowd and Beale

    MICROSOFT ACCESS EXPERT

    Our group chose to develop a computer inventory database system for a nationally based real estate developer, based upon group consensus and a need by the I.T. manager: Phil Switzer. This project is more than an upgrade compared to the previous system of separate inventory sheets produced in Microsoft Excel. The database applica

    Baud Rate Problem

    Some computers need to have large numbers of RS-232 lines (e.g. servers or Internet providers). For this reason, plug-in cards with multiple RS-232 lines exist. Suppose that such a card contains a processor that must sample each incoming line at 8 times the baud rate to see if the incoming bit is a 0 or a 1. Also suppose that su

    Baud Rate

    Some computers need to have large numbers of RS-232 lines (e.g. servers or Internet providers). For this reason, plug-in cards with multiple RS-232 lines exist. Suppose that such a card contains a processor that must sample each incoming line at 8 times the baud rate to see if the incoming bit is a 0 or a 1. Also suppose that su