Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.
Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
Questions | Answers | Discussions | Knowledge sharing | Communities & more.
The instruction register
The instruction register in a CPU stores the instruction currently being executed by the computer. The Central Processing Unit (CPU) is the brain of the computer, responsible for executing instructions that make up a computer program.
The instruction register in a CPU stores the instruction currently being executed by the computer. The Central Processing Unit (CPU) is the brain of the computer, responsible for executing instructions that make up a computer program.
See lessWhich of the following scheduling objectives should be applied to the following: the system should admit jobs to create a mix that will keep most devices busy
Resource utilization. Whenever a system resource, such as a CPU
Resource utilization. Whenever a system resource, such as a CPU
See lessNonmodifiable procedures are called
Serially usable procedures. To elaborate: These can't be modified.
Serially usable procedures. To elaborate: These can’t be modified.
See lessa process scheduling algorithm is preemptive if the CPU can be forcibly removed from a process
In a preemptive scheduling once the CPU is given to a task it can be taken away, for example when a higher priority task wants the CPU. Preemptive scheduling is used in real-time systems where the tasks are usually configured with different priorities and time critical tasks are given higher prioritRead more
In a preemptive scheduling once the CPU is given to a task it can be taken away, for example when a higher priority task wants the CPU. Preemptive scheduling is used in real-time systems where the tasks are usually configured with different priorities and time critical tasks are given higher priorities.
See lessInformation in a memory that is no longer valid or wanted is known as
The information in a memory that is no longer valid is called garbage.
The information in a memory that is no longer valid is called garbage.
See lessWhich, of the following, is true for testing and debugging?
Solution(By Examveda Team) Testing is the process using which we find errors and bugs. Debugging is the process using which we correct the bugs that we found during the testing process.
Solution(By Examveda Team)
See lessTesting is the process using which we find errors and bugs. Debugging is the process using which we correct the bugs that we found during the testing process.
Relocation bits used by relocating loader are specified (generated) by
Relocating bits used by relocating loaders are specified by the linker. Explanation: A relocating loader is a program that loads an object program into memory for execution. It is responsible for allocating memory, resolving external references, and performing relocations.Relocating bits used by relRead more
Relocating bits used by relocating loaders are specified by the linker. Explanation: A relocating loader is a program that loads an object program into memory for execution. It is responsible for allocating memory, resolving external references, and performing relocations.Relocating bits used by relocating loaders are specified by the linker. Explanation: A relocating loader is a program that loads an object program into memory for execution. It is responsible for allocating memory, resolving external references, and performing relocations.
See lessWhich of the following filename extension suggests that the file is a backup copy of another file?
.bak In computing, ". bak" is a filename extension commonly used to signify a backup copy of a file.
.bak
See lessIn computing, “. bak” is a filename extension commonly used to signify a backup copy of a file.
A sequence of instructions, in a computer language, to get the desired result, is known as
A sequence of instructions, in a computer language, to get the desired result, is known as. A. Algorithm.
A sequence of instructions, in a computer language, to get the desired result, is known as. A. Algorithm.
See lessA program
provide (a computer or other machine) with coded instructions for the automatic performance of a task.
provide (a computer or other machine) with coded instructions for the automatic performance of a task.
See less