Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.
Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
Questions | Answers | Discussions | Knowledge sharing | Communities & more.
What is the name given to all the programs inside the computer with makes it usable?
Software is a set of instructions, data or programs used to operate computers and execute specific tasks. It is the opposite of hardware, which describes the physical aspects of a computer.
Software is a set of instructions, data or programs used to operate computers and execute specific tasks. It is the opposite of hardware, which describes the physical aspects of a computer.
See lessIn analyzing the compilation of PL/I program, the description "creation of more optimal matrix" is associated with
Creation of more optimal matrix
Creation of more optimal matrix
See lessIn memory systems, boundary registers
The boundary-scan register is a large serial shift register that uses the TDI pin as an input and the TDO pin as an output. The boundary-scan register consists of 3-bit peripheral elements that are associated with Intel® MAX® 10 I/O pins.
The boundary-scan register is a large serial shift register that uses the TDI pin as an input and the TDO pin as an output. The boundary-scan register consists of 3-bit peripheral elements that are associated with Intel® MAX® 10 I/O pins.
See lessIn memory systems, boundary registers
Creation of more optimal matrix
Creation of more optimal matrix
See lessThe computational technique used to compute the disk storage address of individual records is called:
Hashing is a computational technique used to compute the disk storage address of individual records in a database
Hashing is a computational technique used to compute the disk storage address of individual records in a database
See lessThe advantage(s) of incorporating the macro processor into pass 1 is(are):
Solution(By Examveda Team) More flexibility is available to the programmer in that he may use all the features of the assembler in conjunction with macros. Functions are combined and it is not necessary to create intermediate files as output from the macro-processor and input to the assembler.
Solution(By Examveda Team)
See lessMore flexibility is available to the programmer in that he may use all the features of the assembler in conjunction with macros. Functions are combined and it is not necessary to create intermediate files as output from the macro-processor and input to the assembler.
Semaphores
A semaphore is an integer variable, shared among multiple processes. The main aim of using a semaphore is process synchronization and access control for a common resource in a concurrent environment. The initial value of a semaphore depends on the problem at hand.
A semaphore is an integer variable, shared among multiple processes. The main aim of using a semaphore is process synchronization and access control for a common resource in a concurrent environment. The initial value of a semaphore depends on the problem at hand.
See lessThe file structure that redefines its first record at a base of zero uses the term:
A file structure is the way files are organized on a computer. It's important because it helps you find the files you need. Adopting a file structure makes getting to the files you need as easy as possible. Specifically, it's to minimize the number of trips to the disk to get the data you're lookingRead more
A file structure is the way files are organized on a computer. It’s important because it helps you find the files you need. Adopting a file structure makes getting to the files you need as easy as possible. Specifically, it’s to minimize the number of trips to the disk to get the data you’re looking for.
See lessFor how many processes which are sharing common data, the Dekker's algorithm implements mutual exclusion?
Dekker's algorithm is the first known correct solution to the mutual exclusion problem in concurrent programming. The solution is attributed to Dutch mathematician Th. J. Dekker by Edsger W. Dijkstra in an unpublished paper on sequential process descriptions and his manuscript on cooperating sequentRead more
Dekker’s algorithm is the first known correct solution to the mutual exclusion problem in concurrent programming. The solution is attributed to Dutch mathematician Th. J. Dekker by Edsger W. Dijkstra in an unpublished paper on sequential process descriptions and his manuscript on cooperating sequential processes.
See lessIn an absolute loading scheme, which loader function is accomplished by loader
Therefore, in an absolute loading scheme, the loader function of re-allocation is accomplished by the assembler. It adjusts the relative memory addresses assigned during assembly to absolute memory addresses based on the desired loading address.
Therefore, in an absolute loading scheme, the loader function of re-allocation is accomplished by the assembler. It adjusts the relative memory addresses assigned during assembly to absolute memory addresses based on the desired loading address.
See less