Which of the following does Moore's law predict?
a.The power of microprocessor technology doubles and its cost of production falls in half every 18 months.
b.The cost of microprocessors will increase as their power increases.
c.The price of microprocessors continues to fall, while their cost of production increases.
d.The demand for microprocessors continues to rise, while their supply falls.
e.The demand for microprocessor technology falls in half every 18 months.

Answers

Answer 1

Answer:

Hi!

The correct answer is the a.

Explanation:

The Moore's law is an a empirical law that Gordon Moore predicted doing some observations about how the density of the transistors on a integrated circuit was increasing over time.

For example, this law state that if you have an integrated circuit with: 1000 transistors in 1980 then in 1981 and six months later you will have the same integrated circuit with 2000 transistors, and so on..

Jan 1980: 1000 transistors.Jul 1981: 2000 transistors.Jan 1983: 4000 transistors.Jul 1984: 8000 transistors.

And that's the reason because its cost will fall too.


Related Questions

An objective function in linearprogramming is a(n):

decisionvariable.
environmentvariable.
resultvariable.
independentvariable.
constant.

Answers

Answer: An objective function in linear programming is a decision variable.

Explanation: An objective function is a function which has the target towards the model whether it should be maximized or minimized according to the relation between the  variables present in the function. There are set of variables which are responsible for the controlling of objective function that is known as decision variables.

Decision trees are best suitedfor:
one decision inone period.
one decision overseveral periods.
several decisionsover one period.
several decisionsover several periods.
None ofthese.

Answers

Answer: Decision Trees are best suited for several decisions over one period.

Explanation:

Decision tree gives an effective method for making decisions. It is a tree-like model used for decisions and analyses consequences, including resources cost, outcome and utility. It also helps us to make best and good quality decisions on the basis of given information. It is also widely used in machine learning and commonly used  in data mining as a tool.

what is Interrupt?and give me information about Interruptstypes and processes and works?

Answers

Answer:

Interrupt is defined as, in computer system interrupts are the signal sent to the central processing unit by the external devices. The main function of interrupt is that, an operating system that provide multiprocessing and multitasking. The interrupt is a signal that causes the operating system to stop work on one processor and started work on another processor.

There are basically two type of interrupts:

Hardware interrupts - For the processor, if the signal is from external device and hardware is called hardware interrupts.Software interrupts - The interrupt which is caused by the software instructions are called software interrupt.

When you declare a method as abstract method ? Can I call a abstract method from a non abstract method ?

Answers

Answer: A method without body is called abstract method. A abstract method can be called from a non abstract  class or method provided it is inherited using a subclass.

Explanation:

An abstract method is a method which does not have a body, it just has opening and closing curly braces. A class having an abstract method is also declared as abstract class. We cannot make an object of the abstract class.

example : public abstract float multiply(float x, float y);

is an example of abstract method.

calling an abstract method from a non  abstract method is possible provided it is inherited by a non abstract subclass.

What is the height of the tallest possible red-black tree containing 31 values?

Answers

Answer:

The height of tallest possible red-black tree having 31 values is 10.

Explanation:

The height of tallest possible red-black tree = 2㏒₂(n+1)

here we have n=31 So substituting the value of n in the equation.

=2㏒₂(31+1)

=2㏒₂(32)

=2㏒₂(2⁵)                   since ㏒(aⁿ)=n㏒(a)  

=2x5㏒₂(2)

=10㏒₂(2)                   since ㏒ₙ(n)=1.

=10.

Non proprietary standard is also termed as____________

a. De facto standard

b. Le facto standard

c. Pre facto standard

d. Non facto standard

Answers

Answer: Option A) De facto standard

Non proprietary standard is also termed as de facto standard.

Explanation:  Non proprietary standard is also termed as de facto as when the proprietary standard such as window are widely used, then it becomes  de facto standard. When de facto standard is referring in terms of computers, it is an accepted application, design or language standard that is used in industry but not officially recognized.  

An example of de facto standard is paper clip ion used in e-mail to represent an attachment.  

FS and GS are two___________________ in protected mode.
? segment registers
? segment selectors
? stack pointers
? register pointers

Answers

Answer:

Segment registers

Explanation:

The initial purpose behind the segment registers was to enable a program to access many distinct (big) memory sections designed to be autonomous and part of a constant virtual store.

They don't have a processor-defined objective, but instead Operating system runs them for purpose. The GS register is used in Windows 64-bit to point to constructions defined by the operating scheme.   Operating system kernels usually use FS and GS to access thread-specific memory. In windows, thread-specific memory is managed using the GS register. To access cpu-specific memory, the linux kernel utilizes GS.

True / False
The exponent in floating point is stored as a biased value.

Answers

Answer:

True

Explanation:

The bias value present in a floating point number deals with the positiveness and negativeness of the exponent part for a floating point number.  The bias value for a floating point number is 127. It means that 127 is always needed to be added to the exponent part of any floating point number.

In a single precision floating point number, we need 8 bits to store the exponent. Rather than storing it as a signed two's complement number, it is easier to simply add 127 to the exponent (because the lowest value that can be in 8 bit signed is -127) and simply store it as an unsigned number. If the stored value is bigger than the bias then it would mean the value of the exponent is positive otherwise it is negative, but if they are equal then it is 0.

Write a conditional expression that assign the value 0 to a credits variable if it is less than 0; otherwise the value of the credits variable remains unchanged.

Answers

Answer:

credits = (credits < 0) ? 0 : credits;

Explanation:

This is the ternary conditional operator.

Answer:

void updateCredit(float credit){

if credit < 0.0

credit = 0.0;

}

Explanation:

I am going to write a C function for this.

The input is your credit value, and it has just a conditional to verify if it is not negative.

void updateCredit(float credit){

if credit < 0.0

credit = 0.0;

}

In a database, data is stored in spreadsheets which have rows and columns.

A.

True

B.

False

Answers

The answer is A. True.
Final answer:

A spreadsheet is a collection of data organized into rows and columns. However, it has limitations compared to relational databases in terms of data organization and accessibility.

Explanation:

A spreadsheet is a collection of data that is organized into rows and columns. Each column represents a field or attribute, while each row represents a record or data instance. While spreadsheets can function as a type of database, they have limitations in terms of data organization and accessibility compared to relational databases which use a tabular structure and allow for easier reorganization and access of data.

A ____________________ can be used to hierarchically represent a classification for a given set of objects or documents. A. taxonomy B. framework C. scheme D. standard

Answers

Answer:

A. taxonomy

Explanation:

A taxonomy can be used to hierarchically represent a classification for a given set of objects or documents.

One lap around a standard high-school running track is exactly 0.25 miles. Write a program that takes a number of miles as input, and outputs the number of laps. Output each floating-point value with two digits after the decimal point, which can be achieved as follows: System.out.printf("%.2f", yourValue); Ex: If the input is:

Answers

Answer:

import java.util.Scanner;

public class Miles {

public static void main(String[] args) {

   //initialization

       double Number_Miles;

       //print the message

       System.out.print("Enter the number of miles: ");

       Scanner scn1 = new Scanner(System.in);

       

       Number_Miles = scn1.nextDouble();  //read the input from user

       //calculate the laps

       double yourValue = Number_Miles/0.25;

       //display the output on the screen

       System.out.printf("%.2f", yourValue);

     

}

}  

Explanation:

First import the library Scanner than create the class and define the main function. In the main function, declare the variables.

print the message on the screen and then store the value enter by the user into the variable.

Scanner is a class that is used for reading the output. So, we make the object of the class Scanner and then object call the function nextDouble() which reads the input and store in the variable.

After that, calculate the number of laps by dividing the number of miles with the given one lap running track value (0.25 miles).

[tex]Number\,of\,laps = \frac{Number\,of\,miles}{0.25}[/tex]

the output is stored in the variable.

After that, print the value on the screen with 2 digits after the decimal point.

we can use "%.2f" in the printing function in java.

like System.out.printf("%.2f", output);

Answer:

def miles_to_laps(miles):

  return miles / 0.25

miles = 5.2

num_of_lap = miles_to_laps(miles)

print("Number of laps for %0.2f miles is %0.2f lap(s)" % (miles, num_of_lap))

Explanation:

True / False
Some versions of the Von Neumann model include the stored program concept, but not all of them.

Answers

Answer: True

Explanation:

The Von Neumann model is based on the concept of stored program where both of the program and instruction data are stored in the same electronic memory. Though it is still used in many models but due to the Von Neumann bottleneck we have the introduction of the secondary memory.

. Frequency band in which 99% of the total power resides iscalled _________

a. Power bandwidth

b. half power bandwidth

c. 3dB bandwidth

d. 4dB bandwidth

Answers

Answer:

Frequency band in which 99% of the total power resides iscalled Power bandwidth-a.

What is the role of a Chief Information Officier in anorganization?

Answers

Answer and Explanation:

There are several roles of a Chief Information Officer in any organization and these are as follows:

He must fulfill his responsibility as a business leader.He must be able to make executive decisions regarding sales and purchase related matters. He must be able to deal with all the Information Technology related problems.He must be able to recruit the best candidates in the best interest of the organization.He is required to map out the ICT policy(includes procurement, external and internal standards of an organization, future proofing) and ICT strategy.He must be able to write up ICT policy  with detail of its utilization and application.He must possess organizational skills

What are the advantages and disadvantage of integers and floating numbers?

Answers

Answer:

Explanation:

Advantages of int and disadvantages of float are as following :-

1.Arithmetic operation on int variables are much faster than float variables.

2.int variables does not suffer from precision loss while float variable sometimes suffer from it.

Advantages of float variables and disadvantages of int variables are as following:

1.float variables can represent values between integers.While integers cannot do that.

2.Float can represent much greater range of values than integers.

Give brief comparison of Broadcast, Unicastand Multicast?

Answers

Answer:

In broadcast the message is transmitted from one to all , in uni cast we have one to one transmission and in multicast we have transmission from one to many.

Explanation:

If we take the example of a simple messaging application it will be clear. If a message is exchanged between one person to another, then it is uni casting. If a person sends a message to all the persons in his contact list then it is broadcasting and  if a person sends messages to select persons in his contact list then it is multi casting. In multi casting management of the group is required regarding who can receive messages which is not required in broadcasting.

: Differentiate between serial and parallel data transfer withat least one example of each from computer sciencedomain.

Answers

Answer:

In serial communication transfers one bit of data at a time, while parallel communication transfers many bits of data at the same time. Serial communication transmits the data bits sequentially, while parallel communication transmits data bits simultaneously, allowing greater amounts of data to be transferred.

-Serial communication is the one used to communicate the Arduino with the Computer through the USB cable.

-An example of a parallel port is the printer port. The Parallel Port was only created and used in the printers interface and the computers.

Explanation:

In serial communication, each bit is sent by its own clock flank where conditions are defined after each byte, if it is synchronous or asynchronous. In parallel communication there is only one single clock flank where the information is sent where it is an advantage to use it where there are several input or output data.

I hope it's help you.

Write difference in the form of a table between Ping and TraceRoute command?

Answers

Explanation:

Ping

A network utility which is mainly used to test the connection between two devices or nodes. Ping is used to test the connectivity of a network and its name resolution.Syntax: ping <ip address>

TraceRoute

A network utility which is mainly used to track the path followed by a packet within a network from the source to the destination.It helps to trace the exact pathway of the data packet from the source to the destination.Syntax: tracert <ip address>

 

 

What are fields? Instance variables? object? methods?

Answers

Answer:

Explained

Explanation:

Fields: Fields represent data and should be a noun. It should begin with a lower case letter.

Instance variable: it is a variable defined in class but outside the constructor and the method. instance variables are created when an object is instantiated.

Object: An object is the basic unit of object oriented programming language.and represents the real life entities. An object consists of state behavior and properties.

Method: Method in a collection of statements that perform some specific task and return the result to the caller.

define the role of cache memory in computers.

Answers

Answer:

Cache memory is relatively small in size as compared to the main memory. The cache memory stores programs, variables which are frequently used by the processor.

Explanation:

The cache memory is placed very close to the processor so that the programs and variables can be accessed very quickly as and when required by the processor. The size of the cache memory is small and also cost more. There is also a secondary cache in many systems which enables to store more programs which cannot be store in the primary cache.

Write a program that prompts the user to enter the number of students and each student's name and score, and finally displays the student with the highest score and the student with the second highest score.

Answers

Answer:

  see attachment

Explanation:

You have not specified the language, or the details of the I/O form or prompts. Here is a program that does that, written in Wolfram language (the language of Mathematica).

It prompts separately for student name and student score. The minimum score is presumed to be higher than -99999. If only one student name is entered, the second output is that score with no name listed. There is no error checking.

We have elected to keep a list only of the two two scores, and to sort that list again each time a new entry is made.

__

The attachment shows the output of the program below the program listing.

What is the advantages and disadvantagesof International Standards for NetworkProtocols.

Answers

Answer:

Advantages and disadvantages of international standards for network protocols are:

Advantages -

Due to common underlying standard maintenance and installation become easy. Many computers can connect together from all the worldwide, as they are using the international standard for network protocol. One of the main advantage using international standard as it boost up growth and economy.

Disadvantages -

Every network standard has its own limitations in a particular domain. Once it is spread worldwide then it is difficult to resolve network issues.

.The operation signature has all the following except:
A.name of the operation B.object accepts C.algorithm ituses D.value returned by the operation

Answers

Answer: C) algorithm it uses

Explanation: The operation signature has the name of operation ,objects that it accepts and the value returned by the operation but it does not have algorithm that it uses.As algorithm defines all the steps that are to be used to find the result so signature operation does not include the whole algorithm that is to be used. The signature operation verifies the steps of the algorithm in way.

A database is called "self-describing" because it contains a description of itself.

A.

True

B.

False

Answers

Answer:

true

Explanation:

What is one property of a good hash code?

Answers

Answer:- Major property of a good hash code is that objects which are equal should return the same hash code .

Explanation: Hash codes is a numeric value which  is used for identify a object while a equality testing .Hash code can occupy the value of any length and then returns a fixed length value. The value of hash codes are variable.

If two objects are equal then by the method of equal(object) if the hashcode() function is called on both the objects , they produce the same value.

In ________ for final fields and methods the value is assignedlater but in ______ you assign the value during declaration.
Java , C++
C++ , C#
Java , C#
C++ ,Java

Answers

Answer:

The answer to this question is Java,C++.

Explanation:

We can assign non static final variables a value with the declaration or in the constructor but this is not the case with c++ because we have to assign value during declaration and c++ equivalent of final is const keyword and there is sealed or readonly keywords in c# not final.If we do not assign value at the time of declaration the const variable will contain garbage value which cannot be changed afterwards.

Answer:

The answer to this question is Java,C++.

Explanation:

We can assign non static final variables a value with the declaration or in the constructor but this is not the case with c++ because we have to assign value during declaration and c++ equivalent of final is const keyword and there is sealed or readonly keywords in c# not final.If we do not assign value at the time of declaration the const variable will contain garbage value which cannot be changed afterwards.

What are .Classification for computer softwares?

Answers

Answer: Classification of computer software are:-

System softwareApplication software

Explanation:

System software-it is the type of software that takes input from other  device ans sources and then covert it into machine language that is understood by the operating software.E.g.-UNIX Application software- it is the software that is connected with the end user through application present on the operating system which is accessed directly by the user. E.g.-Internet Explorer

Programs that are embedded in a Web page are called Java ____.

a.
consoles

b.
windowed applications

c.
applications

d.
applets

1 points

Answers

Answer:

applets

Explanation:

Java applets are dynamic programs that can be embedded on a webpage and run on a web browser like internet explorer,firefox or google chrome. The code for applets is developed using java programming language and facilitates interesting and complex display entities to be included as part of the web page. HTML provides a special tag called <Applet> for providing details of the applet.

Explain the purpose (using only two sentence in each case) of eachof the following
components of UML

• Use case diagram
• Use case description
• Class diagram
• Sequence diagram
• Business or Domain model

Answers

Answer:

UML - Unified Model Language

Explanation:

Use case diagram:

A use case diagram is used to tell how many ways a   user can interact with  a system. We use special   symbols and connectors to build use case   diagrams.  

We use  horizontal shaped ovals to represent use   cases, stick figures to represent actors, lines to   represent associations between use cases and  

actors, packages to put elements into  groups.  

Use case description:  

By the name itself, we can say that it is used to   describe the activities of user that  he can do with   the system and how the system responds to those.  Before use case diagram created, we need to write   a use case description.  

Class diagram:  

UML diagrams are of two types. They are,  

Structural UML diagrams Behavioral UML diagrams

A class diagram comes under Structural UML   diagrams.

Classes are building blocks of an application that   uses OOPs concepts. Class diagrams are used to   represent classes, relationships, association,  

interface.  

Sequence diagram:  

A sequence diagram comes under  Behavioral UML   diagrams.It is used to tell the sequential order of   objects' interaction.We have many notations in this   diagram like actors, lifeline, create message, delete   message, lost message, found message etc. It is   used to tell how messages move between objects in   a system.  

Domain model :  

A domain model is a visual representation of real-  situation objects. In UML,  the Domain Model is   illustrated with a set of class diagrams

Other Questions
find the perimeter of the triangle to the nearest unit with vertices A(-2,4) B(-2,-2) and C(4,-2) What were the three lasting contributions of the ancient Phoenicians A: Advanced shipbuilding techniquesB: direct democracyC: written alphabet D: theory of heliocentricismE: deep-sea navigation methods How does the electrostatic force compare with the strong nuclear force in the nucleus of an atom?A) The electrostatic force acts over short distances and is weaker.B) The electrostatic force acts over long distances and is stronger.C) The electrostatic force is only repulsive and acts over shorter distances.D) The electrostatic force is only repulsive and acts over longer distances. What is the pH of 0.001 mol dm-3 solution of sodium hydroxide Of the following sets, which numbers in {1, 2, 3, 4, 5} make the inequality 3x + 1 > 4 true? {1, 2} {1, 2, 3} {1, 2, 3, 4, 5} {2, 3, 4, 5} Calculate the vapor pressure at 25 C of an aqueous solution that is 5.50% NaCl by mass. (Assume complete dissociation of the solute.) Tro, Nivaldo J.. Chemistry (p. 617). Pearson Education. Kindle Edition. I need help with 12.51014 LWH NF3 has three F atoms bonded to a central N atom, with one lone electronpair on the N. What is the shape of this molecule?OA. TetrahedralOB. Trigonal planarOC. BentOD. Trigonal pyramidal A male patient presents with the following respiratory volumes and capacities: TV = 500 mL, ERV-600 mL, IRV 2,700 mL. What is this patient's VC? Are these values normal? If not, are they more consistent with an obstructive or restrictive disease pattern? Explain. Find a vector equation and parametric equations for the line. (Use the parameter t.) The line through the point (0, 11, 8) and parallel to the line x = 1 + 4t, y = 6 4t, z = 3 + 6t How did the Peace of Utrecht resolve the problem of succession to the Spanish throne? The leader of the Spanish House of Alva was placed on the throne by the nobility on offering guarantees that he would protect noble rights. The monarchy was abolished and Spain declared a republic. The German Habsburg Duke of Austria was placed on the throne after the death of his cousin, the Spanish Habsburg Charles II. Louis XIV of France's grandson, Philip, was placed on the French throne with the agreement that the French and Spanish thrones would never be united. Write a program to display a message telling the educational level of a student based on their number of years of school. The user should enter a number indicating the number of years of school, and the program should then print the corresponding message given below. Be sure to use named constants rather than any numbers other than 0 in this program. How are photosynthesis and cellular respiration related? (A)They are both ways of forming glucose molecules. (B) One forms glucose and the other breaks it down (C)They are both used during fermentation (D)Both processes require an input of sunlight HELP! What is the solution set of |2x + 1| > 5?A {x|1 < x < 3}B {x|1 < x < 3}C {x|x > 2 or x < 3}D {x|x < 2 or x > 3} If you are performing an activity close to the ground, you are performing at a ______ level Sulfur dioxide and oxygen react to form sulfur trioxide during one of the key steps in sulfuric acid synthesis. An industrial chemist studying this reaction fills a 25.0L tank with 4.5 mol of sulfur dioxide gas and 4.5 mol of oxygen gas at 30.C. He then raises the temperature, and when the mixture has come to equilibrium measures the amount of sulfur trioxide gas to be 1.4 mol. Calculate the concentration equilibrium constant for the reaction of sulfur dioxide and oxygen at the final temperature of the mixture. Round your answer to 2 significant digits. What is one example of how globalization can weaken local cultures? Read the excerpt from chapter 23 of The Adventures of Huckleberry Finn. What we want is to go out of here quiet, and talk this show up, and sell the rest of the town! Then we'll all be in the same boat. Ain't that sensible?" ("You bet it is!the jedge is right!" everybody sings out.) What is ironic about the judge's statement?A. Rather than admit they have been fooled, the townspeople truly believe it is more sensible to devise a plan to fool the others as well.B. Despite the fact they themselves have been fooled, the townspeople trick themselves into thinking it will be easy to fool the others.C. Although the show was truly funny, the townspeople are still petrified of what others will say about the fact they attended the show.D. In spite of the fact the townspeople claim to be embarrassed about attending the show, they actually enjoyed themselves immensely. An electron with kinetic energy 2.9 keV moving along the positive direction of an x axis enters a region in which a uniform electric field of magnitude 7.5 kV/m is in the negative direction of the y axis. A uniform magnetic field is to be set up to keep the electron moving along the xaxis, and the direction of the field is to be chosen to minimize the required magnitude of the field. What is the magnitude of the magnetic field in mT? PLZ HELP WILL GIVE BRAINLIEST!!!Type the correct answer in each BLANK. The line of best fit represents the number of miles Jean covered at different speeds during a trip. If the speed is represented by x and the distance covered is represented by y, the equation of the best line of fit is y =(BLANK) . She covered about (BLANK) miles at the speed of 50 miles per hour.