1
Q:

How do you detect if two 8-bit signals are same? 

Answer:



Q:

In blanking operation clearance is provided on

A) Punch B) Either on punch or die depending upon designer's choice
C) Die D) Half on the punch and half on the die
 
Answer & Explanation Answer: A) Punch

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Hardware
Exam Prep: AIEEE

2 1182
Q:

How many bits are in an IPV4 address?

A) 128 bits B) 64 bits
C) 32 bits D) 16 bits
 
Answer & Explanation Answer: C) 32 bits

Explanation:

IPV4 Internet Protocol Version 4 has 32 bits of address.

Report Error

View Answer Report Error Discuss

Filed Under: Hardware
Exam Prep: AIEEE , Bank Exams , CAT
Job Role: Analyst , Bank Clerk , Bank PO

3 1963
Q:

Which of the following is true of VoIP?

A) It uses the public switched telephone network. B) Skype is an example of VoIP software.
C) It uses a slow speed dial-up connection. D) All of the above
 
Answer & Explanation Answer: B) Skype is an example of VoIP software.

Explanation:

VOIP is an acronym for Voice Over Internet Protocol, or in more common terms phone service over the Internet.

 

Voice over Internet Protocol is a category of hardware and software that enables people to use the Internet as the transmission medium for telephone calls by sending voice data in packets using IP rather than by traditional circuit transmissions of the PSTN.

 

Here in the given options, Skype is the only voice service that enables us to talk over internet.

Report Error

View Answer Report Error Discuss

3 3586
Q:

What are the different hazards? How do you avoid them?

Answer

There are situations, called hazards, that prevent the next insturction in the instruction stream from executing during its designated clock cycle. hazards reduce the performance from the ideal speedup gained by pipelining.


There are three classes of Hazards:


1. Structural hazards: It arise from resource conficts when the hardware cannot support all possible combinations of instructions simultaniously in overlapped execution.


2. Data Hazards: It arise when an instruction depends on the results of previous instruction in a way that is exposed by the overlapping of instructions in the pipeline.


3.control hazards. it arise from the pipelining of branches and other instructions that chage the PC.

Report Error

View answer Workspace Report Error Discuss

Subject: Hardware

8 5032
Q:

What is MESI?

Answer

The MESI protocol is also known as illinois protocol due to its development the University of illinois at Urbana-Champaign and MESI is a widely used cache coherency and memory coherence protocol.


MESI is the most common which supports write-back cache. its use in personal computers became widespread with the introduction of intel's pentium processor to "support the more efficient write-back cache in addition to the write-through cache previously used by the Intel 486 processor"/

Report Error

View answer Workspace Report Error Discuss

Subject: Hardware

5 5956
Q:

What are the basic components in a Microprocessor?

Answer

1. Address lines to refer to the address of a block


2. Data lines for data transfer


3. IC chips


4. Processing data

Report Error

View answer Workspace Report Error Discuss

Subject: Hardware

1 3555
Q:

What does GUI stand for?

Answer

 


Graphical User Interface

Report Error

View answer Workspace Report Error Discuss

Subject: Hardware

1 3121
Q:

What does RSI stand for?

Answer

 


Repetitive Strain Injury

Report Error

View answer Workspace Report Error Discuss

Subject: Hardware

2 5754