Enumerate a couple of reasons why it would be impracticable for the external devices to be connected directly to the processor or the system bus

Answers

Answer 1

Answer:

(a) Difference in data transfer rates

(b) Difference in word lengths

(c) Different peripherals with different modes of operation

Explanation:

There are several reasons. Some of them have been listed in the explanation section. A brief explanation is as follows

(a) Difference in data transfer rates

Some peripherals have fast transfer rate while some have slow transfer rates compared to the processor they are being connected to. This difference in the rates implies that a high speed system bus will find it difficult to communicate with a (say) low speed peripheral.

(b) Difference in word lengths

Another consideration is the word lengths. Often times, peripherals and the bus they are being connected with will have a different word lengths.

(c) Different peripherals with different modes of operation

In computer architecture, a processor can not be used to interact with peripheral of different mode of operations. In other word, each peripheral have its own mode and will require different means of connection.


Related Questions

What is CPU
and it's functions

Answers

Answer:

CPU is considered as the brain of the computer. CPU performs all types of data processing operations. It stores data, intermediate results, and instructions (program). It controls the operation of all parts of the computer

Explanation:

hope it is helpful to you

True or False: The proze for winning the NHL champioship is called the
"James Norris Trophy."

True or False​

Answers

False it is the Stanley cup

9.6 Code Practice
Instructions
1
Declare a 4x 5 array called N

Please helppp

Answers

Answer:

See Explanation

Explanation:

The question lacks so many details, as the array type and the programming language is not stated.

Assume that, it is Java:

The rule to follow is:

Data-Type[][]Array-Name = new Data-type[rows][columns]

If the given information is for an array of type integer, the code will be;

int[][] N = new int[4][5]

Where

N = Array-Name

int = Data-type

4 and 5 are the dimensions of the array

PLS HELP ME I NEED HELP WILL GIVE BRAINLIEST

Answers

1.His story is told here deep detailed history of the company’s you love coming in everyday.

2.The contribution was the computer
Oct 4 1903-June 15 1995

When entering information for a new contact in the address book, Outlook will automatically create a _____. A. Invitation B. Response email C. Business card D. Calender

Answers

D:calendar is it i think

The numeric keys on a keyboard or calculator are referred to as a:
o Ten keypad
o Number keypad
o Keypad
o Number and symbols keypad

Answers

Answer:

Ten keypad

Explanation:

I did it

solve each ratio 35:7​

Answers

Answer:

5:1

Explanation:

Divide each side by 7

What is the difference between PowerPoint and Outlook?

PowerPoint is a presentation program; Outlook is a personal information management application.
Outlook is a presentation program; PowerPoint is a personal information management application.
PowerPoint is a program that lets you create, edit, format, and print written documents; Outlook is a computer application that uses a grid system to organize and manipulate data.
Outlook is a program that lets you create, edit, format, and print written documents; PowerPoint is a computer application that uses a grid system to organize and manipulate data.

Answers

Answer:

PowerPoint is a presentation program; Outlook is a personal information management application.

Explanation:

Powerpoint is the program used in presentations where slides designed and then shown to the audience.

Outlook is used to display various types of personal information like calendar appointments and emails.

What is an example of a composite key in a database table?

InvoiceID
CustomerID
ProductID
OrderID + ProductID

Answers

Answer:

b

Explanation:

OrderID + ProductID is an example of a composite key in a database table. The correct option is 4.

What is composite key?

A composite key is a key in a database table that consists of two or more columns that uniquely identify each row.

In a database table, a composite key is the combination of OrderID and ProductID in a table that tracks sales transactions.

Because a single order can contain multiple products and multiple orders can contain the same product, neither column can uniquely identify a row by itself.

However, by combining the two columns, each row can be uniquely identified, ensuring that the data is accurate and complete.

Similarly, a combination of CustomerID and ProductID might be used in a sales system to track the products purchased by each customer.

Thus, the correct option is 4.

For more details regarding composite key, visit:

https://brainly.com/question/10167757

#SPJ3

Describe the home keys

Answers

The home keys are where you place your fingers when you are learning to type. The home keys include F, D, S, and A on the left of the keyboard, and J, K, L, and ; (semicolon) on the right of the keyboard.
The home row keys are the row of keys on the computer keyboard you’re fingers rest on when not typing.

Select all statements below that are TRUE for For...Next loops. A. It is used for a fixed number of iterations. B. It is used for a variable number of iterations. C. It uses an integer counter; not a loop condition. D. It uses a loop condition; not an integer counter. E. Only consider this option if you checked alternative D above: It checks the loop condition a the BEGINNING of the loop, F. Only consider this option if you checked alternative D above: It checks the loop condition a the END of the loop,

Answers

Answer:

A and C

Explanation:

The for next loop is used for a fixed number of iterations which is usually indicated in the syntax. It uses a counter that increments on each iteration. The loop terminates when the counter reaches the number of initially specified iterations. It is different from a while loop which depends on a specified condition evaluating to the Boolean 'true'.

You use a Windows system that is a member of a domain. The computer is used by several different users belonging to different groups. You have a custom application on the computer, and you want to configure the firewall as follows: Allow a specific port used by the application. Open the port only for members of the Sales group. Using Windows Firewall with Advanced Security, what should you do to configure the firewall with the least effort possible

Answers

Answer:

Explanation:

Windows Firewall with Advanced Security (WFAS) is a management tool in windows which allows for precise confiuration and control of the Windows Firewall System. It allows for certain rules to be created and modified which dictate to the firewall how it must run.

The easiest way to configure the WFAS to achieve the goal stated in the question is to open the app and use the New Rule function.

To do this, one must:

Calling up the Windows Firewall with Advanced Security (WFAS) Click on the inbound rules on the top left corner of the interfaceRight clickon the rule and modify accordingly

Cheers

What are three examples of information technologies you use in your everyday life? Which do you consider to be the most important to you on a daily basis and why?

Answers

Although IT is crucial to many other daily tasks, other examples of IT systems include the internet, mobile phone networks, broadcast radio and TV systems.

What information technologies use in your everyday life?

Information technology has made it possible for people to connect with one another more quickly, simply, and affordably than ever before. Texting and making video calls are so easy these days. There are numerous apps available online that provide these services.

Therefore, radio and phone equipment for video conferencing. Individual computers, For handling goal-setting and performance reviews, use performance management software.

Learn more about information technologies here:

https://brainly.com/question/14426682

#SPJ1

For enterprise servers, or servers accessed around the clock, SATA disks are preferred over SAS disks. True or False

Answers

False, sas is hold more then sata disks do

The given statement is false that, SAS disks are preferable over SATA disks for business systems or servers accessed continuously.

What is the SATA disks?

The majority of desktop and laptop hard drives use the SATA (or Serial Advanced Technology Attachment) interface, which was first introduced in 2003. Despite being rotary hard drives with spinning platters and a moving needle that writes data to successive sectors on each platter, they are known as SATA hard drives.

Serial ATA (Serial Advanced Technology Attachment, or SATA) is a command and transport protocol that outlines how data is transferred between a computer's motherboard and these types of mass storage devices (SSDs).

Therefore, it is false.

Learn more about the SAS disks, refer to:

https://brainly.com/question/28310028

#SPJ2

How does a filmmaker decide which events to include in a documentary?

Answers

Answer:

A documentary is a film based on facts in which the maker tries to portray an aspect of reality, such as politics, science, society or history, nature or the personal perception of the documentary maker.

Documentaries are informative in nature. Sometimes documentaries attempt to provide an objective picture of a subject. There is a lot of debate about what is objective, because the documentary maker chooses his images from reality, which is in itself a subjective act. In a creative author's documentary, the emphasis is on the subjective vision of the filmmaker.

Therefore, the documentary maker will select the events to include in the documentary according to the approach he or she wants to give to it, be it objective or subjective.

Jason is working on a Microsoft Excel worksheet and he wants to create a Print Preview shortcut. His teacher asks him to access the Customization option to create the new shortcut. Which two tabs should Jason select to place the Print Preview shortcut on the worksheet toolbar?

Answers

Answer:

New Tab (Custom) and New Group (Custom)

Explanation:

In order to accomplish this Jason needs to use New Tab (Custom) and New Group (Custom). The New Tab (Custom) will allow Jason to add a new tab with the Print Preview shortcut as a brand new tab in the software. Then using the New Group (Custom) tab, Jason can group the Print Preview shortcut with the worksheet toolbar so that it appears as part of the original toolbar with the rest of the tools available in the toolbar.

You have a small network at home that is connected to the internet. On your home network, you have a server with the IP address of 192.168.55.199/16. You have a single public address that is shared by all hosts on your private network. You want to configure the server as a web server and allow internet hosts to contact the server to browse a personal website. What should you use to allow access

Answers

Static NAT is the answer,. :) great question BTW!

what is the meaning of url

Answers

Answer:

it stands for Uniform Resource Locator.

Explanation:

Uniform Resource Locator: a location or address identifying where documents can be found on the internet.

You are an IT consultant. You are visiting a new client's site to become familiar with their network. As you walk around their facility, you note the following: When you enter the facility, a receptionist greets you and directs you down the hallway to the office manager's cubicle. The receptionist uses a notebook system that is secured to her desk with a cable lock. The office manager informs you that the organization's servers are kept in a locked closet. Only she has the key to the closet. When you arrive on site, you will be required to get the key from her to access the closet. She informs you that server backups are configured to run each night. A rotation of external USB hard disks are used as the backup media. You notice that the organization's network switch is kept in an empty cubicle adjacent to the office manager's workspace. You notice that a router/firewall/content filter all-in-one device has been implemented in the server closet to protect the internal network from external attacks. Which security-related recommendations should you make to this client

Answers

Answer: • Control access to the work area with locking doors and card readers.

• Relocate the switch to the locked server closet

Explanation:

Based on the information given, the security-related recommendations that should be made to this client include:

• Relocate the switch to the locked server closet: Since the organization's network switch is kept in an empty cubicle that is adjacent to the office manager's workspace, it can be easily accessible by anyone and this could lead to an external attack. Therefore, it should be moved to the locked server closet to prevent external attack.

• Control access to the work area with locking doors and card readers- Thus us necessary so that the work area won't be accessible to just anybody.

Choose the tag required for each stated goal.

To style text as larger than adjacent text:








To style text as bold:








To style text as italicized:








To style text as small:

Answers

capslockbolditalicscapslock

Ellie is conducting formal research for a new design project and wants to find demographic information. What source is considered most credible to use for her research?

Wikipedia articles

competitor websites

government data

magazine opinion pieces

Answers

may be wikipedia i’m sorry if it’s wrong ☹️

Answer:

Its governmental data

Explanation:

List four things that must be taken into consideration when evaluating different resources of information (and explain ANY ONE from the list)​

Answers

Answer:

objectivitycurrencyaccuracyauthority

Explanation:

authority:is important to know if the information provided is reliable or not.

What file format is best to give a printer when working with Adobe InDesign?


GIF

TIFF

HTML

IDML

Answers

Answer:

TIFF

Explanation:

GIFs are animated image files, and printers can't print animations

TIFFs are basically image files

HTML is a coding file, you were to print it, it would print the HTML text of the image

IDML is an XML representation of an InDesign document or components, if you were to print it, its outcome would be basically the same as printing an HTML file.

Brenda has created a Microsoft Excel spreadsheet which has 1000's of cells of data. She is looking for specific information in the file. Which shortcut can Brenda use to find this information quickly?

Answers

Brenda should use the Ctr+F shortcut to quickly find a specific information in the spreadsheet file.

You are a part-time manager for The Mobile Vegan, a food truck catering to vegan diners in Portland, Oregon. Jessica Rosen, the owner of the business, wants to expand by adding other food trucks in Portland and the surrounding area. Whether she purchases new trucks or takes over an existing food truck business with an established clientele, she needs a loan to cover the cost of the trucks. She has asked for your help updating the workbook she created to analyze the loan information and forecast sales. Switch to the Loan Scenarios worksheet, and then calculate the monthly payment for the Add 1 Truck scenario as follows:
a. In cell D11, enter a formula using the PMT function to calculate the monthly payment for a loan.
b. Use the inputs listed under the Add 1 Truck loan scenario in cells D5, D7, and D9. (Hint: The result will be displayed as a negative number to reflect the negative cash flow of a loan payment.)

Answers

Answer:

i acc dont know

Explanation:

srry

Write a program that will have Tracy draw a stretched out slinky. The slinky should have: Five rings Each circle should have a radius of 35 Tracy should move forward 40 pixels after every circle

Answers

Solution :

The Tracy commands :

main.py

   circle(35)

   forward(40)

   circle(35)

   forward(40)

   circle(35)

   forward(40)

   circle(35)

   forward(40)

   circle(35)

   forward(40)

A cheetah has a mass of 50kg and can accelerate at 10 m/s2. This is equal to 500 Newtons which is the force the cheetah creates to run. Let's calculate how much work the cheetah does and how much power it generates when it runs 50 meters in 3 seconds.

Step 1: Determine how much work is done (measured in joules).

Multiply the force by the distance 500N×50meters= _______ joules



Step 2: Determine the power (measured in Watts).

Divide the work by the time it took to do the work 25,000joules÷3s.= _______ watts

Answers

Answer:

often, work done= Force<<* distance

so work done=500N * 50m

work done=25000J

also, Power=work done/Time taken

Power=25000J/3sec

Power=8333.333.....

For what purpose is IT used in business?

Answers

Answer:

manufacturing

improving

customer care

transportation

human resource management

Explanation:

business communication use technology to improve their services or products as a way of gaining competitive advantage.

please help me with computing!
the question is:
solve the following algorithm in pseudocode "the algorithm is required to prepare a teacher's payroll. For them, the hours worked and the price per hour are taken into account. place the input data and the output data.​

Answers

Answer:

ok i help

Explanation:

Ivan has five workbooks open. he has arranged these files in a specific grouping so he can view them at the same time. In order to save these files i this specific order, ivan must create a----​

Answers

i think the answer is
folder.
Other Questions
In what ways did black Americans experience society differently during this time? help meeeeeeee pleaasseeeeeee. Also I need work Madeline deposited $750 into an investment account that earns 1.5% interest compounded annually. If no deposits nor withdrawals are made, how much in dollars will be in the account after 15 years?A $1,687.50B $937.67C $918.75D $870.40 Read the excerpts from Queen Elizabeth's speeches. Excerpts from Queen Elizabeth I speeches. The first is from her Address to the Troops at Tilbury. The second is from her Response to Parliament's Request That She Marry. How does the rhetorical appeal used in these excerpts from Queen Elizabeth's Address to the Troops at Tilbury and Response to Parliament's Request That She Marry compare? Both use an appeal to logos by providing a reason to support her purpose. Both use an appeal to ethos by providing a reason why she should be trusted. Both use an appeal to logos by encouraging her audience to show strength. Both use an appeal to ethos by listing credentials to support her credibility. If the height of the box is 7 inches, the volume of the box will be [1] cubic inches. A box is shaped like an octagonal prism. Here is what the base of the prism looks like. Explain the importance of your family as a role model forfuture relationships. Suppose a 16-sided die was rolled. Fill in the information [6 mks]a. The probability of rolling a number greater than but not equal to 10 is _______ as a fraction, as a ratio _______ and as a percentage ____________b. The odds in favour of rolling an even number less than or equal to 7 are ____ : ____ whereas the odds against rolling an even number less than or equal to 7 are ____ : ____c. What are the odds in favour of rolling a number less than 5? ____ : ____ Read the following sentence:I found this tie, and it looks fancy.Which synonym for the underlined word would most clearly make thissentence a criticism of the tie?A. LavishB. ElaborateC. GaudyD. Opulent Translate He isn't as smart as they are into Spanish by filling in the missing letters: _ n_ __ tan _nteli_e_te co_o _llos Classify each statement as a property of ethers, alcohols, or both ethers and alcohols?1. These compounds form hydrogen bonds between themselves and with other compounds containing an O-H, N-H, or F-H bond, such as water.2. These compounds are water soluble if they have fewer than four carbon atoms.3. When comparing ethers and alcohols of similar molecular weights, these compounds have the lower boiling point. 3) Consider the function f defined byf(x) = (3 - x)(4 + 3x). At what point doesthe curve y=f(x) intersect the y-axis? One of the themes that emerges over the course of this novel is that war is brutal and awful. How does the depiction of Henry's mother in this excerpt begin to establish or develop that theme? The graph below shows how the monthly rent for an apartment changed over time When do we use the coordinating conjunction NOR? Question 1(Multiple Choice Worth 2 points) (09.03 LC) Fairy tales typically use ________ as characters. gods and goddesses historical figures ordinary people royalty and magical creatures The magnitude of the gravitational acceleration at the surface of a planet of mass M and radius R is g. What is the magnitude of the gravitational acceleration at the surface of a planet of mass 2M and radius 2R? The pros and cons of new product concepts are analyzed during the idea generation phase of new product development.TrueFalse Which is a notable fact about the Clinton presidency? Uplift and weathering are two of the processes that shape the features of the Earth. How are they different and how are they similar? Which of the following is considered a risk of driving?A. Spending too much on gasB. Getting lostC. Causing damage