Skip to main content

Popular posts from this blog

CISC VS RISC computers (all details)

CISC Introduction            The term "CISC" (complex instruction set computer or computing) refers to computers designed with a full set of computer instructions that were intended to provide needed capabilities in the most efficient way. Intel's   Pentium   microprocessors are CISC microprocessors. CISC is a   processor design   where single   instructions   can execute several low-level operations (such as a load from   memory , an arithmetic   operation , and a   memory store ) or are capable of multi-step operations or   addressing modes   within single instructions. The primary goal of CISC architecture is to complete a task in as few lines of assembly as possible. This is achieved by building processor hardware that is capable of understanding & executing a series of operations, this is where our CISC architecture introduced. The CISC approach attempts to minimize the number of instructions per program, sacrificing

DHCP principle , DHCP server and client communication process

1. Explain with principle: the DHCP server and client communication process DHCP stands for Dynamic Host Configuration Protocol. It handles the automatic assignment of IP addresses and other configuration settings for devices on your network. DHCP automates Network and Sharing Center in your control panel. This is especially good for people who have laptops, aren't hooked up to the Internet all the time and often move from place to place with their portable devices. They can simply get a new IP address as needed without having to do it manually. DHCP is designed to make the assignment of IP addresses and other network configuration information faster and easier. DHCP is a protocol that uses Level 4 on the OSI model. It communicates using User Datagram Protocol (UDP) datagrams through UDP Port 68. DHCP works with most current and past Windows clients, and also Linux, Macintosh, and many network-capable printers. DHCP is desi

Recommendation System literature review | Building a recommendation system

People have always relied on the recommendations from their peers or the advice of experts to support their decision making. Amazon.com has been using collaborative filtering for a decade to recommend products to their customers, and Netflix valued improvements to the recommender technology underlying their movie rental service at $1M via the widely published Netflix Prize [6]. Research on recommender algorithms garnered significant attention in 2006 when Netflix launched the Netflix Prize to improve the state of movie recommendation. The objective of this competition was to build a recommender algorithm that could beat their internal CineMatch algorithm in offline tests by 10%. It sparked a flurry of activity, both in academia and amongst hobbyists. The $1 M prize demonstrates the value that vendors place on accurate recommendations [8]. Recommender Systems provide the users with the suggestions of information that may be useful to the users to make their decisions on various sit

what are Auxiliary Storage Devices ? (squential vs Random auxiliary storage)

             Auxiliary storage, secondary storage, or external storage are devices that store noncritical system data like documents, multimedia and programs, which are used whenever they are required.
These files are invoked from the auxiliary storage when needed and then transferred to the primary storage so that the CPU can process them.The results of the process can also be sent back to the auxiliary storage for later retrieval.These storage devices hold data and programs for future use and are considered nonvolatile storage that retains information even when power is not available.The best example of auxiliary storage is hard disk drives and optical storage media like CDs, DVDs, and Blue ray.Other auxiliary storage belongs to the peripheral devices category as well, such as flash drives and any type of memory card.ž Auxiliary storage devices can be categorized in two types based on data access.
 1.Sequential Access
 2.Random Access
Sequential Access:
        Data are accessed sequentially.
                Data access time is more as to read particular data all preceding data must be read.
                Involves lower number of seek operations.
        Delivers high rate of throughput.
                      E.g. magnetic  tapes
Random Access:
Data can be accessed randomly.
Data access time is less as data on any location can be accessed directly.
Delivers lower rate of throughput.
E.g. magnetic disks, optical disks




Comments