Answer: E) The CPU executes the instruction by performing ALU operations.
Explanation: The execution cycle is of three stages namely; fetch, decode and execute. These are the functions that the CPU carries out from the time of boot-up up until it's shut down.
At the fetch stage, the computer retrieves program instructions from its memory register, at the decode stage; the decoders interprets the instructions from the instructions register and then the next stage will be the executions, at this stage; the interpreted instructions are then passed to relevant function units of the CPU to carry out the required instructions.
E.g mathematical and logic functions are passed on the ARITHMETIC AND LOGIC UNIT(ALU) to perform.
Answer:
five types of pointing devices
Explanation:
Ponting devices
Pointing means point something and the pointing devices are the input /peripheral devices those are used to point the pointer on the screen. We do move cursor on the screen to open the files or any icon.
There are many types of pointing devices but these are quite common which are given below
- Computer mouse
- Finger on touch screen.
- Joystick.
- Leap Motion.
- Light pen (pen)
1.Mouse
Mouse is most common type of input device that is used for pointing the data on the screen. We press it with our hands and keep pointing the things.
There are three types of mouse
- optical mouse
- wireless mouse
- trackball mouse.
2. Finger on touch screen
In this type of movement the fingers are input devices those we use to see the movement of pointer on the screen and this is most common in this century.
3.Joystick.
Joystick is another input device to point the cursor but it is mostly used in games. Children can use it smartly so it is inculcated in games usually.
4. Leap Motion
The Leap Motion (LM) controller is a latest 3D sensing device for hand posture interaction with a computer. It is having the capability sense the location of the fingers of the hands, as well as the palm position.
5.Light Pen
this is another pointing device which is mostly used to highlight and select the data on the screen.
Note: All of these above pointing devices are most common used now a days. These devices are having new conventions day by day for the ease of user. This era is basically the era of IT ,so the use of computer must be so easy and conventional for the user so, the innovations and improvement in such devices is made side by side.
Since the ARP broadcast is utilized to request the MAC address of the Host with the IP address contained in the ARP, the PC needs to know the destination of MAC address before it can produce the frame header for the particular PING requested, before it can send a PING to a host.
Answer:
The Packets can be arrived out of an order from the Internet Protocol layer.
So, whenever the out of an order packets would be received then, it would be generated the duplicate ACK's, if we perform the re-transmission after the first duplicate ACK would be lead the senders to introduced too many redundant packets in the networks.
Explanation:
- All the bytes, in the Transmission Control Protocol connections, are the numbered, from the beginning at the randomly choose the initial sequence number (ISN).
- The SYN packets consumes the one sequence number, so the data will be actual and it begins at the ISN+1.
- The receivers ack's sequences the number x acknowledged the receipts of all the data bytes that is less than byte the number x.
Answer:
Explanation:
There are two main practices that Luis needs to make into a habit of doing every time he sends an e-mail, these are
- Being careful when using the Reply to All feature.
- Double-checking the Cc and Bcc fields.
Taking into account both of these practices will make sure that Luis is sending the written e-mail to the correct individual's address and also making sure that he is not sending the e-mail to any other individual by accident when using the Reply to All feature.