1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
navik [9.2K]
3 years ago
15

Why I/O modules is needed between system busand I/O devices?​

Computers and Technology
1 answer:
beks73 [17]3 years ago
5 0

Answer:

1. Processor communication -- this involves the following tasks:

<em>a. exchange of data between processor and I/O module</em>

<em>b. command decoding - I/O module accepts commands sent from the processor. E.g., the I/O module for a disk drive may accept the following commands from the processor: READ SECTOR, WRITE SECTOR, SEEK track, etc. </em>

<em>c. status reporting – The device must be able to report its status to the processor, e.g., disk drive busy, ready etc. Status reporting may also involve reporting various errors. </em>

<em>d. Address recognition – Each I/O device has a unique address and the I/O module must recognize this address. </em>

<em />

2. Device communication – The I/O module must be able to perform device communication such as status reporting.

3. Control & timing – The I/O module must be able to co-ordinate the flow of data between the internal resources (such as processor, memory) and external devices.

4. Data buffering – This is necessary as there is a speed mismatch between speed of data transfer between processor and memory and external devices. Data coming from the main memory are sent to an I/O module in a rapid burst. The data is buffered in the I/O module and then sent to the peripheral device at its rate.

5. Error detection – The I/O module must also be able to detect errors and report them to the processor. These errors may be mechanical errors (such as paper jam in a printer), or changes in the bit pattern of transmitted data. A common way of detecting such errors is by using parity bits.

You might be interested in
According to Fourman, Informatics is _______________ with a very _____________ scope.
ANTONII [103]

Informatics is the science of information (Information science) with a very broad scope.


Informatics studies the representation, communication, and processing of information in artificial and natural systems. Technically, it is the focus of info and how it is represented in (includes paper, digital records, sounds and image), processed by (include human reasoning or digital computation), and communicated within a variety of systems through human communication and human computer interface.

Informatics has various aspects that encompass a number of existing academic disciplines like AI, cognitive science and computer science.  






3 0
4 years ago
Read 2 more answers
Describe a time when you influenced someone else’s knowledge around technology, whether it be an app, a new gadget, etc. What di
aalyn [17]

Answer:

I introduced my sister to a thrift app called “Jongo”

Explanation:

Describe a time when you influenced someone else’s knowledge around technology, whether it be an app, a new gadget, etc. What did you do? What was the outcome?

While growing up, my sister runs a monthly thrift in our small community, where she collects daily contribution from our neighbors. She does this manually by going around and collecting cash from them. In addition to the risk of cash handling, it was quite stressful and tasking.  

Considering all these, I had to introduce her to a mobile app called “Jongo”, it made the job look easy. All my sister had to do was  

1. Download the app for herself and the contributors  

2. Add them to a group which she created on the app

3. The contributors linked their debit cards to the app and granted access for their account to be debited daily

Due to the cumulative funds, interests was also been accrued daily, hence making it much more easy to do other things in addition to her thrift.  

5 0
3 years ago
Which of the following are examples of the concept of layered access in physical security? Select one: a. Firewall, IDS, CCTV b.
Tpy6a [65]

Answer:

b. Fences, gates, monitored doors

Explanation:

The best defense is a good defense. A good security system is reliable and will provide you with a criminal-deterrent protection, detect intrusions, and trigger appropriate incident responses. It involves the use of multiple layers  of interdependent systems like protective guards, locks, protective barriers, fences, and many other techniques.

4 0
3 years ago
Read 2 more answers
The data I collect in Google Forms are all compiled in a spreadsheet for me.<br> False <br> True
Mandarinka [93]
I think it's false. If I'm wrong then sorry.
5 0
3 years ago
Read 2 more answers
Question #4
Igoryamba

Answer:

The y-intercept is going to fall by -2 but the x-intercept will run +5

Explanation:

Becuase the derivative of the equation causes this when plugged into the formula

6 0
2 years ago
Other questions:
  • What process describes using technology as a basis for controlling the access and usage of sensitive data?
    7·1 answer
  • PLEASE HURRY
    6·1 answer
  • What important information is needed if you are installing an oem version of windows 7?
    6·1 answer
  • An investor is considering in which of two start-up companies to invest. The investor has faith in the industrial organization (
    9·2 answers
  • When I try to invite someone to be my friend on brainly, for some people, it says, "Somethings up. Invitation wasn't sent". Can
    8·1 answer
  • Charlie wants you to include the following topics in your presntation: an overview of project management and its hrity,a descrip
    15·1 answer
  • ASAP FAST PLSKara is currently creating a storyboard for her web site. Which step of the web design process is she in? Coding Pl
    9·2 answers
  • Which of these is an example of rebranding ?
    6·2 answers
  • What constructs break or bend the normal Syntax patterns of scheme?
    15·1 answer
  • If you have limited means, you...?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!