Skip to content

Category Archives: Computer Organization & Architecture

Pre-Requisite: Advanced RISC Machine (ARM) Processor Advanced RISC Machine (ARM) Processor is considered to be a family of Central Processing Units that are used in… Read More
Smart Objects: Smart Object is an object that enhances interplay with not solely humans however also with different smart objects. Also recognized as smart connected… Read More
RAM and SRAM both are types of memories that are present inside a computer. They are a type of volatile memory that are present in… Read More
A computer system is a basic and functional computer which includes all the hardwares and softwares which are required to make it functional for the… Read More
Advanced RISC Machine (ARM) Processor is defined as family of CPUs that have wide usage in electronic devices such as smartphones, wearable, tablets and multimedia… Read More
Component Object Model (COM) object life-cycle process is technique of useful resource upkeep and component interplay carried out by means of Component Object Model (COM).… Read More
Introduction : Thompson Shell, also known as sh, was the first Unix shell created by Ken Thompson in the early 1970s. It was designed to… Read More
1. DVD-R : DVD-R, abbreviated to Digital Versatile Disc Recordable, is a common recordable DVD format that looks just like a regular DVD, but it… Read More
We know that there is handshaking between device driver and device controller but here question is that how operating system connects application request or we… Read More
The user has a memory machine. It has one layer for data storage and another layer for the cache. The user has stored an array… Read More
1. Raspberry Pi : Raspberry Pi is a lower-priced mini-computer with the physical dimension of a credit card. It runs more than a few flavors… Read More
1. Laptop: The laptop is a modern computer and an alternative to the desktop computer. Laptops are portable and have the same power as desktop… Read More
A Subscriber Identity Module (SIM) card is inserted into a mobile phone. The SIM card is used to uniquely identify a user of a network.… Read More
Subscriber Identity Module or SIM cards were commercially available in 1991 by a company called Giesecke & Devrient. They are used to store personal information… Read More
1. Double Data Rate version 5 (DDR5) : DDR5 stands for Double Data Rate 5 Synchronous Dynamic Random-Access Memory (DDR5 SDRAM). DDR5 or GDDR5 has… Read More