Last updated on August 29th, 2020 at 01:29 am Computer Threats: A threat, in general, is a person or a
Month: October 2016
What is malware? Describe any 5 types of computer malware with an example.
Last updated on August 29th, 2020 at 01:29 amMalware Malicious Software or Malware is any piece of software that disrupts
What are the 6 steps followed by CPU in computer to Execute an Instruction?
Last updated on December 12th, 2022 at 09:50 pmCPU (Central Processing Unit) CPU or central processing unit in computer is
What is Motherboard? What are the role or functions of motherboard?
Last updated on August 29th, 2020 at 01:30 amMotherboard: A motherboard is a printed circuit board (PCB) that holds other
Define Instruction Set Architecture. What are the main objectives of ISA in computer systems.
Last updated on August 29th, 2020 at 01:30 amInstruction Set Architecture (ISA): An instruction set is the interface between a
What are CISC & RISC? What are differences between CISC and RISC?
Last updated on August 29th, 2020 at 01:31 am The instruction set or the instruction set architecture (ISA) is the