Internal Memory
Semiconductor Memory Types. Memory Cell Operation. Dynamic and Static RAM. DRAM Operation. SRAM v DRAM. Read Only Memory (ROM). Organisation in detail. Interleaved Memory, Error Correction. Synchronous DRAM (SDRAM) and RAMBUS. DDR SDRAM Read Timing.
Подобные документы
Возможности, которые предоставляет класс istream. Замечания по поводу работы с некоторыми компиляторами языка С++. Считывание строки в буфер фиксированного размера с целью ее дальнейшего анализа. Анализ методов read, peek, gcount и putback класса istream.
статья, добавлен 17.07.2018- 52. Инструкции MSG
Инструкция связи и возможности инструкций MSG. Настройки MSG ("Local" Read and Remote Write). Структура блока управления MSG. Отличия инструкций MSG. Организация стеки и очереди. Инструкции сдвига, командо-аппараты. FBC и DDT. Структура блока управления.
презентация, добавлен 03.06.2012 A number of different techniques that people can use to hide information. The sound files and images that float about the network today. Measuring and encrypting information. Error correction and white noise. Analysis of hiding information in JPEG files.
книга, добавлен 08.03.2014Повышение отказоустойчивости ячейки статической памяти SRAM. Функционально полные толерантные элементы, обеспечивающие работоспособность в случаях отказов и сбоев соответствующих транзисторов. Моделирование стандартной ячейки статической памяти SRAM.
статья, добавлен 26.04.2019Quantum coherence and information processing. Expectation values and the von Neumann projection. Quantum relative and conditional entropies. Information and the foundations of physics. Application quantum coding, error detection, and correction.
книга, добавлен 08.03.2014История зарождения операционных систем. Описание семейств: UNIX, DOS (Disk Operation System) и OS/2. Пошаговое развитие Microsoft Windows. Графические интерфейсы X-Windows и Presentation Manager. Совместимость систем, надежность и разработка приложений.
реферат, добавлен 14.04.2014История развития операционных систем для персональных компьютеров. Общая характеристика структуры и сервисных функций Microsoft Disk Operation System, Windows, MacOS, Unix-Linux и OS/2 Warp. Особенности их использования, достоинства и недостатки.
реферат, добавлен 06.12.2010Standards and the Standardization Process: International, National and Industrial organizations. Cryptographic evaluation bodies. Security Mechanisms and Services. Encryption and Modes of Operation for Block Ciphers. Cryptographic Hash Functions.
книга, добавлен 08.03.2014Block cipher modes of operation and data transformation for asymmetrical algorithms. Standardisation in cryptography. Trust models in public key cryptography. Cryptographic standards for the World Wide Web. People who play a role in cryptography.
книга, добавлен 08.03.2014The terminology and requirements for safe, reliable operation of critical IT infrastructure were defined. The generalized structure of critical information technology infrastructure, by its basic level, sub levels and functionality were described.
статья, добавлен 07.12.2016A new approach to computer security. Building a unified binary analysis platform and using it to provide novel solutions. Providing an extensible architecture. Combining static and dynamic analysis in program. Properties from binary programs BitBlaze.
статья, добавлен 15.04.2014Analysis of information technology monitoring and correction of the functional state of students in the process learning created based on developed models, complex criteria classification of constituent states models, algorithms normalized estimates.
статья, добавлен 23.06.2016Analysis on the Geographic Information System. Monitoring of the environment in the vicinity of the airport. Modeling control air pollution, noise. Operation of aircraft in the conditions of the implementation of intelligent transport management systems.
статья, добавлен 12.08.2016Basic directions in the design of the interface. The interaction between human and computer. Introduction to user preferences, as to the operation of the computer system. The principles used to create virtual navigation for the operating system.
презентация, добавлен 28.12.2013The opportunities of the GeoGebra dynamic geometry environment. Capabilities of the system for creating drawings, tables of experimental data and their application in conducting research work. The examples of solving some elementary geometry problems.
статья, добавлен 25.05.2017A technique for singular value decomposition of blocks of a cover matrix. Possible results of singular value decomposition operation. Mean values of separatenesses belonging to blocks singular values, received as a result of computing experiment.
статья, добавлен 28.08.2016Possibilities and features of artificial neural networks. Areas of practical application of artificial neural networks. Voice interface distribution and visual serach. Learning neural networks. The following visualization. Direct error propagation.
презентация, добавлен 06.02.2019Error propagation and feedforward invertibility. Generation of finite automata with invertibility. Weak inverses with bounded error propagation of a finite automaton. Canonical form for finite automaton one key cryptosystems. Generalized algorithms.
книга, добавлен 08.03.2014International recommendations on Using error control coding at different network layers. The complexity of decoding in the channel with independent errors. Providing security of data in a network with the help of coding methods. Public-key cryptography.
книга, добавлен 08.03.2014Our algorithm combines the Reverse Polish Notation (RPN) and expression tree algorithms it is a novel method for efficiently evaluating arithmetic expressions. The algorithm combines the benefits of Reverse Polish Notation (RPN) and Expression Trees.
статья, добавлен 19.03.2024Functioning system BIOS when enabling the computer. Program CMOS Setup. The main sections of the program BIOS Setup. Advanced BIOS, Chipset Features. Power Management Setup. Adjustment computer system parameter. Determination load device operating system.
реферат, добавлен 02.06.2009Analysis of the model of dynamic classification software applications included in the business critical systems for security access. Information technology, allowing to distinguish three basic classes of safety-critical access software applications.
статья, добавлен 22.12.2016The main peripheral and internal devices of the personal computer. Purpose mouse, keyboard and joystick. Recording information of the disk drive to the hard drive. Sound media files. Scan and copy documents. Types of monitors, projectors and speakers.
презентация, добавлен 13.09.2015A flexible system troubleshooting and emergency operation of stepwise refinement priori probability. Ensuring reliability recognition of failure. Automatic search of breaks with step-by-step variations of parameters of tests in communication systems.
статья, добавлен 30.07.2016Побудова та класифікація штрихових кодів з виявленням та виправленням помилок, огляд їх основних різновидів: EAN-13, UPC та EAN-8, Code39 та CODABAR, INTERLEAVED 2 OF 5. Створення самокорегуючого штрихового коду та програмне забезпечення для цього.
дипломная работа, добавлен 26.01.2014