Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Add 648 and 487 in BCD code.Ans. In BCD Code, addition of 648 and 487:
6 4 8 = 0 1 1 0 0 1 0 0 1 0 0 04 8 7 = 0 1 0 0 1 0 0 0 0 1 1 1-------------------------------------------------- 1 0 1 0 1 1 0 0 1 1 1 1 10 12 15--------------------------------------------------In the given problem every three groups are invalid, since the four bit sum is more than 9. In these cases, add +6(that is 0110) to the 4 bit sum to skip the 6 invalid states. Whether a carry is generated while adding 6, so add the carry to the next four bit group that is,
6 4 8 = 0 1 1 0 0 1 0 0 1 0 0 04 8 7 = 0 1 0 0 1 0 0 0 0 1 1 1-------------------------------------------------- 1 0 1 0 1 1 0 0 1 1 1 1 0 1 1 0 0 1 1 0 0 1 1 0 1 1 1 1 1 1 1 1------------------------------------------------------0001 0 0 0 1 0 0 1 1 0 1 0 1
1 1 3 5-------------------------------------------------------
Hence addition of 648 and 487 is 1135 in BCD Code.
With its newer range of PCs IBM introduced 101-key Enhanced/Advanced keyboard. This keyboard is fundamental keyboard behind modern QWERTY keyboards. This has function keys aligned
Data Transfer Two most fundamental data transfer instructions in 8086 microprocessor are XCHG and MOV. Let's give illustrations of the use of these instructions. Program 1:
Q. Hardware required for superscalar processing? For applying superscalar processing a number of special hardware should be offered that is discussed below: • The necessity
Digital Signature is Software to recognize signature
Which scheduler selects processes from secondary storage device? Ans. Medium term scheduler selects processes from secondary storage device.
Probelm : a) What is the purpose of "Jumps" in the 8051 Microcontroller? Describe three types of "Jumps". b) What is the purpose of a "call"? c) Differentiate between ROM
We now consider the relation between passwords and key size. For this purpose consider a cryptosystem where the user enters a key in the form of a password. Assume a password consi
What types of data entry services do you perform? Our business is to understand what data you require entered and in what particular format. After an initial analysis is perfor
DVD-ROM employs same principle as a CD-ROM for reading and writing. However a smaller wavelength laser beam is used. Total capacity of DVD-ROM is 8.5GB. In double-sided DVD-ROM two
Define Overflow. An overflow is a problem in digital computer due to the width of registers is finite. A result that contains n+ 1 bit cannot be accommodated in a register wit
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd