Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Add 648 and 487 in BCD code.Ans. In BCD Code, addition of 648 and 487:
6 4 8 = 0 1 1 0 0 1 0 0 1 0 0 04 8 7 = 0 1 0 0 1 0 0 0 0 1 1 1-------------------------------------------------- 1 0 1 0 1 1 0 0 1 1 1 1 10 12 15--------------------------------------------------In the given problem every three groups are invalid, since the four bit sum is more than 9. In these cases, add +6(that is 0110) to the 4 bit sum to skip the 6 invalid states. Whether a carry is generated while adding 6, so add the carry to the next four bit group that is,
6 4 8 = 0 1 1 0 0 1 0 0 1 0 0 04 8 7 = 0 1 0 0 1 0 0 0 0 1 1 1-------------------------------------------------- 1 0 1 0 1 1 0 0 1 1 1 1 0 1 1 0 0 1 1 0 0 1 1 0 1 1 1 1 1 1 1 1------------------------------------------------------0001 0 0 0 1 0 0 1 1 0 1 0 1
1 1 3 5-------------------------------------------------------
Hence addition of 648 and 487 is 1135 in BCD Code.
State the drawbacks of laptop compared to PC The main disadvantages of laptops compared to desk top PCs are: - They tend to be more expensive to purchase - It's easie
where can I find detailed explanation of 6 stage and 7 stage pipeline ??
How physical addressing is performed in WAN? WAN networks operate as similar to a LAN. All WAN technology describes the specific frame format a computer uses while sending an
We download data which arrives to me in a column. I need to use it in a complex sheet that requires data in a row. How can we convert the column data into row data? Ans) H
Why Build and fix model is considered as ad-hoc software development model?
What are the different types of distributing frames used in exchanges? The various distribution frames used in exchange are demonstrated in figure. Every subscriber in a telep
Software Project Planning In the previous days of computing software costs comprised a small % of overall computer based system cost. In order of magnitude error software cost
It is an object of a number of classes whose purpose is to indicate that a real object of that class does not exist. One common use for a null object is a return value from a membe
State in brief about the proxy server A proxy server also helps a lot since it hides the real IP addresses of users requesting resources outside the firewall. Finally, the
Prolog Programming Language : Probably programming languages are procedural: than the programmer specifies exactly the right instructions (algorithms) required to get an agent
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd