Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Add 648 and 487 in BCD code.Ans. In BCD Code, addition of 648 and 487:
6 4 8 = 0 1 1 0 0 1 0 0 1 0 0 04 8 7 = 0 1 0 0 1 0 0 0 0 1 1 1-------------------------------------------------- 1 0 1 0 1 1 0 0 1 1 1 1 10 12 15--------------------------------------------------In the given problem every three groups are invalid, since the four bit sum is more than 9. In these cases, add +6(that is 0110) to the 4 bit sum to skip the 6 invalid states. Whether a carry is generated while adding 6, so add the carry to the next four bit group that is,
6 4 8 = 0 1 1 0 0 1 0 0 1 0 0 04 8 7 = 0 1 0 0 1 0 0 0 0 1 1 1-------------------------------------------------- 1 0 1 0 1 1 0 0 1 1 1 1 0 1 1 0 0 1 1 0 0 1 1 0 1 1 1 1 1 1 1 1------------------------------------------------------0001 0 0 0 1 0 0 1 1 0 1 0 1
1 1 3 5-------------------------------------------------------
Hence addition of 648 and 487 is 1135 in BCD Code.
Define access time for magnetic disk. The sum of seek time and rotational delay is known as access time for disks. Normal 0 false false false EN-IN
What is reduction? A reduction is a way of changing one problem into another in such a way that a solution to the second problem can be used to explain the first problem.
What is GUI status? How to create /Edit GUI status? A GUI status is a subset of the interface elements used for a certain screen. The status comprises those elements that are c
Sample Program In this program we only display: Line Offset Numbers -----------------Source Code-----------------
What is PBO and PAI events? PBO- Process before Output-It verifies the flow logic before displaying the screen. PAI- Process after Input-It verifies the flowlogic after
Define the Products of Dynamic mode Dynamic model: A model of dynamic behaviour of user object. It defines important states of user object, the way that actions depend on
Proof by Contradiction: Now for forward chaining and backward chaining both have drawbacks. But another approach is to think about proving theorems by contradiction. So we can
Write an academic report on a significant software security exploit you have studied. Your report should include details such as, for example: The nature of the software vuln
Make a spreadsheet that has on every line an integer student identification number followed by 3 quiz grades for that student. Go though that information from the spreadsheet into
Q. Describe buffer of receiving process? MPI_Gather (Sendaddr, Scount, Sdatatype, Receiveaddr, Rcount, Rdatatype,Rank, Comm): 'Using this function process with rank' rank
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd