Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Add 648 and 487 in BCD code.Ans. In BCD Code, addition of 648 and 487:
6 4 8 = 0 1 1 0 0 1 0 0 1 0 0 04 8 7 = 0 1 0 0 1 0 0 0 0 1 1 1-------------------------------------------------- 1 0 1 0 1 1 0 0 1 1 1 1 10 12 15--------------------------------------------------In the given problem every three groups are invalid, since the four bit sum is more than 9. In these cases, add +6(that is 0110) to the 4 bit sum to skip the 6 invalid states. Whether a carry is generated while adding 6, so add the carry to the next four bit group that is,
6 4 8 = 0 1 1 0 0 1 0 0 1 0 0 04 8 7 = 0 1 0 0 1 0 0 0 0 1 1 1-------------------------------------------------- 1 0 1 0 1 1 0 0 1 1 1 1 0 1 1 0 0 1 1 0 0 1 1 0 1 1 1 1 1 1 1 1------------------------------------------------------0001 0 0 0 1 0 0 1 1 0 1 0 1
1 1 3 5-------------------------------------------------------
Hence addition of 648 and 487 is 1135 in BCD Code.
A Scanner is a device which allows you to capture photographs or drawings or text from tangible sources (paper or slides etc.) in electronic form. Scanners work by detecting differ
RST 4.5 is known as TRAP.
What are the features of PROM? They are programmed directly by the user. Faster Less expensive More Flexible
Question : a) Describe the following modes of wave propagation: - Line of sight - Ground waves - Skywaves b) Why can waves with a very low frequency be used for submar
Q. Define looping in assembly language? LOOPING ; Program: Assume a constant inflation factor that is added to a series of prices ; stored in the memory. The program
What is Fork swap? "Fork ()" is a system call to make a child process. When the parent process calls "fork()" system call, the child process is formed and if there is short of
Q. Explain the following: a. BCD code b. Gray code c. Excess-3 code d. True complement method Q. Addition-Subtraction-Multiplication-Division: Perform Binary Addi
Explain the Structure of Virtual Enterprise. The effective enterprise can be a suitable structure to explore the emerging opportunities for creating value within the informatio
Direct Mapping: In this particular technique, block j of the primary memory maps onto block j modulo 128 of the cache. The primary memory blocks 0,128,256,...is loaded
How many methods used to control traffic flowing into and out of the network by firewall? Firewalls utilize one or more of three ways to control traffic flowing into and out of
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd