Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Add -20 to +26 by using 2's complement ?
Ans. Firstly convert the both numbers 20 and 26 in its 8-bit binary equivalent and determine the 2's complement of 20, after that add -20 to +26, that is, 20 = 0 0 0 1 0 1 0 0 (that is 8-bit binary equivalent of 20)
= 1 1 1 0 1 0 1 1 (1's complement) +1 -------------------------------
= -20 = 1 1 1 0 1 1 0 0 (i.e. 2's complement of 20) +26 = 0 0 0 1 1 0 1 0 (8-bit binary equivalent of 26) ----------------------------- Addition of -20 to +26 = +6 = 0 0 0 0 0 1 1 0 ----------------------------- Thus -20 to +26 = (6)10 = (0110)2.
Explain about the passive graphics device A passive graphics device simply draws pictures under computer control; i.e. it allows the computer to communicate graphically with th
This is the set of tools and facilities that you work with as the MATLAB user or programmer. It contains facilities for managing the variables in your workspace and importing and e
Assembly language: An assembly program has a series of instructions--mnemonics that relate to a stream of executable instructions, when translated by an assembler that may be
The term 'page traffic' describes? Ans. Page Traffic describes the movement of pages in and out of memory.
A keyword that states the types in a particular namespace can be referred to without requiring their full qualified type names. 'using' reserved word always come with namespace
describe the action by thread library to context switch between user level threads
Why does Ethernet specify a minimum frame size. Ethernet frame gives a minimum frame size of 46 bytes. Whereas a data field of zero byte is legal, this causes a problem. While
How many 32K X 1 RAM chips are needed to provide a memory capacity 256 kilobytes?
(a) Explian two limitations of dead-box analysis. (b) Describe why memory analysis is difficult. (c) With reference to the "Shadow Walker" rootkit, explain what is meant by
Q. Example on PUBLIC DIVISOR? Linker appends all segments having the same name and PUBLIC directive with segment name into one segment. Their contents are pulled together in co
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd