Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Add -20 to +26 by using 2's complement ?
Ans. Firstly convert the both numbers 20 and 26 in its 8-bit binary equivalent and determine the 2's complement of 20, after that add -20 to +26, that is, 20 = 0 0 0 1 0 1 0 0 (that is 8-bit binary equivalent of 20)
= 1 1 1 0 1 0 1 1 (1's complement) +1 -------------------------------
= -20 = 1 1 1 0 1 1 0 0 (i.e. 2's complement of 20) +26 = 0 0 0 1 1 0 1 0 (8-bit binary equivalent of 26) ----------------------------- Addition of -20 to +26 = +6 = 0 0 0 0 0 1 1 0 ----------------------------- Thus -20 to +26 = (6)10 = (0110)2.
Program 'preemption' is? Ans. Forced de allocation of the CPU from a program that is executing on the CPU is called preemption program.
Analysis Iteration To understand any problem completely you have to repeat task which implies that analysis requires repetition. First, just get overview of problem, make a r
What is the advantage of caching in a web browser? Like other application browsers utilize a cache to enhance document access. The browser places a copy of all items it retriev
What are the role of an operating system? Sharing the Processor Virtual Machine: Resource management: Memory Management
The VLSI technology is still developing. More and more powerful microprocessors and more storage space now are being put in single chip. One question that we have still not conside
Q. What is Dithering? CMYK provides only 8 colours (C, M, Y K, Violet= C + M, Orange= M + Y, Green = C + Y, and colour of paper itself!). What about other colours? For these t
How to enter from command mode to insertion mode using Vi Editor? Ans) There are various commands that put the VI editor into insert mode. The most usually used commands to get
The use of Information Technology (IT) is well known. IT has turn into a must for survival of all business houses with growing information technology trends. Computer is main compo
Explain various threats posed through servers into a client server environment. Server Destroyed within an Accident: Power failures, Leaking pipes and equipment failures are no
Comparison between risc and cisc - computer architecture: CISC Emphasis on hardware Includes multi-clock complex instructions Memory-to-memory
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd