Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Add -20 to +26 by using 2's complement ?
Ans. Firstly convert the both numbers 20 and 26 in its 8-bit binary equivalent and determine the 2's complement of 20, after that add -20 to +26, that is, 20 = 0 0 0 1 0 1 0 0 (that is 8-bit binary equivalent of 20)
= 1 1 1 0 1 0 1 1 (1's complement) +1 -------------------------------
= -20 = 1 1 1 0 1 1 0 0 (i.e. 2's complement of 20) +26 = 0 0 0 1 1 0 1 0 (8-bit binary equivalent of 26) ----------------------------- Addition of -20 to +26 = +6 = 0 0 0 0 0 1 1 0 ----------------------------- Thus -20 to +26 = (6)10 = (0110)2.
GlobalFon is an international communication company, which offers international prepaid calling cards. They introduced three different types of cards, (1) AsiaFon: is cheapest for
Draw the logic diagram of 4-bit Twisted Ring counters and explain its operation with the help of timing diagram. Ans: Twisted ring counter (4 BIT): We ready know that shi
Illustrate the categories of micro computers Micro computers are usually categorized into desktop models and laptop models. They are awfully limited in what they can do when c
Problem : (a) Show whether or not a standard format for representing data, such as XML, is needed. (b) Using an appropriate example, describe how data is organized in a dat
a program to find the area under the curve y = f(x) between x = a and x = b, integrate y = f(x) between the limits of a and b. The area under a curve between two points can be foun
Q. Describe the Limitation of FAT16? DOS designers decided to use clusters with as a minimum four sectors in them (so a cluster size of at least 2KB) for all FAT16 hard disks.
Which one is an error reporting protocol? An error reporting protocol is ICMP.
Throughput of a system is? Ans. "Throughput" of a system is no. of programs processed by this per unit time.
DUPLICATING PROCESSES : As we mentioned earlier duplicating is a process whereby a master copy is prepared from which a large number of other copies are obtained with the help of
What are the different types of layers in TCP/IP protocol stack? Layers into the TCP/IP protocol architecture are as given below: • Application Layer, • Host-to-Host Tra
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd