Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Add -20 to +26 by using 2's complement ?
Ans. Firstly convert the both numbers 20 and 26 in its 8-bit binary equivalent and determine the 2's complement of 20, after that add -20 to +26, that is, 20 = 0 0 0 1 0 1 0 0 (that is 8-bit binary equivalent of 20)
= 1 1 1 0 1 0 1 1 (1's complement) +1 -------------------------------
= -20 = 1 1 1 0 1 1 0 0 (i.e. 2's complement of 20) +26 = 0 0 0 1 1 0 1 0 (8-bit binary equivalent of 26) ----------------------------- Addition of -20 to +26 = +6 = 0 0 0 0 0 1 1 0 ----------------------------- Thus -20 to +26 = (6)10 = (0110)2.
Why SRAM are said to be volatile? Because their contents are lost when power is interrupted. So SRAM are said to be volatile.
What is branch instruction? As a result of branch instruction is a type of instruction which loads a latest values into the program counter.
Q. Define Organizing? Grouping of related activities together, Identification of required activities and forming departments and coordinating various departments with the estab
What are different types of Log records? V1 and V2. V1 must be processed before V2. But, we can have more than single V2 logs
COMPUTER FUNDAMENTALS 1. Elaborate the various steps in performing a Mail Merge. Perform one mail merge operation for sending invitation for a conference which is being conduc
What are the two approaches used for generating the control signals in proper sequence? Hardwired control Micro programmed control
What are the Cycle based simulators Cycle based simulators are more like a high speed electric carving knife in comparison since they focus on a subset of the biggest problem:
Adding Momentum - Sigmoid units: However imagine a ball rolling down a hill as it does so then it gains momentum in which its speed increases and it becomes more difficult to
definf memory operation
SMLI firewalls are different from the conventional The SMLI firewalls are different from the conventional "stand in" proxies in a way that the stand-in proxies are used for th
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd