Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Add -20 to +26 by using 2's complement ?
Ans. Firstly convert the both numbers 20 and 26 in its 8-bit binary equivalent and determine the 2's complement of 20, after that add -20 to +26, that is, 20 = 0 0 0 1 0 1 0 0 (that is 8-bit binary equivalent of 20)
= 1 1 1 0 1 0 1 1 (1's complement) +1 -------------------------------
= -20 = 1 1 1 0 1 1 0 0 (i.e. 2's complement of 20) +26 = 0 0 0 1 1 0 1 0 (8-bit binary equivalent of 26) ----------------------------- Addition of -20 to +26 = +6 = 0 0 0 0 0 1 1 0 ----------------------------- Thus -20 to +26 = (6)10 = (0110)2.
Q. Shared-memory programming model? In shared-memory programming model tasks share a common address space that they read and write asynchronously. Several mechanisms like semap
In the case of Static call, the called program is a stand-alone program, it is an executable program. During run time we can call it in our called program. As about Dynamic call, t
What are the concerns for growth of e-commerce in India? Government as Facilitator for the growth of e-commerce has taken following steps: a. Promotion of competitive dataco
There are innumerable caveats to this answer, but basically any Webpage containing a form will need a CGI script or program to process the form inputs.
An AWT stands for Abstract Window Toolkit. AWT handles programmers to develop Java applications with GUI components, like windows, and buttons. The Java Virtual Machine (JVM) is re
Interrupts Interrupt-request line o Interrupt-acknowledge signal o Interrupt-request signal Interrupt-service routine o May have no relationship t
Subtraction of 0011.1001 - 0001.1110 using 2's complement method Ans. Firstly 1's complement of 0001.1110 is 1110.0001 and 2's complement is 1110.0010. If a last carry
What are the aspects of security policy The security policy should cover aspects such as network service access, physical access, limits of acceptable behaviour, company's pro
Interval between the time of submission and completion of the job is? Ans. Turnaround time is the interval in between the time of submission and completion of the job.
You have been retained to examine how many check-in agents should be used at a check-in counter for a big hotel. During normal business hours, customers arrive at a rate of about 2
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd