Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Basic Operational Concepts of a Computer:
- Each number is taken into the processor, and the definite addition is performed by the ALU.
- Then sum may be stored in memory or retained in the processor for immediate use.
Registers
Instructions
1. First fetch the instruction
2. Fetch the contents of the memory location LocA
3. Store the contents in general purpose register BX
1. Fetch the instruction
2. Add the contents of registers BX and AX
3. Place the sum in register AX
In 32bit IP Addressing scheme all 1's represent? All 1's represent limited broadcast in 32 bit IP Addressing scheme.
Define Programmable Logic array & Programmable Array Logic? Combinational ckt is implemented with ROM Do not care conditions become an address input. PLA is alike to ROM. PLA d
What is virtual address? The binary address that the processor used for either instruction or data known as virtual address.
State about CSMA/CA It belongs to a class of protocols known as multiple access methods. CSMA/CA stands for: Carrier Sense Multiple Access with Collision Avoidance. In
What is interactive reporting? A classical non-interactive report having of one program that makes a single list. Instead of one extensive and detailed list, with interactive
How will you reuse a plan? Reuse is an benefit of OO technology. Two aspects of reuse: Using existing things and making reusable new things It is simpler to reus
Q. Decoding of slightly encoded micro-instructions? Generally micro-programmed control unit designs are neither totally unencoded nor highly encoded. They are slightly coded. T
What is secondary list? It permits you to enhance the information presented in the basic list. The user can, for example, select a line of the basic list for which he require
Q. Explain working neural network work? ANSWER: A neural network has an input layer with the factors under consideration, a middle or hidden layer that assigns and adjusts weig
Advantages and Disadvantages of Public-key cryptography Advantages (i) Enhanced security and convenience (ii) Electronic records may be authenticated by affixing
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd