Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Within micro controller's software, it is very useful to be able to manipulate binary bits i.e. from ports etc. The ALU has command to shift data, rotate data, compare data, set/clear bits, test bits and logical operate on data.
LSLA i.e shift A one place to the left fill up with 0 LSLB i.e shift B one place to the left fill up with 0 LSRA i.e shift A one place to the right fill up with 0 LSRB i.e shift B one place to the right fill up with 0 ROLA i.e rotate A one place to the left through carry ROLB i.e rotate B one place to the left through carry RORA i.e rotate A one place to the right through carry RORB i.e rotate B one place to the right through carry CBA i.e A-B with no answer stored just flags set CMPA i.e compare A with memory i.e A-M CMPB i.e compare B with memory i.e B-M BSET $20,#$1 i.e set bit 1 of memory address 20 BCLR $20,#$1 i.e clear bit 1 of memory address 20 BITA $20 i.e Check bit mask found in A with address 20 BITB $20 i.e Check bit mask found in A with address 20 ANDA $20 i.e logical and A with data at address 20 EXORA $20 i.e logical exor A with data at address 20 COM $20 i.e logical invert data at address 20 ORRA $20 i.e logical OR A with data at address 20 MUL ;Multiplies axb and stores the answer in D i.e both FDIV ;Fractional divide using D/IX IDIV ;Integer divide using D/IX ADDD ;16 bit add to D DAA ;Decimal adjust add sum to BCD data
dfd for big bazaar
Difference among the Static rams and dynamic rams. Static RAM: It is costly as each bit of memory will take around 6 CMOS transistors. More speedy as transistors are us
Q. Explain Passing Parameters Using Pointers ? This method overcomes the drawback of using variable names directly in procedure. It uses registers to pass procedure pointers to
Greedy Search - artificial intelligence: If we have a heuristic function for states, defined as above, so we can simply measure each state with respect to this measure and ord
Broad Band ISDN handles data rate of about (A) 64 kbps (B) 100 mbps (C) 5.4 mbps (D) 2.048 mbps
CISC (Complex Instruction Set Computer) CISC stands for Complex Instruction Set Computer. If the control unit having a number of micro-electronic circuitry to make a set of con
Q. What is Effective Address ? The symbol EA (Effective Address) refers to a physical address in a non-virtual memory environment and refers to a register in a virtual memory a
How does multiplexer know which line to select? This is managed by select lines. The select lines provide communication among different components of a computer. Now let's see
During the Persian Gulf crisis of 1991, U .S forces deployed a Dynamic Analysis and Re planning Tool, DART ( Cross and Walker, 1994) to do automated logistics planning and schedu
What is a customer-to-business transaction? C2B (customer-to-business): The most significant activity into e-commerce isn’t selling. That is buying. Rather often which do
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd