Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Within micro controller's software, it is very useful to be able to manipulate binary bits i.e. from ports etc. The ALU has command to shift data, rotate data, compare data, set/clear bits, test bits and logical operate on data.
LSLA i.e shift A one place to the left fill up with 0 LSLB i.e shift B one place to the left fill up with 0 LSRA i.e shift A one place to the right fill up with 0 LSRB i.e shift B one place to the right fill up with 0 ROLA i.e rotate A one place to the left through carry ROLB i.e rotate B one place to the left through carry RORA i.e rotate A one place to the right through carry RORB i.e rotate B one place to the right through carry CBA i.e A-B with no answer stored just flags set CMPA i.e compare A with memory i.e A-M CMPB i.e compare B with memory i.e B-M BSET $20,#$1 i.e set bit 1 of memory address 20 BCLR $20,#$1 i.e clear bit 1 of memory address 20 BITA $20 i.e Check bit mask found in A with address 20 BITB $20 i.e Check bit mask found in A with address 20 ANDA $20 i.e logical and A with data at address 20 EXORA $20 i.e logical exor A with data at address 20 COM $20 i.e logical invert data at address 20 ORRA $20 i.e logical OR A with data at address 20 MUL ;Multiplies axb and stores the answer in D i.e both FDIV ;Fractional divide using D/IX IDIV ;Integer divide using D/IX ADDD ;16 bit add to D DAA ;Decimal adjust add sum to BCD data
Is it possible to join ASP.NET webforms and ASP.MVC and make a single web application? Ans) Yes, it is possible to join ASP.NET webforms and ASP.MVC and develop a single web a
With the help of a truth table explain the working of a half subtractor. Draw the logic diagram using gates. Ans: Half Subtractor: For the subtraction of B (subtrahend) f
CIH, also known as Chernobyl or Spacefiller, is a Microsoft Windows computer virus which first emerged in 1998. It is one of the most damaging viruses, overwriting critical inform
A PCM system uses 8 bits per sample and the analog signal is limited to 4.3 kHz. The PCM data is transmitted using (a) BFSK and (b) ASK. Determine the bandwidth required for transm
#quest2. Each time a defect gets detected and fixed, the reliability of a software production..
Firewalls use one or more of three methods to control traffic flowing in and out of the network: Packet filtering - Packets (small chunks of data) are examined against a s
The max number of calling modes stacked at one time is? NINE
Explained RAID? Ans: High performance devices tend to be costly. So we can gain very high performance at a reasonable cost using a number of low-cost devices operating in paral
Q. Major problems associated in writing with cache memories? The data in main and cache memory can be written by processors or I/O devices. The major problems associated in wri
what is parsin? Source programmed statements are observed as tokens, recognizing, building block of language the task of scanning the source statement and classifying the diff
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd