Convert the hex to binary, Operating System

Assignment Help:

  Convert the following from hex to binary and draw it on the memory map.

    RAM    = 0000 -> 00FF
    EPROM = FF00  -> FFFF

Answer:

  0000  0000 0000  0000 (0)    RAM start

  0000  0000  1111  1111 (255 byte)  RAM stop

  1111  1111  0000  0000 (63.75K)   Eprom start

  1111  1111  1111  1111 (64K)   Eprom stop
 
  The memory map is shown below:-

1646_Convert the hex to binary.png

  Due to the tri-state nature of the I.C's (Ram, Rom etc.) they may be placed in parallel and 'turned on ' when they are required. This process is termed decoding. There are two types of   decoding:-
 
    1. Partial decoding
    2. Absolute decoding


Related Discussions:- Convert the hex to binary

Define the sleep (sec) function, Define the Sleep (sec) Function Sleep ...

Define the Sleep (sec) Function Sleep function suspends execution of this process for sec number of seconds. While this function is used in our example for consistency, other f

What is banker''s algorithm, What is banker's algorithm? Banker's algor...

What is banker's algorithm? Banker's algorithm is a deadlock avoidance algorithm that is applicable to a resource-allocation system with multiple examples of each resource type

What is the difference b/w multiprocessing and multitasking, What is the di...

What is the difference between multiprocessing and multitasking? Multi programming means implementing more than one program but here whenever the processor is idle during execu

Explain deadlock avoidance, Deadlock Avoidance It's a method to evade ...

Deadlock Avoidance It's a method to evade deadlock by careful resource scheduling. This approach to the deadlock problem foresees deadlock before it actually occurs. This a

Define what is dispatcher, Define what is Dispatcher In the Worker Mode...

Define what is Dispatcher In the Worker Model, it is the task of the Dispatcher to spawn a thread for every client-to-server connection. The Dispatcher acts as the go-between o

List antivirus techniques used for protection purposes, Question: a) Th...

Question: a) There are main goals of data security. List them and elaborate on how they provide protection. b) Describe threats associated with data security. c) Describe

What are the services provided by the operating systems, What are the servi...

What are the services provided by the operating systems?  Program Development It provides a variety of services and facilities, such as debuggers and editor, to help the

Multiprogramming, what are the main advantages of multiprogramming

what are the main advantages of multiprogramming

Define enforcing modularity for c, Define Enforcing Modularity for C Ad...

Define Enforcing Modularity for C Additionally, in C it is sometimes necessary to create modularity of design. C++  is very natural model for component based application design

Programable clock modes in computer systems, Ask question #Minimuexplain th...

Ask question #Minimuexplain the programable clock modes in a computer system m 100 words accepted#

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd