Convert the hex to binary, Operating System

Assignment Help:

  Convert the following from hex to binary and draw it on the memory map.

    RAM    = 0000 -> 00FF
    EPROM = FF00  -> FFFF

Answer:

  0000  0000 0000  0000 (0)    RAM start

  0000  0000  1111  1111 (255 byte)  RAM stop

  1111  1111  0000  0000 (63.75K)   Eprom start

  1111  1111  1111  1111 (64K)   Eprom stop
 
  The memory map is shown below:-

1646_Convert the hex to binary.png

  Due to the tri-state nature of the I.C's (Ram, Rom etc.) they may be placed in parallel and 'turned on ' when they are required. This process is termed decoding. There are two types of   decoding:-
 
    1. Partial decoding
    2. Absolute decoding


Related Discussions:- Convert the hex to binary

Linux, write a linux command to display lines from 25 - 45 of directory "/e...

write a linux command to display lines from 25 - 45 of directory "/edc/password" write a linux command to display directory in /edc

What is direct memory access, Direct memory access Many computers avoid...

Direct memory access Many computers avoid burdening the main CPU with programmed I/O by offloading sine if this work to a special-purpose processor known as a direct memory add

Give an overview of windows 2000 file management, Give an overview of WINDO...

Give an overview of WINDOWS 2000 file management. Windows makes use of the NTFS and File Allocation Table file systems. The Older versions of the FAT file system had file name

Mechanism by which one segment belong to two address spaces, Q. Explain a m...

Q. Explain a mechanism by which one segment could belong to the address space of two different processes. Answer: Because segment tables are a collection of base-limit register

Assignment, i need the job to be done within 3 days

i need the job to be done within 3 days

Why is it complicated to protect a system, Q. Why is it complicated to prot...

Q. Why is it complicated to protect a system in which users are allowed to do their own I/O? Answer: In earlier chapters we identified a distinction among kernel and user mod

What are the issues in designing a network, Normal 0 false fa...

Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4

Main advantage of the layered approach to system design, What is the main a...

What is the main advantage of the layered approach to system design? As in all cases of modular design, designing an operating system in a modular way has several benefits. Th

How can the deadlock be prevented-bankers algorithm, How can the deadlock b...

How can the deadlock be prevented Bankers algorithm : The Resource allocation graph algorithm isn't applicable to a resource allocation system with multiple instances of every

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd