Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Define Stack segment ?
8086 Microprocessor supports Word stack. Stack segment parameters tell the assembler to alert linker that this segment statement states the program stack area.
A program should have a stack area in that computer is continuously carrying on numerous background operations which are completely transparent, even to an assembly language programmer, for illustration a real time clock. Every 55 milliseconds real time clock interrupts. Every 55 ms CPU is interrupted. CPU records state of its registers and then goes about updating the system clock. When it finishes servicing system clock it has to restore registers and go back to doing whatever it was doing when interruption took place. All such information gets recorded in stack. If your program has not any stack and if real time clock were to pulse whereas the CPU is running your program there will be no way for CPU to find the way back to your program when it was through updating the clock. 0400H byte is default size of allocation of stack. Please consider if you haven't specified stack segment it is automatically created.
Q. What is the dissimilarity between dynamic strain aging and strain aging? Answer:- Strain aging could be explains as "normal wear and tear" or the fatigue that is experi
* Public, protected and private are 3 access specifier in C++. * Public data members and member functions are accessible outside the class. * Protected data members and memb
Describe the term- Macros A macro is a key or name which signifies a series of commands or key strokes. Many applications allow single nominated key or single word on a keyboar
Illustrate about object oriented development object oriented development is not direct way of system development as in this approach a holistic view of application domain is co
Explain briefly how firewalls protect network. A firewall is simply a program or hardware device that filters the information coming by the Internet connection into your
Define secondary memory. This memory holds those pages that are not present in main memory. The secondary memory is usually a high speed disk. It is known as the swap evice, an
Define software architecture and describe which types of architectures can be used in Email or Facebook applications
What is the system call available to change the personality? The system call personality prefers to a method to modify its implementation domain in order that Linux can emulate
Overriding tell us only the methods, but shadowing tells us the entire element.
What are the types where relationship exists in Electronic Market Place? In this two forms of relationships can exist, they are: a. Customer/seller linkage is recognized at
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd