Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
A burglar alarm system is controlled by a microprocessor system. The system has three independent circuit each consisting of 7 passive infra red sensors. The controller can be programmed to activate individual circuits and detect which passive has raised the alarm. Write a C program to control the system. Assume
Variable char a contains the passive details of circuit 1 Variable char b contains the passive details of circuit 2 Variable char c contains the passive details of circuit 3 The variable a/b/c is coded such that if the sensor is activated then its corresponding bit is set to 1 else it is 0. The bit format is bit 0 Lsb sensor and bit 6 Msb sensors. The program should initial run from a menu which enables various circuits to be turned on/off , a reset password to be set, a special simulation where a/b/c are entered from keyboard (test) and a system set . The program should display the state of the passives (active or non-active ) and if the alarm is raised an audible alarm should be heard , the set passive and an access code be requested to reset the system.
Q. Basic need of Random Access Memory? Main memory is Random access memory. It is generally organised as words of fixed length. Length of a word is termed as word length. Every
Your task is to propose a business that has a Web presence on the Internet. Your business may be an online only business or a so-called "clicks and mortar" business. You
Why IO devices cannot be connected directly to the system bus? Ans: The IO devices can't be directly connected to the system bus because the following reason A) The data tra
Explain characteristics of program translation model. The program translation model characteristics are: A program should be translated before this can be executed.
How do you calculate the complexity of sorting algorithms? Find the complexity of Insertion sort and Bubble Sort. The difficulty of sorting algorithms depends o
The largest and the second largest number from a set of n distinct numbers can be found in O (n)
Explain typical packet switching network configuration. Packet Switching: In packet switching the nodes handle greatly smaller data length than are determined in message swit
Q. What is Shift operation? Shift: Shift operation is employed for transfer of bits either to left or to right. It can be used to comprehend simple arithmetic operation or da
What is synchronous transmission? In synchronous transmission the two units share a common frequency and bits are transmitted continuously at the rate dictated by clock pulses
how to reduce risc pipelining structure
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd