Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
A burglar alarm system is controlled by a microprocessor system. The system has three independent circuit each consisting of 7 passive infra red sensors. The controller can be programmed to activate individual circuits and detect which passive has raised the alarm. Write a C program to control the system. Assume
Variable char a contains the passive details of circuit 1 Variable char b contains the passive details of circuit 2 Variable char c contains the passive details of circuit 3 The variable a/b/c is coded such that if the sensor is activated then its corresponding bit is set to 1 else it is 0. The bit format is bit 0 Lsb sensor and bit 6 Msb sensors. The program should initial run from a menu which enables various circuits to be turned on/off , a reset password to be set, a special simulation where a/b/c are entered from keyboard (test) and a system set . The program should display the state of the passives (active or non-active ) and if the alarm is raised an audible alarm should be heard , the set passive and an access code be requested to reset the system.
What are the various phases of consumer merchantile model and also differentiate between prepurchase interaction & post purchase interaction. There are three phase of consumer
Enumerate about the trackball A trackball is a two-dimensional positioning device, a spaceball provides six degrees of freedom. Unlike the trackball, a spaceball does not actua
Give difference between top down parsing and bottom up parsing. Top down parsing: Specified an input string, top down parsing tries to derive a string identical to this by s
How is a Microsoft CRM Workflow tool enabled? A Microsoft CRM Workflow tool enables certainly one to as given below: • Explain business policies based upon established proce
Interrupt vector table is always created in first 1K area of the memory. Explain why? When CPU receives an interrupt type number from PIC, it uses this number to look up corres
Q. Diffrence between RISC and CISC architecture? CISCs provide better support for high-level languages since they include high-level language constructs such as CASE, CALL etc
Perform the - 48 - 23 operations using the 2's complement method. Ans. - 48 - 23 = - 48 + (-23) -48 = 1 1 0 1 0 0 0 0 -23 = 1 1 1 0 1 0 0 1 = -71
What are the type of Internet connection When determining requirements for a VPN, carefully estimate the number of systems to be put behind the VPN, the number of concurrent u
Why disable statements are not allowed in functions? If disble statement is used in function,it invalids function and its return value. So disable statements aren't
Illustrate the function of host to host transport layer in TCP/IP protocol stack? Function of Host - to-Host Transport Layer: This protocol layer just above inter network
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd