Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Differentiate between linear addressing and matrix addressing modes with examples.
Ans:
Linear Addressing: Addressing is the procedure of selecting one of the cells in a memory to be written in or to be read from. So as to facilitate selection, memories are usually arranged by placing cells in Matrix form or in linear form.
Linear Addressing Mode: A single column which has n rows and 1 column (as like the 16X1 array of cells) demonstrated in fig.(a) is frequently termed as Linear Addressing. Selection of a cell simply implies selection of the corresponding row and the column is utilized.
Fig. (a) Linear Addressing Mode
Matrix Addressing Mode: The arrangement which needs the fewest address lines is a square array of n rows and n columns for a whole memory capacity of n x n = n2 cells. Such arrangement of n rows and n columns is commonly referred to as Matrix Addressing that is demonstrated in fig.(b).
Fig.(b) Matrix Addressing Mode
The last digit of a credit card number is the check digit, which protects against transcription errors like an error in a single digit or switching two digits. The following method
TRP is the number of clock cycles required to terminate access to an open row of memory, and open access to the next row. It stand for row precharge time.
Q. Define about Hyper-threading technology? Hyper-threading technology enables a single microprocessor to behave as two separate threaded processors to operating system and app
What is the state of the register in Figure after every clock pulse if it begins in the 101001111000 state?
Any data storage device. This having of your CD-ROM drive, hard disk drive and floppy disk drive.
Explain the basic performance equation Ans: The basic performance equation is following T = N * S/ R T => It is processor time required to execute a program N => act
Two popular encryption techniques to ensute secured transactions on the net? 1. Translation table 2. Word/byte rotation and XOR bit masking.
what are the different way of executing pipelines
Once a finite state automaton (FSA) is designed, its transition diagram can be translated in a straightforward manner into program code. However, this translation process is consid
why to learn data base?
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd