Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Direct Addressing and Immediate Addressing mode - computer architecture:
Immediate Addressing:
It is the simplest form of addressing. Here, the operand is itself given in the instruction. This mode is used to define constant or set primary values of variables. The benefit of this mode is that no memory reference rather than instruction fetch is needed to obtain operand. The disadvantage of it is that the size of the number is restricted to the size of the address field, in which most of the instruction sets is small compared to word length.
Direct Addressing:
Effective address of the operand is given in the address field of the instruction in the case of direct addressing mode. It need one memory reference to read the operand from the given location and provides only a restricted address space. Length of the address field is typically less than the word length.
For Example: Move P, Ro, Add Q, Ro P and Q are the address of operand. Indirect
Q. Illustrate the history of computers? Let's now consider history of computers since this will give fundamental information about technological development trends in computer
DLQ - Dead Letter Queue If an application tries to put a message to one more application and if it is not delivered then it goes to the DLQ. So DLQ is not anything but all und
Attributes are declarative tags in code that put in additional metadata into an assembly.
a) What do you meant by digital forensics? b) What is the job of Computer Forensic Analyst c) From the point of view of : i. An employer ii. An employee Give thre
Binary Search: Search a sorted array by repeatedly in-between the search interval in half. Start with an interval covering the entire array. If the value of the search key is less
What are the different kinds of lock modes? There are three types of lock modes:- Shared lock Exclusive lock. Extended exclusive list.
What is binary adder? Binary adder is constructed with full adder circuit linked in cascade, with the output carry from one full adder linked to the input carry of next full ad
Please explain the construction and working of calomel electrode..
Data can be changed from special code to temporal code by using ? Ans. By using Shift Registers data can be changed from special code to temporal code. A Register wherein data ge
Explain UDP (User Datagram Protocol). UDP utilizes a connectionless communication paradigm. It is an application of using UDP doesn't require preestablishing a connection befor
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd