Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Explain Excess 3 Codes
Ans.
Excess 3 Codes
1. This is the other form of BCD code. All decimal digits are coded in 4 bit binary code.
2. The code for all decimal digits is obtained by adding decimal 3 to the natural BCD code digit.
3. The code is acquired by adding 3 to the decimal no
4. Self complementing code-helpful in subtraction.
Q. Layers of Distributed System architecture? Layers of Distributed System architecture are: Presentation Layer is actual user interface. This layer receives input and
Which TTL logic gate is used for wired ANDing ? Ans. Open collector output, TTL logic gate is used.
Automatic correlation from web point of sight can be set in recording options and correlation tab. Here we can enable correlation for the whole script and choose either issue onlin
Q. What is Domain explain? Domain can be an apartment complex, a town or even a country. Sub-domains can correspond to organizations like expertsmind. United States comes under
Hyper-threading works by duplicating those sections of processor that kept the architectural state-but not duplicates the main implementation resources. This allows a Hyper-threadi
Processors can broadly be seperated into the categories of: CISC, RISC, hybrid, and special purpose.
What is the difference between Swapping and Paging? Swapping: Entire process is moved from the swap device to the major memory for implementation. Process size must be less t
What is a multitape TM? A multi-tape Turing machine having of a finite control with k-tape heads and k-tapes each tape is infinite in both directions. On a one mov
What is asynchronous DRAM? In asynchronous DRAM, the timing of the memory device is controlled asynchronously. A specialized memory controller circuit gives the essential contr
Explain the term- Hacking Use of passwords and ids to prevent illegal access to files. Also locking the computer itself or locking computer room can help here. Encryption s
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd