Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Features of read-only memory?
ROMs are memories on which it's not possible to write data when they are on-line to computer. They can only be read. This is reason why it is known as read-only memory (ROM). Because ROM chips are non-volatile, data stored inside a ROM aren't lost when power supply is switched off unlike case of a volatile RAM chip. ROMs are also called as permanent stores.
ROMs can be used for storing system programs, micro-programs and subroutines. ROMs are non-volatile in nature and require not be loaded in a secondary storage device. ROMs are fabricated in large numbers in a manner where there is no room for even a single error. However this is an inflexible process and needs mass production. So a new kind of ROM known as PROM was designed that is also non-volatile and can be written only once and therefore name Programmable ROM (PROM). Supplier or customer can perform writing process in PROM electrically. Special equipment is required to perform this writing operation. Thus PROMs are more flexible and convenient than ROMs.
ROMs / PROMs can be written just once but in both cases whatever is written once can't be changed. However what about a case where you read mostly but write just very few times? This led to concepts of read mostly memories and the best illustration of these are EPROMs (Erasable PROMs) and EEPROMs (Electrically Erasable PROMs).
Image Capturing Download the following grey level 512x512 standard images in TIF format: a-Lena b-Baboon c-Bridge d-Airfield Use Matlab to decrease the siz
What are the major components of a web browser? A browser contains a set of clients, a controller and a set of interpreters which manages them. All browsers must have an HTML
We now consider the relation between passwords and key size. For this purpose consider a cryptosystem where the user enters a key in the form of a password. Assume a password consi
Explain briefly about demultiplexers?
Can I use a Verilog function to define the width of a multi-bit port, wire, or reg type? Width elements of ports, wire or reg declarations require a constant in bot
What is cache memory? The small and fast RAM units are known as caches. When the implementation of an instruction calls for data located in main memory, the data are obtained a
How is conversion of data types done between ABAP/4 & DB layer? Conversion among ABAP/4 data types and the database layer is complete within the database interface
Differentiate between Batch Operating System and Time Sharing Operating System? Batch operating systems : A batch is a sequence of jobs. Such batch is submitted to batch proce
Q. Explain about parallel programming environment? The parallel programming environment comprises of a debugger, an editor, performance evaluator, programme visualizer for incr
Q. Rank the list elements in terms of distance? Rank the list elements in terms of distance from each to last element in given linear linked list. A parallel algorithm for t
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd