Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Illustrate Character Coded Data?
The input output happens in the form of ASCII data. These ASCII characters are entered as a string of data. For illustration to get two numbers from console we can enter numbers as:
As every digit is inputwe will store its ASCII code in a memory byte. After first number was input number will be stored as follows:
Number is entered as:
Every one of these numbers would be input as equivalent ASCII digits and required be converted either to digit string to a 16-bit binary value which can be used for computation or the ASCII digits themselves can be added that can be followed by instruction which adjust the sum to binary. Let's use conversion operation to perform these calculations here.
Another significant data format is packed decimal numbers (packed BCD). A packed BCD comprises two decimal digits per byte. Packed BCD format has subsequent advantages:
The instructions DAA (decimal adjust after addition) as well as DAS (decimal adjust after subtraction) are used for adjusting result of an addition of subtraction operation onpacked decimal numbers. Though no such instruction exists for division andmultiplication. For the cases of division and multiplication the number should be unpacked. First divided or multiplied and packed again.
Q. Explain about distributed systems? A Distributed System in that Data, Process and Interface component of information System are distributed to many locations in a computer n
Q. What is Enhanced IDE? The principle behind EIDE interface is the same as in IDE interface however this drive has capacities varying from 10.2GB to 20.5GB. The rotation speed
What are program-invisible registers? Ans: the local and global descriptor tables are found in the memory system. To access and specify the address of these tables, program inv
Explain Sequential Sharing In this sharing method, a file can be shared by just one program at a time, i.e. file accesses by P1 and P2 are spaced out over time. A lock field ca
RAM: Read / Write memory, High Speed, Volatile Memory. ROM: Read only memory, Low Speed, Non Voliate Memory. RAM- Random Access memory it is a Volatile Memory. volatil
board coloring
And-Introduction: In generally English says that "if we know that a lot of things are true, so we know that the conjunction of all of them is true", then we can introduce conj
Explain the terms topology used in LANs. (i) LAN topologies: This network topology is a physical schematic that shows interconnection of the several users. There are four fun
Or-Introduction : Thus if we know about one thing is true, and also we know that a sentence when there thing is in a disjunction is true. Here if we consider example, like we
The Utilization Count shows the status of each processor in a specific mode i.e. Overhead mode, busy mode, and idle mode with respect to the progress in time as shown in Figure.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd