Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Illustrate Character Coded Data?
The input output happens in the form of ASCII data. These ASCII characters are entered as a string of data. For illustration to get two numbers from console we can enter numbers as:
As every digit is inputwe will store its ASCII code in a memory byte. After first number was input number will be stored as follows:
Number is entered as:
Every one of these numbers would be input as equivalent ASCII digits and required be converted either to digit string to a 16-bit binary value which can be used for computation or the ASCII digits themselves can be added that can be followed by instruction which adjust the sum to binary. Let's use conversion operation to perform these calculations here.
Another significant data format is packed decimal numbers (packed BCD). A packed BCD comprises two decimal digits per byte. Packed BCD format has subsequent advantages:
The instructions DAA (decimal adjust after addition) as well as DAS (decimal adjust after subtraction) are used for adjusting result of an addition of subtraction operation onpacked decimal numbers. Though no such instruction exists for division andmultiplication. For the cases of division and multiplication the number should be unpacked. First divided or multiplied and packed again.
Q. Major characteristics of a computer family? Let us summarise the major characteristics of a computer family. These are as below: Figure: Characteristics of computer
Q. In PRAM model steps required for executing an algorithm? Subsequent steps are performed by a PRAM model whenever executing an algorithm: i) Read phase: First the N proc
Voice Identifier - Biometric Computer Security Systems Besides fingerprint, another popular security technology is voice identifier. According to VSS organization (2007), voic
Q. Explain Integrated Disk Electronics Devices? IDE devices are associated to PC motherboard by a 34-wire ribbon cable. Common drive used today for workstations has capacities
Conversioin of the decimal number 82.67 into Octal number ? Ans. The binary equivalent is (1010010.10101011) 2 of decimal number 82.67. After that convert each 3-bit binary in
Vuser_init action haves procedures to login to a server.
The Transaction object is responsible for reading the transaction file, finding the relevant account in the array of customers and applying the transaction. To find the relevant ac
Authorization Bypass is a frighteningly easy process which can be employed with poorly designed applications or content management frameworks. You know how it is... you run a small
Explain the techniques used for protection of user files. This is easier to protect against accidental than malicious misuse. Protection of user files implies that file owne
Customized User Preferences offer tremendous versatility to your individual Bugzilla experience. Let's plunge into what you can do! The first step is to click the "Edit prefs" link
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd