Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Illustrate Character Coded Data?
The input output happens in the form of ASCII data. These ASCII characters are entered as a string of data. For illustration to get two numbers from console we can enter numbers as:
As every digit is inputwe will store its ASCII code in a memory byte. After first number was input number will be stored as follows:
Number is entered as:
Every one of these numbers would be input as equivalent ASCII digits and required be converted either to digit string to a 16-bit binary value which can be used for computation or the ASCII digits themselves can be added that can be followed by instruction which adjust the sum to binary. Let's use conversion operation to perform these calculations here.
Another significant data format is packed decimal numbers (packed BCD). A packed BCD comprises two decimal digits per byte. Packed BCD format has subsequent advantages:
The instructions DAA (decimal adjust after addition) as well as DAS (decimal adjust after subtraction) are used for adjusting result of an addition of subtraction operation onpacked decimal numbers. Though no such instruction exists for division andmultiplication. For the cases of division and multiplication the number should be unpacked. First divided or multiplied and packed again.
CISC Approach - CISC architecture: The main goal of CISC architecture is to finish a task in as few lines of assembly as possible as. This is gain by building processor hardwa
What are the steps comprised in authentication? Steps in Authentication: The control over the access of the resources within the repository is exercised in two steps tha
Address symbol table is generated by the (A) memory management software. (B) assembler. (C) match logic of associative memory. (D) generated by operating system
write a short note on the tri state ttl inverter
A red and blue car were involved in a head-on collision. The red car was at a standstill and the blue car was possibly speeding. Eye witness video recorded suddenly following the
Ask questiPower and EnergyQuestion 4Consider a processor that runs at 2.5 GHz and 1 Volt. When running a given CPU-bound program,the processor consumes 100 W, of which 20 W is leak
Q. What is Parallel Loop Construct? Parallel loop construct is a shortcut for specifying parallel construct comprising one loop construct and no other statements. The syntax of
How many types of keys used to encrypt and decrypt data in Secure Sockets Layer? Two forms of keys are used as ciphers to decrypt and encrypt data. Private keys are referred to
What is ASP.NET Authentication Providers and IIS Security? ASP.NET implements authentication using authentication providers, which are code modules that verify credentials and
Implementing Protection with Virtual Memory - computer architecture: To enable the operating system to implement protection in the VM system, the HW have to: I. Support at
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd