Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Interconnection network in the form of a Linear Array?
The sorting problem particularly selected is bubble sort and interconnection network may be represented as n processors interconnected with one another in form of a linear array like displayed in Figure below. The method adopted for solving the bubble sort is called odd-even transposition. Suppose an input sequence is B= (b1, b2, b3, b4......... bn) and every number is assigned to a specific processor. In the odd-even transposition the sorting is done with the help of two stages known as odd phase and even phase. In the odd stage the elements stored in (p1, p2), (p3, p4), (p5, p6)......... (pn-1, pn) are compared according to Figure and consequently exchanged if needed it implies that if they are out of order. In even phase the elements stored in (p2, p3), (p4, p5), (p6, p7)......... (pn-2, pn-1) are compared according to the Figure and consequently exchanged if needed i.e. if they are out of order. Remember in the even phase the elements stored in p1 and pn aren't exchanged and compared. The total number of phases needed for sorting the numbers is n it implies that n/2 even phases and n/2 odd phases. The algorithmic demonstration of the above considered odd-even transposition is given below:
Figure: Interconnection network in the form of a Linear Array
Described different types of addressing modes available? Ans: The various types of addressing modes available are following: Register addressing mode Immediate ad
What is Error detection code? It is a binary code that notice digital errors during transmission. The detected errors cannot be correct but the presence is shown.
Q. Explain Functional Roles of Information System? Functional Roles of Information System 1 Lower Costs - a) Use IT to significantly reduce the cost of business proce
Two computers using TDM take up turns to send 100-bytes packet over a shared channel that operates at 64000 bits per second. The hardware takes 100 microseconds after one computer
In binary representation there are some states that are believed to be never occurred because of some particular functionality of a given circuit. If zero output is assigned to suc
Hardware Implementation for signed-magnitude data When multiplication is implemented in digital computer, we change process lightly. Here, in place of providing registe
The process of entering data into a ROM is called ? Ans. The process of entering data in ROM is termed as programming the ROM.
Clustering has been existing since the 1980s when it was used in DEC's VMS systems. IBM's SYSLEX is a cluster approach for a mainframe system. Sun Microsystems, Microsoft, and othe
What is the maximum size of a database that can be opened in Microsoft Access? Ans) 1 Gigabyte
Explain about the network security. Network security implies the protection of networks and their services through unauthorized access, destruction or disclosure, modificati
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd