Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
MAGNETIC CORE MEMORY:
This type of memory is used extensively in airborne digital systems, although integrated circuits are being developed with most modern aircraft systems. This system works by a Ferro-magnetic material will become magnetized if placed in the proximity to an electric current. Each bit in the magnetic core memory is a ferrite ring in which a magnetic field can be induced by a current flowing in a wire. Figure 9 shows typical ferrite ring for storing a single bit.
Ferrite Ring Memory
Although the wire carrying the current is wound round the ring, the same effect is obtained if the wire passes through the ring. This is a more convenient way to set the magnetic state of each ring when a plane of cores is built. The advantage of this type of memory is that when the power is removed it holds its state, i.e. it is a non-volatile memory. A matrix of cores containing 16 bits of information is shown in Figure.
16 Bit Ferrite Memory
Software Licensing: Until early 1970's, sharing of software was the accepted norm. Hardware came bundled with software products which could be freely redistributed and the acc
Computer as a Data Processor: The main function of a computer is to process the input data according to a specific program to produce the desired output. This is the reason wh
1. What actions need to be taken when a program terminates or a process is killed? What if that process destruction is not the consequence of normal termination, but rather is the
TYPES OF PC: In general, basic function of all the computers is same i.e. Computers accept data as input, perform operations on these data and generates the desired output t
I WANT TO CONNECT A PC WIYH MY PC THROUGH REMOTE DESKTOP. WHAT I DO TELL ME PLEASE
1. The standard way for debuggers to plant breakpoints in a program in RAM (whatever the processor instruction set) is to save the breakpointed instruction and replace it by a jump
What is the key characteristic of ROM?
DATA TRANSMISSION: When we talk on the telephone we generally transmit a message to someone else. The message is made up of words that we speak into the telephone instrument.
hitory and genration of computer
Uninformed Search Strategies: To be able to undertake a regular search, our entire agent ought to know is the starting state, the possible operators and how to check whether th
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd