Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Why does DMA have priority over the CPU when both request a memory transfer?
The data transfer monitored by DMA controller which is called as DMA channel. The CPU is included only at the starting and end of the transfer, when the CPU wishes to read or write a block of data, it issues a command to DMA Channel by sending read/write operation, address of I/O, number of words to be read or written, as DMA have priority over the CPU when both request a memory transfer.
Q. Interfacing of keyboards? The keyboard employs a special Input/output port which is similar to a serial port however doesn't explicitly follow the RS-232 serial port standar
There are various approaches to the classification of Computer Networks. One such classification is based on distance approach. Networks can be classified into LAN, WAN and MAN net
Q. Example of shared programming using library routines? Think about subsequent set of statements Process A Process B :
Make a data structure to store information about the elements in the periodic table of elements. For each element, store the name, atomic number, chemical symbol, class, atomic we
By 2 pointers you can find it. One of them goes 2 nodes each time. The second one goes at 1 node each time. If there is a cycle, the one that goes 2 nodes every time will eventuall
What is logical address space and physical address space? The set of all logical addresses generated by a program is known as a logical address space; the set of all physical a
State about the multiple inheritance multiple inheritance is shown in Figure. In this, one class is inherited from more than one class.
Explain the Modularity of Object oriented analysis Modularity is closely attached to encapsulation; you may think of it as a way of mapping encapsulated abstractions into phys
Which technique is an encryption technique? Ans. Block cipher technique and also Steam cipher technique is an encryption technique.
Indirect addressing mode - assembly language: The Indirect addressing mode and the address field of the instruction refers to the address of a word in memory, which in turn co
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd