Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Write a program to input an address i.e. 20 Hex and read the byte (char) contents of that address
Answer include void main() { char prompt; Date: 26th August 2012
Version 1.0 Function : To read an address in memory Modifications: none*/ unsigned long int address; unsigned char *add; unsigned char data; printf("Please enter in the address you want to read\n\r"); scanf("%lx",&address); add = (unsigned char *)address; data = *add; printf("The data at the address %08lx is %02x\n\r",address,data); printf("Press and key to exit \n\r"); scanf("\n%c",&prompt); } Note: Care should be taken since some operating systems do not allow the user to read any memory address. The PC environment is one of these in that the PC runs under protected memory and hence looking at memory outside this area can yield 'General protection errors '. In order to access the memory in a PC, the operating system must tag the memory area for common use by the program. This is usually achieved by either writing a windows driver for the hardware/address or my poking in an allocated area i.e. allocating static space by an array or using malloc to reserve bytes of area.
Set up the minunit test framework examples in your environment (i.e. build or compile the code). Once you can run the example, use the minunit test framework to create and run a bo
Packet switching is used for (A) Credit card verification (B) Automated Teller Machine (C) The internet and the World Wide Web (D) All of the above Ans
Explain importance of the different types of distributing frames used in exchanges. Here MDF = main distribution frame; MF = main feeder; FP = feeder point; BF = branch f
Q. Explain about Transmission Media? These, also known as physical channels, can be either bounded or unbounded. Bounded media, in which signals representing data are confined
Program generation activity aims at? Ans. At automatic generation of program the program generation activity aims.
Q. What do you mean by Daisy chain? This scheme provides a hardware poll. With this scheme, an interrupt acknowledge line is chain by different interrupt devices. All I/O inter
Prove the equations A + A‾ .B + A.B‾ = A + B using the Boolean algebraic theorems ? Ans. The equation is A + A‾.B + A.B‾ = A + B L.H.S. = A + A‾ .B + A.B‾ = (A + A.B‾) + A‾.B
what inputcombinations may those hazard take place and how can they be eliminated? F1= AB'' + A''C + BC''D'' F2= AB + A''C''D + AB''D
(i) Input a single ASCII character into BL register without echo on screen CODE SEGMENT MOV AH, 08H; Function 08H INT 21H ; the character inpu
THE NEED OF PARALLEL COMPUTATION With the growth of computer science, computational pace of the processors has also increased many a times. Though, there are definite constr
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd