Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Writing down your own Interrupt Service Routines?
Here are a few rules which should be kept in mind while writing down your own Interrupt Service Routines:
1. Use Int 21h, function 35h to get the needed IVT entry from IVT. Save this entry for later use.
2. Use Int 21h, function 25h to modify IVT.
3. If your program isn't going to stay resident then save the contents of the IVT and later restore them when your program exits.
4. If your program is going to stay resident then use one of the terminate and stay resident functions to reserve proper amount of memory for your handler.
What is use case and use case diagram? A use case is a coherent piece of functionality that a system can give by interacting with actors. Use case includes one or more actors a
Why do you think you are asked to do valuation given an array of discount rates? a. Would it not be extra accurate to utilize, for intsnces , CAPM to calculate cost of equity
What is a deadlock? A deadlock is a situation that can increase when two units, A and B use a shared resource. Assume that unit B cannot complete its task unless unit A complet
How it is useful in real scenario???
Explain the fork-join? fork-join: It is primitives in a programming language of higher level for implementing interacting processes. The syntax is as given below: fork
Enumerate about the Decimal Arithmetic Unit The user of the computer input data in decimal numbers and receives output in the decimal form. But a CPU with ALU can perform arith
Q. Explain Frequency-division multiplexing? Frequency-division multiplexing (FDM) is a technique for data transmission widely used in telephone, radio, and cable TV systems in
Briefly explain how server form post-back works? Post Back: The process in which a Web page sends data back to the similar page on the server. View State: View State is the m
what is penetration technique
Example Calculation: If we see an example we are working with a set of examples like S = {s 1 ,s 2 ,s 3 ,s 4 } categorised with a binary categorisation of positives and negati
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd