Does c have circular shift operators, Computer Engineering

No C don't have circular shift operator. (Part of the reason why that is the sizes of C's types aren't precisely described----but a circular shift makes most sense when applied to a word of a particular known size.)

You can execute a circular shift using two regular shifts and a bitwise OR:

(x << 13) | (x > >3) /* circular shift left 13 in 16 bits */      

 

 

Posted Date: 4/8/2013 3:10:43 AM | Location : United States







Related Discussions:- Does c have circular shift operators, Assignment Help, Ask Question on Does c have circular shift operators, Get Answer, Expert's Help, Does c have circular shift operators Discussions

Write discussion on Does c have circular shift operators
Your posts are moderated
Related Questions
ascii code add=2unit,replace=1unit,delete=3unit.convert ascii code in minimum cost

An HTML document can be created by using any HTML editor or text editor such as notepad etc. STEPS FOR CREATING A SIMPLE HTMLPROGRAM   1. Go to Start -> Programs->A

Prolog Programming Language - Artificial intelligence: Most of the programming languages are procedural: the programmer specifies exactly the correct instructions (algorithms)

Determine the hardware for multiplication The hardware for multiplication consists of equipment given in Figure. The multiplier is stored in register and its sign in Q . The se

Minimize the logic function F(A, B, C, D) = ∑ m(1,3,5,8,9,11,15) + d(2,13) using NOR gates with help of K-map. Ans. Realization of given expression by using NOR gates: In POS

Explain data rates in public switched telephone network. Data rates in PSTNs : A voice channel in a public switched telephone network is band restricted with a nominal bandwid


Example:                         CMP    AX,BX    ; compare instruction: sets flags JE        THERE    ; if equal then skip the ADD instruction  ADD  AX, 02    ; add 02

What do you understand by Hit ratio? When a processor refers a data item from a cache, if the referenced item is in the cache, then such a reference is called hit. If the refer

State the implementation of a security policy The implementation of a security policy should invariably cover all parameters of security such as physical access to the server,