Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Write a program to input an address i.e. 20 Hex and read the byte (char) contents of that address
Answer include void main() { char prompt; Date: 26th August 2012
Version 1.0 Function : To read an address in memory Modifications: none*/ unsigned long int address; unsigned char *add; unsigned char data; printf("Please enter in the address you want to read\n\r"); scanf("%lx",&address); add = (unsigned char *)address; data = *add; printf("The data at the address %08lx is %02x\n\r",address,data); printf("Press and key to exit \n\r"); scanf("\n%c",&prompt); } Note: Care should be taken since some operating systems do not allow the user to read any memory address. The PC environment is one of these in that the PC runs under protected memory and hence looking at memory outside this area can yield 'General protection errors '. In order to access the memory in a PC, the operating system must tag the memory area for common use by the program. This is usually achieved by either writing a windows driver for the hardware/address or my poking in an allocated area i.e. allocating static space by an array or using malloc to reserve bytes of area.
MP4 (MPEG-4) MPEG-4 files are in a format which can hold a mixture of multimedia objects like video, audio, animation, images etc. MP4 players again use compression technology
Can we display a list in a pop-up screen other than full-size stacked list? Yes, we can show a list in a pop-up screen using the command WINDOW with the additions beginning at
What are the ways to truncate guard bits? 1. Chopping 2. Von Neumann rounding 3. Rounding procedure.
SELECTIVE COMPLEMENT The selective-complement process complements bits in register A where there are corresponding 1's inside register B. It does not affect bit positions which
Explain about the MINI COMPUTER Minicomputers are much smaller in size than mainframe computers and they are also less expensive. The cost of these computers can differ from a
Draw and illustrate the block diagram of DMA controller. Also discuss the various modes in which DMAC works. Direct memory access (DMA) is a process in that an external device
Full form of is DHCP: Dynamic Host Control Protocol. It is mainly used to bound MAC Addresses of system. Especially for Wireless System.
What are the attributes of a field that can be activated or deactivated during runtime? Input, Output, Mandatory, Active, Highlighted, Invisible.
Classification of Pipeline Processors In this part, we explain various types of pipelining that can be useful in computer operations. These types depend on the following factor
code for padovan string problem
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd