Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Within micro controller's software, it is very useful to be able to manipulate binary bits i.e. from ports etc. The ALU has command to shift data, rotate data, compare data, set/clear bits, test bits and logical operate on data.
LSLA i.e shift A one place to the left fill up with 0 LSLB i.e shift B one place to the left fill up with 0 LSRA i.e shift A one place to the right fill up with 0 LSRB i.e shift B one place to the right fill up with 0 ROLA i.e rotate A one place to the left through carry ROLB i.e rotate B one place to the left through carry RORA i.e rotate A one place to the right through carry RORB i.e rotate B one place to the right through carry CBA i.e A-B with no answer stored just flags set CMPA i.e compare A with memory i.e A-M CMPB i.e compare B with memory i.e B-M BSET $20,#$1 i.e set bit 1 of memory address 20 BCLR $20,#$1 i.e clear bit 1 of memory address 20 BITA $20 i.e Check bit mask found in A with address 20 BITB $20 i.e Check bit mask found in A with address 20 ANDA $20 i.e logical and A with data at address 20 EXORA $20 i.e logical exor A with data at address 20 COM $20 i.e logical invert data at address 20 ORRA $20 i.e logical OR A with data at address 20 MUL ;Multiplies axb and stores the answer in D i.e both FDIV ;Fractional divide using D/IX IDIV ;Integer divide using D/IX ADDD ;16 bit add to D DAA ;Decimal adjust add sum to BCD data
Write short note on Quantization. Quantization: This is the first step in PCM. The whole amplitude range of the modulating signal is divided in a number of standard levels term
The preorder traversal sequence of a binary search tree is 30, 20, 10, 15, 25, 23, 39, 35, 42. Which one of the following is the postorder traversal sequence of the same tree?
Q. Illustarte Basic Flip-flops? Let's first see a ordinary latch. A latch or flip-flop can be created employing two NOR or NAND gates. Figure (a) presents logic diagram for S-R
At the bottom of the toolbar there is a box with two lesser boxes and an arrow. The uppermost box displays the present foreground color; the lowermost box shows the present backgro
Distributivity of Connectives : In our last analogy with arithmetic will involve a very well-technique need for playing around with algebraic properties. But assume there if w
What are the various address Translation schemes? Explain which scheme is used in Internet? Translation from a computer's protocol address to a corresponding hardware address i
There is a built-in function function known as cellfun that evaluates a function for each element of a cell array. Make a cell array, then call the cellfun function, passing the h
Describe the scheme of capability lists to implement protection? Capability lists (C- lists): These lists are utilized to make sure that uses only access files that are e
Determine about the Security methods Security methods also protect information from accidental or intentional modification, manipulation or destruction. Most security experts o
Example of Variables and quantifiers: We should have started with something such which reflects the fact that we're really talking for some meal at the Red Lion, neverthe
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd