Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Conversion of decimal number 10.625 into binary number ?
Ans. There is integer part is 10 and fractional part is 0.625. Firstly convert the decimal number 10in its equal binary number that is, divide 10 with 2 until the quotient becomes 0 shown in table.
Quotient
Remainder
10
2
5
0
1
Therefore, the integer part 10 is equivalent to binary number 1010. After that convert the decimal fractional part 0.625 in its binary form that is, multiply 0.625 with 2 until the remainder becomes 0.
Therefore, the decimal fractional part 0.625 is equivalent to binary number 0.101. Thus the decimal number 10.625 is equivalent to binary number 1010.101.
Q. Explain about data registers? The data registers are used just for storing intermediate results or data and not for operand address calculation. Some dedicated address re
Stack overflow causes (A) Hardware interrupt. (B) External interrupt. (C) Internal interrupt. (D) Software interrupt. Stack overflow occurs whereas execution
Specified the code segment below and that n is the problem size, answer the following queries: // . . . int sum = 0; if(x > 12){ for(int i = 1; i for( i
#questi on.. How it works explain
Question (a) A 500 MHz Pentium III processor takes 2 ms to run a program with 200,000 instructions. A 300 MHz UltraSparc processor takes 1.8 ms to run the same program with 23
differentiate between multitasking and multithreading in java
What is Assembler A macro-assembler or assembler normally forms a part of operating system. That translates an assembly language program into machine language program.
What is a flip-flop? What is the difference between a latch and a flip-flop? List out the application of flip-flop. Ans. Flip-Flop: It is a fundamental memory element utilize
Explain about the Public Key Cryptography. Public Key Cryptography: It is a cryptographic system which uses two keys as a public key identified to everyone and a private
Difficulties - canonical genetic algorithm: Therefore the first big problem we face whether designing an "AI" agent to perform a GA-style search is how to represent the soluti
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd