Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Define Stack segment ?
8086 Microprocessor supports Word stack. Stack segment parameters tell the assembler to alert linker that this segment statement states the program stack area.
A program should have a stack area in that computer is continuously carrying on numerous background operations which are completely transparent, even to an assembly language programmer, for illustration a real time clock. Every 55 milliseconds real time clock interrupts. Every 55 ms CPU is interrupted. CPU records state of its registers and then goes about updating the system clock. When it finishes servicing system clock it has to restore registers and go back to doing whatever it was doing when interruption took place. All such information gets recorded in stack. If your program has not any stack and if real time clock were to pulse whereas the CPU is running your program there will be no way for CPU to find the way back to your program when it was through updating the clock. 0400H byte is default size of allocation of stack. Please consider if you haven't specified stack segment it is automatically created.
1. Start to make the verification point. 2. In the confirmation Point Name dialog box, select Apply wait state to confirmation point. 3. Type values for the following option
How many address bits are required to represent a 32 K memory ? Ans. 32K = 25 x 210 = 215, Hence 15 address bits are needed; Only 16 bits can address this.
List the properties which a hashing function should possess to ensure a good search performance. What approaches are adopted to handle collision? A hashing function h must poss
explain the bock and pin diagram of 8259 micropocesser
WAR (write after read) - Data hazards in computer architecture: WAR (write after read) - j tries to write at destination before it is read by i , hence i wrongly gets the n
Q. Options with DIR in DOS? You can use a number of options with DIR. To get the list of files from any other drive, denote the drive name followed by ':' with DIR. For exam
Read only memory (ROM) ROM holds the instructions for starting up the computer. This sort of memory can only be read and can't be altered (that implies deleted or written to) a
Explain Circular Dependencies. Circular Dependencies: To know the problem of circular dependencies consider a file server which uses a timeserver to acquire the current
In 32bit IP Addressing scheme all 1's represent? All 1's represent limited broadcast in 32 bit IP Addressing scheme.
What is the use of fork and exec system calls? Fork is a system call by which a new process is formed. Exec is also a system call, which is used after a fork by one of the two
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd