Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Prove the following identities a. A‾B‾C‾ + A‾BC‾ + AB‾C‾ + ABC‾ = C‾ b. AB + ABC + A‾ B + AB‾C = B + AC
Ans.
a. LHS = A'B'C' + A'BC' + AB'C' + ABC'= A'C' (B' + B) + AC' (B' + B)= A'C' + AC' [as B'+B = 1]= C' (A' + A)= C' [since A'+A =1]= RHS.Thus Provedb. LHS = AB + ABC + A'B + AB'C
= B + AC= B (A + A') + AC (B + B')= B + AC [as B + B' = A + A' = 1]= B + AC= RHS.Thus Proved
Q. What is Instruction Register? Instruction Register (IR): Here instructions are loaded before execution. Comments on figure above are as below: All representations are
Conversioin of the decimal number 82.67 into Octal number ? Ans. The binary equivalent is (1010010.10101011) 2 of decimal number 82.67. After that convert each 3-bit binary in
What is divide overflow? The division operation might result in a quotient with an overflow. Overflow happens when the length of the registers is finite and will not hold a nu
CIH, also known as Chernobyl or Spacefiller, is a Microsoft Windows computer virus which first emerged in 1998. It is one of the most damaging viruses, overwriting critical inform
SPC is used for (A) Carrying Exchange Control Functions (B) Carrying Subscriber Control Functions (C) Exchange Hardware (D) Signalling Purpose Ans:
explain the bock and pin diagram of 8259 micropocesser
What are the Advantages of carrying out simulations - saves cost (instead of doing the real thing) - Safer (scenarios tried out on the simulation first before used in real
Convert ASCII code to its BCD equivalent. This can be achieved by simply replacing bits in upper four bits of byte by four zeros. For illustration the ASCII '1' is 32h = 0010B. By
Q. Explain types of Micro-instructions? In general micro-instruction can be classifiedin two general kinds. These are non-branching and branching. After execution of a non-bran
How aliases are used in DNS? Explain. CNAME entries are analogous to a symbolic link in a file system- the entry gives an alias for other DNS entry. Corporation of expertsmind
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd