Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Features of read-only memory?
ROMs are memories on which it's not possible to write data when they are on-line to computer. They can only be read. This is reason why it is known as read-only memory (ROM). Because ROM chips are non-volatile, data stored inside a ROM aren't lost when power supply is switched off unlike case of a volatile RAM chip. ROMs are also called as permanent stores.
ROMs can be used for storing system programs, micro-programs and subroutines. ROMs are non-volatile in nature and require not be loaded in a secondary storage device. ROMs are fabricated in large numbers in a manner where there is no room for even a single error. However this is an inflexible process and needs mass production. So a new kind of ROM known as PROM was designed that is also non-volatile and can be written only once and therefore name Programmable ROM (PROM). Supplier or customer can perform writing process in PROM electrically. Special equipment is required to perform this writing operation. Thus PROMs are more flexible and convenient than ROMs.
ROMs / PROMs can be written just once but in both cases whatever is written once can't be changed. However what about a case where you read mostly but write just very few times? This led to concepts of read mostly memories and the best illustration of these are EPROMs (Erasable PROMs) and EEPROMs (Electrically Erasable PROMs).
Explain the importance of Object Oriented Modelling It is important to note that wi t h the growing complexity of systems, significance of modelling techniques increases. Beca
MINI PROJECT ON UNIVERSITY SCHEMA
Important points of simulations In this simulation it is essential to consider: (1) What and how data is gathered (2) How simulation is done (3) How system would wo
What is virtual memory? Virtual memory is a technique that permits the execution of processes that may not be completely in memory. It is the separation of user logical memory
Draw a circuit of TTL gates with Wired-AND connection and explain its operation. Wired - AND Connection In digital IC's NAND and NOR gates are most frequently used. For th
Q. Displays a format of floating-point number? A floating binary number +1010.001 in a 16-bit register is able to be represented in normalised form (presuming 6 bits for expone
Q. Illustrate basic working of Physical layer? Physical layer: Physical layer is concerned with sending raw bits between source and destination nodes over a physical medium.
Define bootstrap loader? The ROM portion of main memory is required for storing an initial program known as bootstrap loader. It is a program whose function is to start the com
Illustrate 16-bit ISA? Compare it with 8-bit ISA bus. The only difference between 8 and 16-bit ISA bus is that an extra connector is attached behind the 8-bit connector. 16-b
Which technique is an encryption technique? Ans. Block cipher technique and also Steam cipher technique is an encryption technique.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd