Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Features of read-only memory?
ROMs are memories on which it's not possible to write data when they are on-line to computer. They can only be read. This is reason why it is known as read-only memory (ROM). Because ROM chips are non-volatile, data stored inside a ROM aren't lost when power supply is switched off unlike case of a volatile RAM chip. ROMs are also called as permanent stores.
ROMs can be used for storing system programs, micro-programs and subroutines. ROMs are non-volatile in nature and require not be loaded in a secondary storage device. ROMs are fabricated in large numbers in a manner where there is no room for even a single error. However this is an inflexible process and needs mass production. So a new kind of ROM known as PROM was designed that is also non-volatile and can be written only once and therefore name Programmable ROM (PROM). Supplier or customer can perform writing process in PROM electrically. Special equipment is required to perform this writing operation. Thus PROMs are more flexible and convenient than ROMs.
ROMs / PROMs can be written just once but in both cases whatever is written once can't be changed. However what about a case where you read mostly but write just very few times? This led to concepts of read mostly memories and the best illustration of these are EPROMs (Erasable PROMs) and EEPROMs (Electrically Erasable PROMs).
When the user is inputting commands into your shell, it should identify the left, right , up and down arrow keys. To implement this, you will need to use the termios.h library to
At a shop of marbles, packs of marbles are prepared. Packets are named A, B, C, D, E …….. All packets are kept in a VERTICAL SHELF in random order. Any numbers of packets with thes
Arc Consistency: There have been many advances in how constraint solvers search for solutions (remember this means an assignment of a value to each variable in such a way that
please suggest me ,how to write microopertions,and study for computer architecture
What is object orientation? Object orientation means that we classify software as a collection of discrete objects that incorporate with together DS and behaviour. Four aspe
Q. Describe the Limitation of FAT16? DOS designers decided to use clusters with as a minimum four sectors in them (so a cluster size of at least 2KB) for all FAT16 hard disks.
Q. Design issues related to interrupt-driven Input - output? So interrupt handling includes interruption of currently executing program, execution of interrupt servicing progra
Echo suppressor is detrimental to full duplex operation because? This disables one of the two pairs in a four-wire trunk line while a signal is detected upon another pair.
A protocol is a formal description of message formats and the rules two or more machines must follow to exchange those messages. Because TCP (transmission control protocol) and IP
Q. Steps uesd in quine mckluskey method? Step I: Build a table in that every term of expression is represented in row (Expression must be in SOP form). Terms can be expres
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd