Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Features of read-only memory?
ROMs are memories on which it's not possible to write data when they are on-line to computer. They can only be read. This is reason why it is known as read-only memory (ROM). Because ROM chips are non-volatile, data stored inside a ROM aren't lost when power supply is switched off unlike case of a volatile RAM chip. ROMs are also called as permanent stores.
ROMs can be used for storing system programs, micro-programs and subroutines. ROMs are non-volatile in nature and require not be loaded in a secondary storage device. ROMs are fabricated in large numbers in a manner where there is no room for even a single error. However this is an inflexible process and needs mass production. So a new kind of ROM known as PROM was designed that is also non-volatile and can be written only once and therefore name Programmable ROM (PROM). Supplier or customer can perform writing process in PROM electrically. Special equipment is required to perform this writing operation. Thus PROMs are more flexible and convenient than ROMs.
ROMs / PROMs can be written just once but in both cases whatever is written once can't be changed. However what about a case where you read mostly but write just very few times? This led to concepts of read mostly memories and the best illustration of these are EPROMs (Erasable PROMs) and EEPROMs (Electrically Erasable PROMs).
Execution of a program in CPU is completed employing different set of registers and their individual circuitry. As CPU registers are used for execution of interrupt service routine
Q. Define Logical data as operand data type? Every word or byte is treated like a single unit of data. Whenever an n-bit data unit is considered as comprising n 1-bit items of
Minimum possibility -minimax algorithm: Finally, we want to put the scores on the top edges in the tree. So there is over again a choice. Whenever, in this case, we have to r
Clipboard is a temporary storage location in Windows. The clipart will kept one piece of information at a time when it is manually added to the clipart or is copied there.
What are the different parameter passing mechanisms to a function? The different parameter-passing mechanisms are given below: 1. Call by value 2. Call by value-resu
shell script for addnames that has to be called as class list in the name of the class list file and username is a particular student''s username
An array is referencing using a base array value as well as an index. To simplify addressing in arrays 8086 has provided two index registers for mathematical computations viz. BP a
what is the use of d-flipflop in associative memory
Q. Show Programming Based on Data Parallelism? In data parallel programming model the focal point is on data distribution. Every processor works with a part of data. We will co
Differentiate between Protection and Security Operating system contains a collection of objects, hardware or software. Every object has a unique name and can be accessed via a
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd