Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Floating Point Representation in Memory
1. Describe the various ways of floating point representation in memory. What is the importance of normalizing the mantissa in this representation? Explain it by example(s)?
2. a) Define a structure to store roll no, name and marks of a student.
b) Using the structure of Q2. a), above write a 'C' program to create a file "student.dat". There must be one record for every student in the file. Accept the data from the user.
c) Using the "student.dat" of Q2. b), above write a 'C' program to search for the details of the student whose name is entered by the user.
3. How is communication between computers established in Internet. What characteristics need to be defined in a communication protocol? Explain the physical and logical paths in a computer communication network also.
What do you mean by Protocol? In the context of data networking, a protocol is a formal set of rules and conventions that governs how computers exchange information over a netw
#clasification of inductor
c program to implement the ospf
5 IGRP supports a feature that permits traffic to be distributed among up to 6 (4 default) paths to give greater allover throughput and reliability. What is this called? Ans) An
Q. Explain about line coding? Line Coding Procedure of converting binary data to a digital signal DC Components Residual dc (direct-current) components or
Dynamic Process Groups To generate and manage dynamic groups, a separate library libgpvm3.a must be connected with the user programs that make use of any of the set functions.
Q. What is Boundary Level Masking? If mask numbers are either 255 or 0: Bytes in the IP address that correspond to 255 in the mask will be repeated in the subnet ma
Q. What are the Error Correction Techniques ? Error Correction Error Correction Techniques Retransmission Forward Error Correction Burst Error Corre
What are the important topologies for networks? BUS topology: In this every computer is directly linked to primary network cable in a single line. Advantages: Inexpensive,
What is Error Detection? What are its methods? Data can be corrupted during transmission. For reliable communication errors must be deducted and corrected. Error Detection uses
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd