Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Programmed input - output technique for computers?
Programmed input/output is a useful I/O technique for computers where hardware costs need to be minimised. Input or output operation in these cases may involve:
a) Transfer of data from I/O device to processor registers.
b) Transfer of data from processor registers to memory.
With programmed I/O method responsibility of processor is to constantly check status of I/O device to check whether it's free or it has completed inputting data. So this method is quite time consuming where processor wastes so much time in checking and verifying status of an I/O device. Figure (a) gives an illustration of use of programmed I/O to read in a block of data from a peripheral device into memory.
Q Why we use addressing schemes? An operation code of an instruction tells the operation to be performed. This operation is executed on some data stored in memory or register.
explain djnz instruction of intel 8051 microcontroler
create a BCD adder combinational ckt. that adds 2 digit BCD inputs
Conversion of decimal number 10.625 into binary number ? Ans. There is integer part is 10 and fractional part is 0.625. Firstly convert the decimal number 10 in its equal bina
List the key notions concerning macro expansion. Two key notions relating to macro expansion is: 1. Expansion time control flow- Determines the order of model statements tha
Discuss about variables and assignmesnt statements
Explain why most interrupts are active low? This answers why most signals are active low when you see the transistor level of a module, active low implies that the capacitor in
Algorithm to insert a key in B-tree is as follows: 1. First search is completed for the place where the new record must be put. As the keys are inserted, they are sorted into
Generally the Instruction Set Architecture (ISA) of a processor can be distinguished using five categories: Operand Storage in the CPU - Where are the operands kept other t
Discuss the risks of having a single root user and how more limited management abilities can be given to others users on Linux/UNIX systems.uestion #Minimum 100 words accepted#
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd