Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Show the foundation of ALU design?
The foundation of ALU design starts with micro-operation implementation. Thus let's first explain how bus can be used for Data transfer micro-operations.
A digital computer has many registers and instead of connecting wires between allregisters to transfer information between them, a common bus is used. Bus is a path(comprises a group of wires) one for every bit of a register over which information istransmitted from any of different sources to any of different destinations. In general size of this data bus must be equal to number of bits in a general purposeregister.
A register is selected for transfer of data via bus with help of control signals. The common data transfer path which is the bus is made using the multiplexers. The select lines are attached to the control inputs of multiplexers and bits of one register are chosen so allowing multiplexers to select a specific source register for data transfer.
Design a 32:1 multiplexer using two 16:1 multiplexers and a 2:1 multiplexer Ans. Design a 32 X 1 MUX by using two 16 X 1 MUX and one 2 X 1. Now here total 32 input lines
Cache-Only Memory Access Model (COMA) As we have considered earlier, shared memory multiprocessor systems can use cache memories with each processor for decreasing the execution
Q. Explain how does CPU perform Read and Write operation on peripheral device taking suitable example in case of Synchronous Technique.
State about the Three-dimensional digitizers Three-dimensional digitizers use sonic or electromagnetic transmissions to record positions. One electromagnet transmission method
State and prove Demorgan’s First theorems: Ans. Statement of First Theorem of De Morgan: = A‾. B‾ Proof: The two sides of the equation i.e. = is represented with logic
What is Locking? When two users at the same time attempt to access the similar data record, this is synchronized by a lock mechanism
Here are some common development milestones that you should aim for: 1. Send a packet over. Send an acknowledgement back. 2. Have checksum algorithm executed 3. Ability t
Q. Definition of Decision support system? Definition of DSS: A decision support system is a specific kind of information system which is an interactive system that supports in
How many methods used to control traffic flowing into and out of the network by firewall? Firewalls utilize one or more of three ways to control traffic flowing into and out of
A red and blue car were involved in a head-on collision. The red car was at a standstill and the blue car was possibly speeding. Eye witness video recorded suddenly following the
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd