Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Write a program to input an address i.e. 20 Hex and read the byte (char) contents of that address
Answer include void main() { char prompt; Date: 26th August 2012
Version 1.0 Function : To read an address in memory Modifications: none*/ unsigned long int address; unsigned char *add; unsigned char data; printf("Please enter in the address you want to read\n\r"); scanf("%lx",&address); add = (unsigned char *)address; data = *add; printf("The data at the address %08lx is %02x\n\r",address,data); printf("Press and key to exit \n\r"); scanf("\n%c",&prompt); } Note: Care should be taken since some operating systems do not allow the user to read any memory address. The PC environment is one of these in that the PC runs under protected memory and hence looking at memory outside this area can yield 'General protection errors '. In order to access the memory in a PC, the operating system must tag the memory area for common use by the program. This is usually achieved by either writing a windows driver for the hardware/address or my poking in an allocated area i.e. allocating static space by an array or using malloc to reserve bytes of area.
Secondary storage: Secondary storage (or external memory) differs from primary storage in that aspect it is not accessible by the CPU directly. The computer typically uses its
What is Operational Research?
Why is the Wait-For-Memory-Function-Completed step required when reading from or writing to the main memory? WMFC step is needed for the write control signal / read control si
What does WSDL stand for? WSDL stands for Web Services Description Language. It is an XML representation of the web service interface. There are two parts of the operation
Q. Environment of the Packet Flow? Protocol stack used on Internet is referred to as TCP/IP protocol stack. If we were to follow the path that message "Hello computer 5.6.7.8!"
Applications Of Parallel Processing Parallel computing is an development of serial computing that effort to emulate what has always been the affirm of affairs in the natural wo
Q. What are the basic components of an expert system? ANSWER: There are three components of components: Information, people, and IT components. Information kinds are domain exp
Http Hyper Text Transfer Protocol: The WWW protocol that performs the request and regain functions of a server. Generally seen as the first part of a website address. It is t
Eequivalences rules: This conveys a meaning that is actually much simpler so than you would think on first inspection. Hence we can justify this, by using the following ch
How does the system handle roll areas for external program components? Transactions run in their own roll areas. Reports run in their own roll areas. Dialog modules run
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd