Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Write a program to input an address i.e. 20 Hex and read the byte (char) contents of that address
Answer include void main() { char prompt; Date: 26th August 2012
Version 1.0 Function : To read an address in memory Modifications: none*/ unsigned long int address; unsigned char *add; unsigned char data; printf("Please enter in the address you want to read\n\r"); scanf("%lx",&address); add = (unsigned char *)address; data = *add; printf("The data at the address %08lx is %02x\n\r",address,data); printf("Press and key to exit \n\r"); scanf("\n%c",&prompt); } Note: Care should be taken since some operating systems do not allow the user to read any memory address. The PC environment is one of these in that the PC runs under protected memory and hence looking at memory outside this area can yield 'General protection errors '. In order to access the memory in a PC, the operating system must tag the memory area for common use by the program. This is usually achieved by either writing a windows driver for the hardware/address or my poking in an allocated area i.e. allocating static space by an array or using malloc to reserve bytes of area.
algorithm of travalling salesman problam
Define clock rate? The clock rate is given by, R=1/P, where P is the length of single clock cycle.
Explain CPU based exchange. CPU Based Exchange: All the control equipment is replaced with a single processor that must be quite powerful, in centralized control. This should
What is Hamiltonian path? A Hamiltonian path in a directed graph G is a directed path that goes through every node exactly once. We consider a special case of this problem whe
Program 'preemption' is? Ans. Forced de allocation of the CPU from a program that is executing on the CPU is called preemption program.
Explain Resource request and allocation graph (RRAG) Deadlocks can be explained by a directed bipartite graph known as a Resource-Request-Allocation graph (RRAG).A graph G = (V
Explain the basic architecture of digital switching systems. An easy N X N time division space switch is demonstrated in figure. The switch can be shown in an equivalence for
Question: a) Explain why pervasive computing can be termed as a "technology that disappears". b) List and describe four main components of a MOTE used in Wireless Sensor N
Digital versatile disk (DVD) This is an optical system for storing data. It's similar to CD though typically can hold 4.7 Gbyte of data compared to only 700 MB of data on a CD.
diifference between pure and impure interpeter
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd