Where is the Full list of Interrupt Vector Table?
The interrupt vector table in the 8086/8088 is the first 1024 bytes in memory. There are 256 vectors, each containing 4 bytes, CS:IP, for each possible interrupt source.
What is unguided media and its type?
Media that is unguided has no connections, wires, or joined devices. This includes infrared, micro, radio, and even satellite waves.
Write a routine to implement the t e x t function?
There are many ways you could write a routine to implement text functions. You could, for example, come up with codes.
Pre indexing post indexing difference between?
what are the differents between preindexing and post indexing?
What is a flowchart for finding perfect no?
flow chart to find whther the given number is perfect or not
zero
-Aval Preet Singh
Do digital signals have amplitude?
Yes. Digital signals have amplitude, as you do need to quantitatively specify the range of amplitudes that a signal must have to be considered in one state or the other. However, the actual amplitude is generally meaningless, so long as it is within the prescribed limits.
What is difference between Deep copy and shallow copy?
A "shallow" copy is when the member values are physically copied from one
object to another, *including* the values of any pointer or reference
members. If there are pointer or reference memebrs, then, those poointers
or references refer to the *same* objects as the original object, which is
usually a bad thing. That's why you want to define a copy constructor and
assignment operator for objects that contain pointers or references.
It's called a "shallow" copy because only the values of the
pointers/references are copied, instead of making copies of those
referred-to objects and setting pointers to them. *That* is what would be
called a "deep" copy, because it's going "deeper" into the structure,
copying everything, not just the first "layer".
Value of automatic variable that is declared but not intialized?
The value of an automatic variable that is declared but not initialized is indeterminate.
Some debug implementations will preset uninitialized variables to a known state, such as 0xcccccccc, or my favorite, 0xcacacaca, but that is just a hint that you are doing something very, very wrong if you ever encounter such a value.
The limitation of Error Backpropagation Algorithm and its Application?
The gradient descent algorithm is generally very slow because it requires small learning rates for stable learning. The momentum variation is usually faster than simple gradient descent, because it allows higher learning rates while maintaining stability, but it is still too slow for many practical applications. These two methods are normally used only when incremental training is desired. You would normally use Levenberg-Marquardt training for small and medium size networks, if you have enough memory available. If memory is a problem, then there are a variety of other fast algorithms available. For large networks you will probably want to use trainscg or trainrp.
Multilayered networks are capable of performing just about any linear or nonlinear computation, and can approximate any reasonable function arbitrarily well. Such networks overcome the problems associated with the perceptron and linear networks. However, while the network being trained might theoretically be capable of performing correctly, backpropagation and its variations might not always find a solution
Write a C program to find out whether character passes through keybroad is a digit or not?
hey..it s simple..make use of built-in function isdigit(character)..it s in stdlib.h...
A symbolic constant is a constant with a name, numeric constants are unnamed and must be retyped in the code on each usage. Generally use of symbolic constants is preferred as it makes the code self documenting and allows the compiler to catch typing errors in constant usage.
DIFFERENT PARTS OF A DESKTOP: â—‹TASKBAR -> a long horizontal bar at the bottom of a desktop. â—‹ICONS -> a small image with a text label representing objects like documents, application,folders,devices,etc.â—‹WALLPAPER ->the background screen of a desktop.elow,,add nio ko..FS:audiztah_jajamin36@yahoo.com..unun lng..tq!..
What types of locations can hold source and destination operands?
Source and result operands can be in one of four areas:
• Main or virtual memory: As with next instruction references, the main or virtual memory address must be supplied.
• Processor register:With rare exceptions, a processor contains one or more registers that may be referenced by machine instructions. If only one register exists,reference to it may be implicit. If more than one register exists, then each register is assigned a unique name or number, and the instruction must contain the number of the desired register.
• Immediate: The value of the operand is contained in a field in the instruction
being executed.
• I/O device: The instruction must specify the I/O module and device for the operation.If memory-mapped I/O is used, this is just another main or virtual
memory address.
its true.
Define method overloading and write two method headers that together exhibit overloading?
Method overloading is when two or more methods have the same name, but the computer can differentiate between the methods by looking at the parameters.
Example:
public static void go(int x)
public static void go(double x)
If you pass an int, the first method would be called. If you pass a double, the second method would be called
for 8 bit synchronous serial transmission total transmitted characters will be
1200/8
and for asynchronous transmission with 1 stop total bit will be (8+1+1=10) i.e. (8 bit + start bit+stop bit)
so transmitted characters will be
1200/10