Skip to content

Buzz Folder

  • Home
  • Blog

Blog

_______ are events that alter the normal flow of execution i…

_______ are events that alter the normal flow of execution in a computer system. They are used for I/O, error handling, and other miscellaneous events.

Published April 21, 2021
Categorized as Uncategorized

With a ________ processor, a different thread can be used to…

With a ________ processor, a different thread can be used to execute the ISR, as a result the main program will not be put on hold.

Published April 21, 2021
Categorized as Uncategorized

What is the maximum byte addressable memory capacity (in byt…

What is the maximum byte addressable memory capacity (in bytes) if the address bus is 10 bits?

Published April 21, 2021
Categorized as Uncategorized

For _______ architecture only Load and Store instructions ca…

For _______ architecture only Load and Store instructions can reference the memory.

Published April 21, 2021
Categorized as Uncategorized

Translate the following C statement into assembly program, a…

Translate the following C statement into assembly program, assuming 32-bit signed integers x is stored in 32-bit register r0.  z is a global variable, stored in main memory. Initialize x to 5.   z = x + 3;

Published April 21, 2021
Categorized as Uncategorized

Translate the following C statement into assembly program, a…

Translate the following C statement into assembly program, assuming 32-bit signed integers x is stored in 32-bit register r0.  z is a global variable, stored in main memory. Initialize x to 5.   z = x + 3;

Published April 21, 2021
Categorized as Uncategorized

DMA operation requires the execution of an ISR by the CPU.

DMA operation requires the execution of an ISR by the CPU.

Published April 21, 2021
Categorized as Uncategorized

GCC directive, __________ must be used to allocate 2 bytes f…

GCC directive, __________ must be used to allocate 2 bytes for a variable.

Published April 21, 2021
Categorized as Uncategorized

What is in eax after this x86 assembly program is executed?…

What is in eax after this x86 assembly program is executed?      PUSH 5     PUSH 2     PUSH 3     POP ebx     POP eax     PUSH eax     POP ecx

Published April 21, 2021
Categorized as Uncategorized

__________ is a techniques used in computers for managing co…

__________ is a techniques used in computers for managing complexity, this consists of hiding details when they are not important.

Published April 21, 2021
Categorized as Uncategorized

Posts pagination

Newer posts Page 1 … Page 51,995 … Page 57,469 Older posts
Powered by Studyeffect
  • Privacy Policy
  • Terms of Service
Buzz Folder
Proudly powered by WordPress.