Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

1) describe the operation of NPN and PNP transistors.

2) Describe the construction and operation of A/D and D/A converters.

3) Describe the architecture of the RAM and ROM with the help of suitable diagram.

4) Describe the working of the synchronous and Asynchronous Counter with the help of state diagram.

5) Sketch the architecture of 8085 and list the functions.

6) Describe the following elements:

a) ALU

b) CPU

c) Control Unit

6) Specify the assembly language program for addition of two 2-digits BCD Number.

7) Describe the instruction set of 8085.

9) Sketch the Block diagram and describe the operations traffic light and stepper motor controller.

10) Describe how microprocessors can be used for automotive applications with a neat sketch.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M913433

Have any Question? 


Related Questions in Computer Engineering

1 not all security experts agree about the value of

1. Not all security experts agree about the value of biometrics. What are the advantages and disadvantages of biometrics? 2. What concerns to privacy advocates have about biometrics? Do you agree or disagree with the con ...

Using the internet determine what applications are

Using the Internet, determine what applications are commercially available to enable secure remote access to a PC. 5. Using a Microsoft Windows XP, Vista, or 7 system, open Internet Explorer. Click Internet Options on th ...

The system administrators on the development network

The system administrators on the development network believe that any password can be guessed in 180 days of continuous trial and error. They set the lifetime of each password at a maximum of 90 days. After 90 days, a pa ...

1 what are the major differences between a boot virus and a

1. What are the major differences between a boot virus and a macro virus. Which is more dangerous to a computer system? 2. List and brie fly discuss three most common sources of virus infections. 3. In this chapter, we d ...

In a company all files which are sent on the network are

In a company, all files which are sent on the network are automatically encrypted by using AES-128 in CBC mode. A fixed key is used, and the IV is changed once per day. The network encryption is file-based, so that the I ...

Would you recommend using the routing table that has a

Would you recommend using the routing table that has a default route or hasn't? Please explain the advantage and disadvantages.

1 in your opinion is computer forensics a viable tool in

1. In your opinion, is computer forensics a viable tool in the fight against the cyber crime epidemic? 2. Discuss the difficulties faced by cyber crime investigators. 3. Differentiate between computer and network forensi ...

Using the internet search for commercial idps systems what

Using the Internet, search for commercial IDPS systems. What classification systems and descriptions are used, and how can these be used to compare the features and components of each IDPS? Create a comparison spreadshee ...

Design and implement queue insertion and deletion

Design and implement queue insertion and deletion algorithms that allow all array elements to be occupied when the queue is full (With the present implementation one array location must always be kept free (e.g. only a m ...

1 what does cissp stand for use the internet to identify

1. What does CISSP stand for? Use the Internet to identify the ethical rules CISSP holders have agreed to follow. 2. For what kind of information security jobs does the NSA recruit? Use the Internet to visit its Web page ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen