A Microcontroller is a small and low-cost microcomputer, which is designed to perform the specific tasks of embedded systems like displaying microwave’s information, receiving remote signals etc.The general microcontroller consists of the processor, the memory (RAM, ROM, EPROM), Serial ports, peripherals (timers, counters) etc.Types of MicrocontrollersMicrocontrollers are divided into various categories based on memory, architecture, bits and instruction sets. Following is the list of their typesBit − Based on bit configuration, the microcontroller is further divided into three categories.8-bit microcontroller − This type of microcontroller is used to execute arithmetic and logical operations like addition, subtraction, multiplication division, etc. For ... Read More
The actual phrase used is daily soap opera and it all began in the early part of the last century when the radio was the only broadcasting media as TV had just been invented sometime in the 1920s and was still some time away from becoming a full-fledged media. So, it was the radio that was ruling the wavelengths just as TV does now. Radio stations were getting more and more creative with their presentations and programs but implementing them needed money that nobody was ready put unless there was some tangible ROI (Return on Investment).Condition of PromotionIn those days, ... Read More
Here we will see how external RAM memories can be addressed by the Intel 8051 microcontroller. There are different methods for addressing the RAMs. Now at first we will discuss about some different types of RAM memories in short.The RAM (Random Access Memory) is volatile memory. So when the power is cutting off to the RAM chip, it losses the data. RAMs are also known as RAWM (Read and Write Memory). There are basically three kinds of RAMs. These are SRAM (Static RAM), NV-RAM (Non-Volatile RAM) and DRAM (Dynamic RAM).Static RAMThe storage cell in Static RAM are made of flip-flops. ... Read More
When you write for someone else who pays you just for your efforts and has claimed over the content you created as per your agreement with him, it is ghostwriting. In other words, it's like conceiving a surrogate baby whom you can't claim. However, you needn't get tensed about this aspect of ghostwriting because it is a vast niche today and there are scores of people all over the world who are doing it day in and out.Digital MarketingTake the case of the vast and fast-growing digital marketing industry. Depending on the size of their operations, these online businesses upload ... Read More
Hamming code is a block code that is capable of detecting up to two simultaneous bit errors and correcting single-bit errors. It was developed by R.W. Hamming for error correction.In this coding method, the source encodes the message by inserting redundant bits within the message. These redundant bits are extra bits that are generated and inserted at specific positions in the message itself to enable error detection and correction. When the destination receives this message, it performs recalculations to detect errors and find the bit position that has error.Hamming Code for Single Error CorrectionThe procedure for single error correction by ... Read More
The char_length() can be used to display the length of a string. Let us see an example to get the length of the string included as a parameter.mysql> select char_length('John');The following is the output.+---------------------+ | char_length('John') | +---------------------+ | 4 | +---------------------+ 1 row in set (0.00 sec)The length() function can be used to display the length of string measured in bytes. In many cases characters and bytes gives the same length.Here is an example of length()mysql> select length('Tim'); The following is ... Read More
The impact of technology has been nothing short of phenomenal on the lives of people with disabilities. Nothing articulates this better than the statement by Mary Pat Radabaugh, Director of IBM National Support Center for Persons with Disabilities - "For most people, technology makes things easier.Technology Makes Things PossibleFor people with disabilities, technology makes things possible." That's one of the most accurate observations on the matter and it is based on a whole list of examples that could be found across different parts of the world. In fact, there's a term that has been coined specifically for this kind of ... Read More
It really depends on your comfort level at your place of work and that's as basic as it gets. The irony here is that you just can't afford to feel comfortable in any place of work for the simple reason that these places aren't designed for comfort. You have to operate like a special forces soldier in enemy territory, alert and alive to the slightest movement in your immediate vicinity or beyond.Find Your Comfort In DiscomfortAs they say in the special forces, you sleep with one eye open and your boots on and you will have to find your comfort ... Read More
Using share preference, we can store or retrieve values as key and value pair. There are five different methods are available in share preference as shown below −Edit() − It going to edit shared preference valuescommit() − it going to commit shared preference values in xml fileapply() − It going to commit back changes from editor to shared preference.remove(String key) − It going to remove key and vales from shared preference use key.Put() − It going to put key and values to shared preference xml.A sample example syntax of shared preference as shown below −final SharedPreferences sharedPreferences = getSharedPreferences("USER", MODE_PRIVATE);In ... Read More
Whenever you find that your content has been copied, don't wait to take action but at the same time, don't jump the gun by shooting off a legal notice right away. That would be your last resort and before that, you need to try a few easier methods to sort out the problem.Intimate with A Polite NoteYou could begin by sending a mail-in polite but firm language so that the copier gets the message that he's dealing with someone who knows how things work online. Get a screenshot of the copied content on his webpage and highlight it in red ... Read More
Data Structure
Networking
RDBMS
Operating System
Java
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP