Microcontroller Basics

Arjun Thakur
Updated on 27-Jun-2020 08:01:55

8K+ Views

A Microcontroller is a small and low-cost microcomputer, which is designed to perform the specific tasks of embedded systems like displaying microwave’s information, receiving remote signals etc.The general microcontroller consists of the processor, the memory (RAM, ROM, EPROM), Serial ports, peripherals (timers, counters) etc.Types of MicrocontrollersMicrocontrollers are divided into various categories based on memory, architecture, bits and instruction sets. Following is the list of their typesBit − Based on bit configuration, the microcontroller is further divided into three categories.8-bit microcontroller  − This type of microcontroller is used to execute arithmetic and logical operations like addition, subtraction, multiplication division, etc. For ... Read More

Why TV Serials Are Called Daily Soaps

Dev Kumar
Updated on 27-Jun-2020 07:57:59

2K+ Views

The actual phrase used is daily soap opera and it all began in the early part of the last century when the radio was the only broadcasting media as TV had just been invented sometime in the 1920s and was still some time away from becoming a full-fledged media. So, it was the radio that was ruling the wavelengths just as TV does now. Radio stations were getting more and more creative with their presentations and programs but implementing them needed money that nobody was ready put unless there was some tangible ROI (Return on Investment).Condition of PromotionIn those days, ... Read More

RAM Addressing of 8051 Microcontroller

Ankith Reddy
Updated on 27-Jun-2020 07:55:45

8K+ Views

Here we will see how external RAM memories can be addressed by the Intel 8051 microcontroller. There are different methods for addressing the RAMs. Now at first we will discuss about some different types of RAM memories in short.The RAM (Random Access Memory) is volatile memory. So when the power is cutting off to the RAM chip, it losses the data. RAMs are also known as RAWM (Read and Write Memory). There are basically three kinds of RAMs. These are SRAM (Static RAM), NV-RAM (Non-Volatile RAM) and DRAM (Dynamic RAM).Static RAMThe storage cell in Static RAM are made of flip-flops. ... Read More

What is Ghostwriting and Job Prospects in This Career

Dev Kumar
Updated on 27-Jun-2020 07:47:34

208 Views

When you write for someone else who pays you just for your efforts and has claimed over the content you created as per your agreement with him, it is ghostwriting. In other words, it's like conceiving a surrogate baby whom you can't claim. However, you needn't get tensed about this aspect of ghostwriting because it is a vast niche today and there are scores of people all over the world who are doing it day in and out.Digital MarketingTake the case of the vast and fast-growing digital marketing industry. Depending on the size of their operations, these online businesses upload ... Read More

Hamming Code for Single Error Correction and Double Error Detection

Nitya Raut
Updated on 27-Jun-2020 07:39:53

16K+ Views

Hamming code is a block code that is capable of detecting up to two simultaneous bit errors and correcting single-bit errors. It was developed by R.W. Hamming for error correction.In this coding method, the source encodes the message by inserting redundant bits within the message. These redundant bits are extra bits that are generated and inserted at specific positions in the message itself to enable error detection and correction. When the destination receives this message, it performs recalculations to detect errors and find the bit position that has error.Hamming Code for Single Error CorrectionThe procedure for single error correction by ... Read More

Length vs Char Length in MySQL

Ankith Reddy
Updated on 27-Jun-2020 07:39:24

1K+ Views

The char_length() can be used to display the length of a string. Let us see an example to get the length of the string included as a parameter.mysql> select char_length('John');The following is the output.+---------------------+ | char_length('John') | +---------------------+ | 4 | +---------------------+ 1 row in set (0.00 sec)The length() function can be used to display the length of string measured in bytes. In many cases characters and bytes gives the same length.Here is an example of length()mysql> select length('Tim'); The following is ... Read More

Technology Impact on People with Disabilities

Dev Kumar
Updated on 27-Jun-2020 07:38:56

243 Views

The impact of technology has been nothing short of phenomenal on the lives of people with disabilities. Nothing articulates this better than the statement by Mary Pat Radabaugh, Director of IBM National Support Center for Persons with Disabilities - "For most people, technology makes things easier.Technology Makes Things PossibleFor people with disabilities, technology makes things possible." That's one of the most accurate observations on the matter and it is based on a whole list of examples that could be found across different parts of the world. In fact, there's a term that has been coined specifically for this kind of ... Read More

Know When It's Time to Move On From Your Current Company

Dev Kumar
Updated on 27-Jun-2020 07:35:52

200 Views

It really depends on your comfort level at your place of work and that's as basic as it gets. The irony here is that you just can't afford to feel comfortable in any place of work for the simple reason that these places aren't designed for comfort. You have to operate like a special forces soldier in enemy territory, alert and alive to the slightest movement in your immediate vicinity or beyond.Find Your Comfort In DiscomfortAs they say in the special forces, you sleep with one eye open and your boots on and you will have to find your comfort ... Read More

Explain Android Shared Preferences with Example

Nishtha Thakur
Updated on 27-Jun-2020 07:31:58

510 Views

Using share preference, we can store or retrieve values as key and value pair. There are five different methods are available in share preference as shown below −Edit() − It going to edit shared preference valuescommit() − it going to commit shared preference values in xml fileapply() − It going to commit back changes from editor to shared preference.remove(String key) − It going to remove key and vales from shared preference use key.Put() − It going to put key and values to shared preference xml.A sample example syntax of shared preference as shown below −final SharedPreferences sharedPreferences = getSharedPreferences("USER", MODE_PRIVATE);In ... Read More

What to Do If Someone Copies Your Website or Blog Content

Dev Kumar
Updated on 27-Jun-2020 07:27:52

147 Views

Whenever you find that your content has been copied, don't wait to take action but at the same time, don't jump the gun by shooting off a legal notice right away. That would be your last resort and before that, you need to try a few easier methods to sort out the problem.Intimate with A Polite NoteYou could begin by sending a mail-in polite but firm language so that the copier gets the message that he's dealing with someone who knows how things work online. Get a screenshot of the copied content on his webpage and highlight it in red ... Read More

Advertisements