Inverting and Non-Inverting Operational Amplifiers

Manish Kumar Saini
Updated on 01-Nov-2023 01:28:56

90K+ Views

An operational amplifier is a three-terminal device consisting of two high impedance input terminals, one is called the inverting input denoted by a negative sign and the other is the non-inverting input denoted with a positive sign. The third terminal is the output of the Op-Amp.Inverting Operational AmplifierIn the inverting operational amplifier circuit, the signal is applied at the inverting input and the non-inverting input is connected to the ground. In this type of amplifier, the output is 180⁰ out of phase to the input, i.e. when positive signal is applied to circuit, the output of the circuit will be ... Read More

Unsigned and Signed Binary Numbers

Ankith Reddy
Updated on 01-Nov-2023 01:26:11

68K+ Views

Variables such as integers can be represent in two ways, i.e., signed and unsigned. Signed numbers use sign flag or can be distinguish between negative values and positive values. Whereas unsigned numbers stored only positive numbers but not negative numbers.Number representation techniques like: Binary, Octal, Decimal, and Hexadecimal number representation techniques can represent numbers in both signed and unsigned ways. Binary Number System is one the type of Number Representation techniques. It is most popular and used in digital systems. Binary system is used for representing binary quantities which can be represented by any device that has only two operating ... Read More

Difference Between Private Key and Public Key

Kiran Kumar Panigrahi
Updated on 01-Nov-2023 01:15:19

46K+ Views

Private Keys and Public Keys terms are used in cryptography. These keys are used to encrypt/decrypt sensitive data. Read through this article to find out more about private and public keys and how they are different from each other.What is Private Key?The private key is used in both encryption as well as decryption. This key is shared between the sender and receiver of the encrypted sensitive information. The private key is also called "symmetric" because it is shared by both parties. Private key cryptography is faster than public-key cryptography mechanism.A private key is generally a lengthy, non-guessable sequence of bits ... Read More

Difference Between Recursion and Iteration

Kiran Kumar Panigrahi
Updated on 01-Nov-2023 01:10:57

46K+ Views

Recursion and Iteration both repeatedly execute the set of instructions. Recursion occurs when a statement in a function calls itself repeatedly. The iteration occurs when a loop repeatedly executes until the controlling condition becomes false. The basic difference between recursion and iteration is that recursion is a process always applied to a function and iteration is applied to the set of instructions which we want to be executed repeatedly. Read through this article to find out more about Recursion and Iteration and how they are different from each other. What is Recursion? Recursion is defined as a process in which a function calls itself repeatedly. Recursion uses selection structure. If the recursion step does ... Read More

Difference Between Router and Switch

Kiran Kumar Panigrahi
Updated on 01-Nov-2023 01:06:51

45K+ Views

Both Routers and Switches are network connecting devices. Routers work at the network layer and are responsible to find the shortest path for a packet across the network, whereas Switches connect various devices in a network. Routers connect devices across multiple networks. Read through this article to find out more about these two network devices and how they operate to understand how they are different from each other. What is a Router? Routers are network connecting devices that determine the shortest path for a packet to take to get to its destination. A router's primary function is to connect ... Read More

Unijunction Transistor: Construction, Working Principle and Characteristics

Manish Kumar Saini
Updated on 01-Nov-2023 00:53:38

94K+ Views

A Unijunction Transistor (UJT) is a three-terminal semiconductor device. The main characteristics of UJT is when it is triggered, the emitter current increases re-generatively until it is limited by emitter power supply. Due to this characteristic feature, it is used in applications like switching pulse generator, saw-tooth wave generator etc.Construction of UJTThe UJT consists of an n-type silicon semiconductor bar with an electrical on each end. The terminals of these connections are called Base terminals (B1 and B2). Near to base B2, a pn-junction is formed between a p-type emitter and the n-type silicon bar. The terminal of this junction ... Read More

Draw ER Diagram for University Database Application

Bhanu Priya
Updated on 01-Nov-2023 00:50:11

111K+ Views

ProblemDrawing of ER model of university database application considering the constraints −A university has many departments.Each department has multiple instructors (one person is HOD). Here the HOD refers to the head of department.An instructor belongs to only one department.Each department offers multiple courses, each subject is taught by a single instructor.A student may enroll for many courses offered by different departments.SolutionFollow the steps given below to draw an Entity Relationship (ER) diagram for a University database application −Step 1 − Identifying the entity sets.The entity set has multiple instances in a given business scenario.As per the given constraints the entity ... Read More

What is Hamming Distance

Nitya Raut
Updated on 01-Nov-2023 00:43:11

77K+ Views

Hamming DistanceHamming distance is a metric for comparing two binary data strings. While comparing two binary strings of equal length, Hamming distance is the number of bit positions in which the two bits are different.The Hamming distance between two strings, a and b is denoted as d(a, b).It is used for error detection or error correction when data is transmitted over computer networks. It is also using in coding theory for comparing equal length data words.Calculation of Hamming DistanceIn order to calculate the Hamming distance between two strings, and , we perform their XOR operation, (a⊕ b), and then count ... Read More

Difference Between BJT and FET

Manish Kumar Saini
Updated on 01-Nov-2023 00:35:56

69K+ Views

Both BJTs and FETs are transistors widely used in different types of electronic applications. Go through this article to find out the important features of BJTs and FETs and how they differ from each other in the way they function.What is BJT?BJT stands for Bipolar Junction Transistor. The BJT is the type of transistor in which the current flow is due to two types of charge carriers viz. electrons and holes. A BJT consists of three alternating layers of P-type and N-type semiconductor materials and two P-N junctions.When P-type semiconductor material is sandwiched between two N-type layers, the bipolar junction ... Read More

Delete Registry Key Using PowerShell

Chirag Nagrekar
Updated on 31-Oct-2023 22:00:48

64K+ Views

To delete the registry key using PowerShell, we can use the Remove-Item command. Remove-Item command removes the registry key from the path specified. For example, we have the registry key name NodeSoftware stored at the path HKLM, under the Software key.To delete the key we will use the below command.Remove-Item -Path HKLM:\SOFTWARE\NodeSoftware -Force -VerboseWe can also use the Get-Item command to retrieve the Key name and then use the Remove-Item after pipeline.Get-Item HKLM:\SOFTWARE\NodeSoftware | Remove-Item -Force -Verbose

Advertisements