In Intel 8051, there are two 16-bit timer registers. These registers are known as Timer0 andTimer1. The timer registers can be used in two modes. These modes areTimer mode and the Counter mode. The only difference between these two modes is the source for incrementing the timer registers. Timer ModeIn the timer mode, the internal machine cycles are counted. So this register is incremented in each machine cycle. So when the clock frequency is 12MHz, then the timer register is incremented in each millisecond. In this mode it ignores the external timer input pin.Counter ModeIn the counter mode, the external events ... Read More
The reflected binary code or Gray code is an ordering of the binary numeral system such that two successive values differ in only one bit (binary digit). Gray codes are very useful in the normal sequence of binary numbers generated by the hardware that may cause an error or ambiguity during the transition from one number to the next. So, the Gray code can eliminate this problem easily since only one bit changes its value during any transition between two numbers.Conversion of Gray to Binary CodeGray codes are used in rotary and optical encoders, Karnaugh maps, and error detection. The ... Read More
An operating system is a construct that allows the user application programs to interact with the system hardware. Operating system by itself does not provide any function but it provides an atmosphere in which different applications and programs can do useful work.The major operations of the operating system are process management, memory management, device management and file management. These are given in detail as follows:Process ManagementThe operating system is responsible for managing the processes i.e assigning the processor to a process at a time. This is known as process scheduling. The different algorithms used for process scheduling are FCFS (first ... Read More
A database administrator (DBA) is a person or group in charge of implementing DBMS in an organization. The DBA job requires a high degree of technical expertise. DBA consists of a team of people rather than just one person.The primary role of Database administrator is as follows −Database designPerformance issuesDatabase accessibilityCapacity issuesData replicationTable MaintenanceResponsibilities of DBAThe responsibilities of DBA are as follows −Makes the decision concerning the content of the database.Plans the storage structure and access strategy.Provides the support to the users.Defines the security and integrity checks.Interpreter backup and recovery strategies.Monitoring the performance and responding to the changes in the ... Read More
The excess-3 code (or XS3) is a non-weighted code used to express code used to express decimal numbers. It is a self-complementary binary coded decimal (BCD) code and numerical system which has biased representation. It is particularly significant for arithmetic operations as it overcomes shortcoming encountered while using 8421 BCD code to add two decimal digits whose sum exceeds 9. Excess-3 arithmetic uses different algorithm than normal non-biased BCD or binary positional number system.Representation of Excess-3 CodeExcess-3 codes are unweighted and can be obtained by adding 3 to each decimal digit then it can be represented by using 4 bit ... Read More
The data that a user enters into multiple pages of a website can be saved using a combination of cookies and sessions. Cookies and sessions are both vitally important since they record the data that the user has provided for a variety of purposes.Cookies and Sessions are used to store information. Cookies are only stored on the client-side machine, while sessions get stored on the client as well as the server.Read through this article to find out more about cookies and sessions and how they are different from each other.What is a Cookie?Cookies are little text-based files that are kept ... Read More
In this section, we will see how to connect a stepper motor with Intel 8051 Microcontroller. Before discussing the interfacing techniques, we will see what are the stepper motors and how they work.Stepper MotorStepper motors are used to translate electrical pulses into mechanical movements. In some disk drives, dot matrix printers, and some other different places the stepper motors are used. The main advantage of using the stepper motor is the position control. Stepper motors generally have a permanent magnet shaft (rotor), and it is surrounded by a stator. Normal motor shafts can move freely but the stepper motor shafts move ... Read More
Stack is also known as the Last In First Out (LIFO) list. It is the most important feature in the CPU. It saves data such that the element stored last is retrieved first. A stack is a memory unit with an address register. This register influence the address for the stack, which is known as Stack Pointer (SP). The stack pointer continually influences the address of the element that is located at the top of the stack.It can insert an element into or delete an element from the stack. The insertion operation is known as push operation and the deletion ... Read More
Nmap is a free open source tool, employed to discover hosts and services on a computer network by sending packets and analyzing the retrieved responses. Nmap offers some features for probing computer networks, including host discovery and service and operating system detection.Nmap can provide further information on targets, including reverse DNS names, device types, and MAC addresses.Host discovery – Identifying hosts on a network. For example, listing the hosts that respond to TCP and/or ICMP requests or have a particular port open.Port scanning – Enumerating the open ports on target hosts.OS detection – Determining the operating system and hardware characteristics ... Read More
Classful AddressThe first addressing system to be implemented as part of the Internet Protocol was Classful Addressing. In the year 1981, the Classful addressing network architecture was first used on the Internet. The Classful addressing system was superseded by a Classless addressing scheme with the introduction of Classless Inter-Domain Routing (CIDR) in 1993.The IP address comprises up of 32 bits and is split into four sections separated by dots: part 1, part 2, part 3, and part 4.The IP address is made up of four parts, each of which is eight bits long (1 byte).Further, the 4 parts of the ... Read More