Ginni has Published 1602 Articles

What are the types of Addressing Modes?

Ginni

Ginni

Updated on 31-Oct-2023 13:52:16

56K+ Views

The operands of the instructions can be located either in the main memory or in the CPU registers. If the operand is placed in the main memory, then the instruction provides the location address in the operand field. Many methods are followed to specify the operand address. The different methods/modes ... Read More

What is techniques of storage allocation in compiler design?

Ginni

Ginni

Updated on 31-Oct-2023 13:50:45

47K+ Views

There are various storage allocation techniques are as follows −Static AllocationIt is the simplest allocation scheme in which allocation of data objects is done at compile time because the size of every data item can be determined by the compiler.Recursive Subprogram and Arrays of adjustable length are not permitted in ... Read More

Difference between OSI and TCP/IP Reference Model

Ginni

Ginni

Updated on 31-Oct-2023 04:19:48

109K+ Views

Following are the differences between OSI and TCP/IP Reference Model −OSITCP/IPOSI represents Open System Interconnection.TCP/IP model represents the Transmission Control Protocol / Internet Protocol.OSI is a generic, protocol independent standard. It is acting as an interaction gateway between the network and the final-user.TCP/IP model depends on standard protocols about which ... Read More

What is Handshaking?

Ginni

Ginni

Updated on 31-Oct-2023 03:59:02

21K+ Views

Handshaking is an I/O control approach to synchronize I/O devices with the microprocessor. As several I/O devices accept or release data at a much lower cost than the microprocessor, this technique is used to control the microprocessor to operate with an I/O device at the I/O devices data transfer rate.The ... Read More

Explain the advantages and disadvantages of the TCP/IP model

Ginni

Ginni

Updated on 31-Oct-2023 03:37:33

3K+ Views

TCP/IP signifies the transmission control protocol/Internet Protocol. It was created by the Defence Advanced Research Projects Agency (ARPA, later DARPA) in the late 1970s.It is a collection of communication protocol. Moreover, it involves collection and methods for managing packet transport, media access, session interaction, data transfer, email and terminal emulation.Advantages ... Read More

What is Pipelining in Computer Architecture?

Ginni

Ginni

Updated on 31-Oct-2023 02:53:19

21K+ Views

Pipelining defines the temporal overlapping of processing. Pipelines are emptiness greater than assembly lines in computing that can be used either for instruction processing or, in a more general method, for executing any complex operations. It can be used efficiently only for a sequence of the same task, much similar ... Read More

What is Auxiliary Memory?

Ginni

Ginni

Updated on 26-Oct-2023 03:37:50

25K+ Views

An Auxiliary memory is referred to as the lowest-cost, highest-space, and slowest-approach storage in a computer system. It is where programs and information are preserved for long-term storage or when not in direct use. The most typical auxiliary memory devices used in computer systems are magnetic disks and tapes.Magnetic DisksA ... Read More

What is Syntax Tree?

Ginni

Ginni

Updated on 26-Oct-2023 03:28:34

21K+ Views

Tree in which each leaf node describes an operand & each interior node an operator. The syntax tree is shortened form of the Parse Tree.Example1 − Draw Syntax Tree for the string a + b ∗ c − d.Rules for constructing a syntax treeEach node in a syntax tree can ... Read More

What are the principles of Public key Cryptosystem in Information Security?

Ginni

Ginni

Updated on 22-Oct-2023 02:29:38

27K+ Views

Public key cryptography has become an essential means of providing confidentiality, especially through its need of key distribution, where users seeking private connection exchange encryption keys. It also features digital signatures which enable users to sign keys to check their identities. The approach of public key cryptography derivative from an ... Read More

What are Peripheral Devices?

Ginni

Ginni

Updated on 21-Oct-2023 13:50:30

21K+ Views

Peripheral devices are those devices that are linked either internally or externally to a computer. These devices are commonly used to transfer data. The most common processes that are carried out in a computer are entering data and displaying processed data. Several devices can be used to receive data and ... Read More

Advertisements