Explain in brief the origins of Just In Time. Explain the different types of wastes that can be eliminated using JIT. Explain in brief the origins of Just In Time. Explain the different types of wastes that can be eliminated using JIT. Reviewed by enakta13 on August 31, 2012 Rating: 5
Describe the following with suitable examples: A) Modeling the realization of a Use case B) Modeling the realization of an operation C) Modeling a Mechanism Describe the following with suitable examples: A) Modeling the realization of a Use case B) Modeling the realization of an operation C) Modeling a Mechanism Reviewed by enakta13 on August 30, 2012 Rating: 5
Describe the following: A) Modeling the architecture of a system B) Modeling Systems C) Models and Views D) Traces Describe the following: A) Modeling the architecture of a system B) Modeling Systems C) Models and Views D) Traces Reviewed by enakta13 on August 29, 2012 Rating: 5
Describe the following with suitable examples: A) Modeling the realization of a Use case B) Modeling the realization of an operation C) Modeling a Mechanism Describe the following with suitable examples: A) Modeling the realization of a Use case B) Modeling the realization of an operation C) Modeling a Mechanism    Reviewed by enakta13 on August 29, 2012 Rating: 5
SYSTEM DESIGN USING MICROCONTROLLER SYSTEM DESIGN USING MICROCONTROLLER Reviewed by enakta13 on August 29, 2012 Rating: 5
Discuss in detail the Process management, Memory management, I/O and File management and Security and Protection in LINUX Operating System Discuss in detail the Process management, Memory management, I/O and File management and Security and Protection in LINUX Operating System Reviewed by enakta13 on August 28, 2012 Rating: 5
Describe why authentication is important for file protection. Describe why authentication is important for file protection. Reviewed by enakta13 on August 28, 2012 Rating: 5
List the security attacks that cannot be prevented by encryption. List the security attacks that cannot be prevented by encryption. Reviewed by enakta13 on August 28, 2012 Rating: 5
There is a total of 15 units of Rl (resource 1) and 7 units of R2 and the system is in the following state (again call it SO): There is a total of 15 units of Rl (resource 1) and 7 units of R2 and the system is in the following state (again call it SO): Reviewed by enakta13 on August 28, 2012 Rating: 5
What will be the number of page faults for the algorithms (FIFO, LRU and Optimal) for the following page reference string: 1,2,3,3,5,1,2,2,6,2,1,5,7,6,3 for a memory with 4 frames? What will be the number of page faults for the algorithms (FIFO, LRU and Optimal) for the following page reference string: 1,2,3,3,5,1,2,2,6,2,1,5,7,6,3 for a memory with 4 frames? Reviewed by enakta13 on August 28, 2012 Rating: 5
Consider the following jobs: Job # Arrival time Run time A05 B24 C35 D53 Consider the following jobs: Job # Arrival time Run time A05 B24 C35 D53 Reviewed by enakta13 on August 28, 2012 Rating: 5
State the Readers and Writers Problem and write its semaphore based solution. Also describe the algorithm. Can the producer consumer problem be considered as a special xase of Reader/Writer problem with a single Writer(the producer and a single Reader (consumer) Explain.) State the Readers and Writers Problem and write its semaphore based solution. Also describe the algorithm. Can the producer consumer problem be considered as a special xase of Reader/Writer problem with a single Writer(the producer and a single Reader (consumer) Explain.)  Reviewed by enakta13 on August 28, 2012 Rating: 5
Write about Common Modeling techniques in Relationships Write about Common Modeling techniques in Relationships Reviewed by enakta13 on August 27, 2012 Rating: 5
Describe the following with respect to Common Modeling Techniques: A) Modeling object Structures B) Forward and Reverse Engineering C) Object Diagrams Describe the following with respect to Common Modeling Techniques: A) Modeling object Structures B) Forward and Reverse Engineering C) Object Diagrams Reviewed by enakta13 on August 26, 2012 Rating: 5
Discuss the common modeling techniques in UML Discuss the common modeling techniques in UML Reviewed by enakta13 on August 26, 2012 Rating: 5
Describe the theory and real time applications of Unified Modeling Language (UML) Describe the theory and real time applications of Unified Modeling Language (UML) Reviewed by enakta13 on August 25, 2012 Rating: 5
division of two 8 – bit numbers using 8051 division of two 8 – bit numbers using 8051 Reviewed by enakta13 on August 24, 2012 Rating: 5
multiplication of two 8 – bit numbers using 8051 multiplication of two 8 – bit numbers using 8051 Reviewed by enakta13 on August 24, 2012 Rating: 5
Subtraction of two 8 – bit numbers using 8051 Subtraction of two 8 – bit numbers using 8051 Reviewed by enakta13 on August 24, 2012 Rating: 5
Addition of 8 – bit numbers using 8051 instruction set Addition of 8 – bit numbers using 8051 instruction set Reviewed by enakta13 on August 24, 2012 Rating: 5
INTERFACING 8279 KEYBOARD/DISPLAY CONTROLLER WITH 8085 MICROPROCESSOR INTERFACING 8279 KEYBOARD/DISPLAY CONTROLLER WITH 8085 MICROPROCESSOR Reviewed by enakta13 on August 20, 2012 Rating: 5
INTERFACING ADC WITH 8085 PROCESSOR INTERFACING ADC WITH 8085 PROCESSOR Reviewed by enakta13 on August 20, 2012 Rating: 5
SQUARE OF A NUMBER USING LOOK UP TABLE SQUARE OF A NUMBER USING LOOK UP TABLE Reviewed by enakta13 on August 20, 2012 Rating: 5

ASCII TO HEX CONVERSION

To convert given ASCII Character into its equivalent Hexa Decimal number using 8085 instruction set. ALGORITHM: 1. Load the given data in A...
ASCII TO HEX CONVERSION ASCII TO HEX CONVERSION Reviewed by enakta13 on August 20, 2012 Rating: 5

HEX TO ASCII CONVERSION

To convert given Hexa decimal number into its equivalent ASCII number using 8085 instruction set. ALGORITHM: 1. Load the given data in A-...
HEX TO ASCII CONVERSION HEX TO ASCII CONVERSION Reviewed by enakta13 on August 20, 2012 Rating: 5

HEX TO BCD CONVERSION

To convert given Hexa decimal number into its equivalent BCD number using 8085 instruction set ALGORITHM: 1) Initialize memory pointer to ...
HEX TO BCD CONVERSION HEX TO BCD CONVERSION Reviewed by enakta13 on August 20, 2012 Rating: 5

BCD TO HEX CONVERSION

To convert two BCD numbers in memory to the equivalent HEX number using 8085 instruction set ALGORITHM: 1) Initialize memory pointer to 4150...
BCD TO HEX CONVERSION BCD TO HEX CONVERSION Reviewed by enakta13 on August 20, 2012 Rating: 5
ARRANGE AN ARRAY OF DATA IN DESCENDING ORDER ARRANGE AN ARRAY OF DATA IN DESCENDING ORDER Reviewed by enakta13 on August 17, 2012 Rating: 5
ARRANGE AN ARRAY OF DATA IN ASCENDING ORDER ARRANGE AN ARRAY OF DATA IN ASCENDING ORDER Reviewed by enakta13 on August 17, 2012 Rating: 5
SMALLEST NUMBER IN AN ARRAY OF DATA SMALLEST NUMBER IN AN ARRAY OF DATA Reviewed by enakta13 on August 17, 2012 Rating: 5
LARGEST NUMBER IN AN ARRAY OF DATA LARGEST NUMBER IN AN ARRAY OF DATA Reviewed by enakta13 on August 17, 2012 Rating: 5

DIVISION OF TWO 8 BIT NUMBERS

To perform the division of two 8 bit numbers using 8085. ALGORITHM: 1) Start the program by loading HL register pair with address of memo...
DIVISION OF TWO 8 BIT NUMBERS DIVISION OF TWO 8 BIT NUMBERS Reviewed by enakta13 on August 17, 2012 Rating: 5
MULTIPLICATION OF TWO 8 BIT NUMBERS MULTIPLICATION OF TWO 8 BIT NUMBERS Reviewed by enakta13 on August 17, 2012 Rating: 5

SUBTRACTION OF TWO 8 BIT NUMBERS

To perform the subtraction of two 8 bit numbers using 8085. ALGORITHM: 1. Start the program by loading the first data into Accumulator. 2...
SUBTRACTION OF TWO 8 BIT NUMBERS SUBTRACTION OF TWO 8 BIT NUMBERS Reviewed by enakta13 on August 17, 2012 Rating: 5

ADDITION OF TWO 8 BIT NUMBERS

To perform addition of two 8 bit numbers using 8085. ALGORITHM:   1) Start the program by loading the first data into Accumulator.  2)...
ADDITION OF TWO 8 BIT NUMBERS ADDITION OF TWO 8 BIT NUMBERS Reviewed by enakta13 on August 17, 2012 Rating: 5

Search your question

Powered by Blogger.