Monday, 27 May 2013

Conductors, Semiconductors, Insulators

Solids can be classified on the basis of electrical conductivity as:
1) Conductors
2) Semiconductors
3) Insulators

Conductors: The Substances which easily allow electric current pass through them are called conductors. E.g. Copper, Aluminium has large no. of free electrons.

Conductors contain no forbidden energy gap between valance band and conduction band. They overlap each other as shown in the given image. Without supplying any additional energy valance electrons become free electrons which make metals like Copper, Aluminium good conductors of electricity.

Semiconductors: Substance like Germanium, Silicon, Carbon etc. whose electrical conductivity lies between conductor and insulators is called Semiconductors.

Capacitors

The electronic components that are used to store the charge are called Capacitors. This capability of capacitors to store the energy (Charge) is called capacitance. Capacitance is measured in Farads (F). Farad is a very high unit of capacitance. Lower units are Micro Farad (µF) and Pico Farad (pF).

Capacitor consists of two conducting plates that are separated by an insulating material which is known as dielectric. Capacitor offers very low impedance to AC but it blocks DC. The reason behind this is that
XC =1/2πfc and for AC frequency is 50-60 Hz but for DC frequency is 0 hence XC= Infinite.

Capacitors are classified on the basis of die electric used between them. Some well known types of Capacitors are as Follows:

1) Mica Capacitors: These types of Capacitors are constructed with the help of two Aluminium foils separated by a mica sheet. These plates are connected to two electrodes. The entire unit is encapsulated in a plastic housing. These type of Capacitors are used for small capacitance values ranging from 5 pF to 10µF. These Capacitors can operate at up to 500V and has leakage current about 1000MΩ.

















Sunday, 26 May 2013

Resistors and Their Types

The components which resist or oppose the flow of electrons in any electrical or electrical circuit is called resistor. The force by which it resists flow of current is called resistance. It is measured in Ohms (Ω). Resistors are used to limit current flowing through a circuit or to divide the voltage in a circuit.

Types of Resistors
i) Fixed Value Resistors.
ii) Variable Value Resistors.


Fixed Resistors: The Resistors whose value remain same and can’t be changed is called fixed value resistor. Fixed value resistors can be of following types:

a) Carbon Resistors: These types of Resistors are manufactured from mixture of carbon or graphite and clay. These are also made in metalized type by decomposing a homogeneous film of pure carbon or metal over glass, ceramic or any other insulating core.

 

Wednesday, 22 May 2013

Subroutines

It is a set of program instructions that are designed to perform a specific task and are written separately and stored in memory.Subroutines can be defined within programs, or separately in libraries that can be used by multiple programs.
It is totally different from functions in the manner that function takes parameters, perform works and does not alter any value or work with any value outside it's scope .Functions also returns some value ,although their are some function in C that do not return any value like Void() . Subroutine directly work with the values of the caller/the code segment which invoked it, and does not return values.

Explanation: Consider the example of a program in which you have to perform multiplication repeatedly and you have to write the same code again and again.to avoid so you can use a Subroutine that can be called repeatedly.Subroutines are called by CALL function.The last Instruction of every subroutine is RET to return to main program.Program may have more than one subroutines.
When Program execution is jumped from main program to subroutine, the contents of Program Counter (PC) are saved to stack .The main motive of doing so is that program execution can return to proper point of main program.

Monday, 20 May 2013

Features of 8086 Microprocessor

1) It is 16 bit N- Channel HMOS (High Speed MOS) processor. Its CMOS version 80C86 is also available.
2) Intel 8086 Draws 360 mA on 5V whereas 80C86 draws 10 mA at 5 V.
3) It can operate at standard temperature Range 32˚ F to 180˚ F and at extended temperature range 40˚F to +225˚F.
4) Clock frequency for its different versions is 5, 8, 10 MHz
5) It consist of 20 time multiplexed address lines and can address up to 220= 1 Mbytes of memory locations. 16 low order address lines are time multiplexed with data, and 4 high order address lines are multiplexed with status signals.

Instruction Cycle

Before knowing instruction set we have to know two things i.e. opcode and operand. Operand is the data on which operation is to be performed and opcode is the operation which has to be performed. Thus the time taken to fetch the opcode from the memory and execute the operation on operand is a complete Instruction Cycle. Instruction cycles consist of fetch cycle and execute cycle.

IC (Instruction Cycle) = FC (Fetch Cycle) + EC (Execute Cycle)

Fetch Cycle: First byte of instruction contains opcode and others are operand or address of operands depending upon the addressing mode used. An instruction can be more than one byte long. The Program counter contains the address of next instruction to be executed. This address is the address of first byte of instruction i.e. opcode. First of all opcode in brought into memory .

Instruction set of 8085

Instruction set is a collection of instructions that a processor can execute. Microprocessor operates on these instructions. If an instruction that is not in the instruction set of a particular microprocessor, is invalid for that processor. Each instruction in 8085 belongs to a particular group depending upon the task they perform. These Instructions are classified as:

1) Data Transfer Group: These Instructions are used to transfer data from one register to another, memory to register or from register to memory. E.g. MOV, MVI, STA, LXI, LDA, LHLD, SHLD, LDAX, STAX, XCHG etc.

2) Arithmetic Group: These instructions are used to perform arithmetic operations such as addition, subtraction, Increment, Decrement etc. ADD, INR, SUB, DAA are some examples of Arithmetic Group instruction set of 8085.

3) Logical Group: These Instruction are used to perform logical operations such as AND, OR comparison, rotate etc. ANA, ANI, ORA, ORI, XRA, CMP, CPI, RLC, RRC, RAL, RAR are some examples of logical group instructions.

Thursday, 16 May 2013

Intel 8085 Block Diagram

Intel 8085 consists of following three main sections:

Arithmetic and Logical Unit:- The main function of ALU is to perform arithmetic and logical operations such as Addition, subtraction, Logical AND, Logical OR, Complement, Increment, Decrement, Shift Operations etc.

Timing and Control Unit: - Generation of timing and control signals for the execution of instructions is done by this unit. It controls and monitors flow of data between CPU and I/O devices. It works as brain for Computer System.X1, X2, Clock Out, ready, ALE, HOLD, HLDA are some examples of signals generated by this unit.

Interrupt Control Unit:- This unit handles various types of Interrupts. Its main function is to decide which interrupt to service first and how to service. It supports three Maskable Interrupts (RST 7.5, RST 6.5 and RST 5.5), one non-Maskable interrupt (TRAP) and one externally serviced interrupt (INTR).

Tuesday, 14 May 2013

Features of 8085 Microprocessor

Intel 8085 is an 8 bit Microprocessor developed by Intel in 1977.main Features of this Processor are as follows:
1) It is 8 bit, NMOS Microprocessor.
2) It has 16 Address Lines and 8 bit data bus is multiplexed with lower part of 8 bit address lines to limit no. of pins to 40.
3) It operates at Single +5 V DC Supply.
4) It consist of following Register sets:

     a) One 8 Bit accumulator i.e. Register A.
     b) Six 8 bit general purpose registers. These are: B, C, D, E, H and L.
     c) One 16 bit Stack Pointer, SP.
     d) One 16 bit Program Counter, PC.
     e) Instruction Register.
     f) Temporary Register.

Monday, 13 May 2013

Difference Between Hardwired Control and Micro Programmed Control

Timing and control signals are generated by two methods.i.e. Hardwired control and Micro Programmed control.Below given table illustrates the difference between both of them.

Sr. No.
Hardwired Control
Micro programmed Control
1
It is Implemented with the help of gates, Flip Flops, Decoders and other digital circuits.
This is Implemented by Programming control memory to perform required sequence of Micro operations.
2
If changes are required to be made, we have to change the entire hardware or hardware connections.
Changes can be done by just updating the micro program in control memory.

Half Adder, Full Adder

Half Adder

The Combinational circuit that performs arithmetic addition of two binary digits is called half adder. Variables that are supplied to input of half adder are called augend and addend. The Output obtained is sum and carry. Figure given below shows logical and symbolic representation of  half adder.

Here A and B are two inputs and S, C are sum and Carry respectively.Half Adder is the combination of one XOR gate and one AND gate.
S= A'B +AB'
C=AB

Difference between POP and OOP

Characteristics
POP
OOP
Acronym for
Procedure Oriented Programming
Object Oriented Programming
Program Division
Program is divided into small parts that are called functions.
Program is divided into small parts that are called objects.
Importance
Importance is given to functions and sequence of actions rather than data.
Importance is given to Data rather than procedures or objects.
Approach Type
It is a top down approach.
It is bottom up approach.
Access Specifier
It does not have access specifiers.
It has access specifiers named as: Public, Private and Protected.

Common Errors in Programming Languages

Following are the Most Common Errors in Programming Languages:

1) Syntax Errors: These are those types of errors that arise when a statement is not written as per the defined rules. This is the violation of rules. These types of errors are generated by the compiler. This may include:
a) Improper Termination of Statement.
b) Undeclared Variable use.
c) Missing Quotes
d) Missing Braces.


2) Logical Errors: These type of errors results in wrong output. These are generated due to wrong understanding of problem. For example: You want to calculate A+B but you have applied the logic A-B. No Doubt you will get the answer and program will execute but the result will be A-B in spite of A+B.

Wednesday, 8 May 2013

Ubuntu Installation Step by Step

Boot Your System with Ubuntu 12.10 Installation CD/DVD.




Welcome screen of Ubuntu 12.10 will appear,Click install Ubuntu

Database Management System (DBMS) Interfaces

DBA Interface: This interface is used by the database administrator to create databases, Users, to set system parameters for changing database schema etc. Fig. given below shows admin menu where DBA is can create new user and can assign privileges to him.





























Tuesday, 7 May 2013

Classification of Database Management System

Database Management System can be classified on several DBMS criteria.

A) On the Basis of Data Models.

Data model is a collection of high level data description that hides many low level storage details. A data Model has following three Components:
1) A Structural Part that consist of a set of rules according to which database is constructed.
2) A Manipulating Part That defines type of operations that are allowed on data.
3) A set of integrity rules that ensures that data is correct.
The Data Models are further divided into Three Categories: 

I) Object Base Data Models: Object based data models defines a database in terms of objects, their properties, and their operations .Objects of same behavior and structure belongs to a class and classes are organized into hierarchies. The operations of each class are specified in terms of predefined procedures called methods. Commonly used object based data models are:
Entity Relationship, Object Oriented, Semantic, Functional

II) Physical Data Models: Physical data models include all data artifacts that are required to create relationship between tables or to achieve performance goals, such as indexes, constraint definitions, Linking tables partition tables or clusters.

Windows XP Virtual Installation

Many times it becomes necessary to install lower version of windows because some applications still does not work with higher version of windows.This Problem can be resolved by either making your system dual bootable, means two operating systems on same hard disk.But the Problem with this technique is that at the same time you can use only one operating system.

Another approach is to install Operating System Virtually.This installation provide installation of multiple Operating Systems Virtually and each can work as stand alone system.The Main advantage of using this technique is that you can access the multiple OS on the same time. Another advantage is that if you have only single PC and you want to test any client server based model you can use this.e.g. you can install Windows Server 2012 virtually on windows 7 and can create a domain where your system can work as client and virtual server will work as domain controller.

Here are some very simple steps that you can use to install any operating system like Windows XP, Vista,  Windows 7 or Windows Server 2003,2008,2012 etc.
1) First step is to download and install VMware from official website(Click here to download)

2) When Installation is complete open the VMware Player and Click on Create a new virtual Machine

Monday, 6 May 2013

Index Allocation

It is the Disk allocation technique in which each file has its own index block which is an array of disk block addresses. The nth entry in the index block points to nth block of file.
Whenever a file is created its index block is initialized, free block is taken from the disk and its entry is made into index table. whenever  file uses a new block its entry is made into index table. Index table consist of the addresses of all disk blocks on which a particular file is written.




Sunday, 5 May 2013

Linked Allocation

It is a disk allocation technique in which files are stored in a linked fashion and scattered way. Directory entry is used that contains pointer to first disk block of file and each block contains pointer to next block.

These Pointers are not made visible to users. Each block has 512 bytes in size out of which 4 bytes are used to store pointer and rest 508 bytes is used by the user.

This Technique has the advantage that there is no external fragmentation and files can be stored anywhere. Another advantage is that there is no need to define the size of file and it can grow as long as free blocks are available.


Saturday, 4 May 2013

Setup Windows 7 from USB drive

Here are Some Simple steps that are used to make USB pen drive bootable that can be used to install windows 7 on your PC.
1) First Step is to download Power ISO Software from Official site of Power ISO(Click here to download)

2) Install Power ISO and open it (Please choose all file extension support while installation).

3) Open Power ISO it will give Thank You message click on continue unregistered version. This will also create bootable USB .(Purchase License is Optional)



First Fit, Best Fit and Worst Fit Memory Allocation

Best fit Allocation: It is the Contiguous allocation technique in which file is saved on the blocks whose size is same to file size or little more than file size. E.g. if we want to save a 200 Kb file and one block of 250KB is available then it will be saved to this available block.

The advantage of using this technique is best disk utilization but has the disadvantage that it is slow. Every time we want to save a file, we have to find a space whose size is either similar to file size or is slightly more.

Another Problem Associated with this technique is that if we want to extend the file contents than it can’t be implemented.

Contiguous Allocation

It is the Memory allocation technique in which contiguous blocks of this are used to save files. Whenever a file is created its size is calculated and based upon its size contiguous blocks are allocated to it for store. This allocation can be Best Fit, Worst Fit or First Fit.

The Main Advantage of using this technique is that it provides fast file access since whole file is allocated contagious blocks.

The Problem associated with this technique is that every time we have to calculate the file size and then to allocate the contagious blocks that can store that file. If we allocate too little space then file can’t be extended and if we allocate too much space and file is not extended than it will result in wastage of space.

Directory Implementation

Directory efficiency, performance and reliability are totally dependent on the technique used to store them. They are saved on Disks with two well Known Techniques:

1) Linear List: It is the Simple method of directory implementation. It makes use of a file name and a pointer to data blocks. Whenever a new file is created, whole directory is checked to make sure that no existing file has the same name. If the directory contains no file with this name it is added to the end of directory. For the deletion operation file is searched and the allocated space is released.

The Main Disadvantage is of this technique is that every time we create a new file, directory has to be checked for existing file name .The second problem is that files are accessed in a serial fashion which results in slow performance 

2) Hash Tables: In technique Directories are saved in same linear fashion but a hash table is used. It takes a value that is returned from file name and returns a pointer to file name. This technique decreases the search time for files.

Friday, 3 May 2013

Demand Paging

Whenever a program is executed it is required to be loaded into main memory. This loading can be done by two methods:

1) By loading the entire program into main memory. But Problem with this technique is that if user wants to select limited options, whole program will be loaded regardless of user selection.

2) Another Approach is to load only those pages which are currently needed. “The Technique of loading in which only those pages are loaded into main memory which is currently needed is called Demand Paging”. The pages which are not required are not loaded into main memory.

This technique has the advantage that less memory is consumed and more processes can be loaded at the same time which utilizes more resources. Demand paging is very similar to swapping. The whole program resides in secondary storage and when process execution is required, it is swapped into main memory and in spite of loading whole program only currently required pages ware swapped.