Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
We want to connect the people who have knowledge to the people who need it, to bring together people with different perspectives so they can understand each other better, and to empower everyone to share their knowledge.
During the execution of a project, a risk is identified by a team member. This newly identified risk is currently …
As a Project Manager I will consider some risk management strategies : Avoid: The best thing you can do with a risk is avoid it. If you can prevent it from happening, it definitely won’t hurt your project. The easiest way to avoid this risk is to walk away from the cliff, but that may not be an optiRead more
As a Project Manager I will consider some risk management strategies :
By the time a risk actually occurs on our project, it’s too late to do anything about it. That’s why we need to plan for risks from the beginning and keep coming back to do more planning throughout the project.
See lessElaborate how interrupts are handled by 8259 and how priorities are assigned..
The 8259 is known as the Programmable Interrupt Controller (PIC) microprocessor. In 8085 and 8086 there are five hardware interrupts and two hardware interrupts respectively. Bu adding 8259, we can increase the interrupt handling capability. This chip combines the multi-interrupt input source to sinRead more
The 8259 is known as the Programmable Interrupt Controller (PIC) microprocessor. In 8085 and 8086 there are five hardware interrupts and two hardware interrupts respectively. Bu adding 8259, we can increase the interrupt handling capability. This chip combines the multi-interrupt input source to single interrupt output. This provides 8-interrupts from IR0 to IR7. Let us see some features of this microprocessor.
Data Bus Buffer This block is used to communicate between 8259 and 8085/8086 by acting as buffer. It takes the control word from 8085/8086 and send it to the 8259. It transfers the opcode of the selected interrupts and address of ISR to the other connected microprocessor. It can send maximum 8-bit at a time.
R/W Control Logic This block works when the value of pin CS is 0. This block is used to flow the data depending upon the inputs of RD and WR. These are active low pins for read and write.
Control Logic It controls the functionality of each block. It has pin called INTR. This is connected to other microprocessors for taking the interrupt request. The INT pin is used to give the output. If 8259 is enabled, and also the interrupt flags of other microprocessors are high then this causes the value of the output INT pin high, and in this way this chip can responds requests made by other microprocessors.
Interrupt Request Register It stores all interrupt level that are requesting for interrupt service.
Interrupt Service Register It stores interrupt level that are currently being execute.
Interrupt Mask Register It stores interrupt level that will be masked, by storing the masking bits of interrupt level.
Priority Resolver It checks all three registers, and set the priority of the interrupts. Interrupt with the highest priority is set in the ISR register. It also reset the interrupt level which is already been serviced in the IRR.
Cascade Buffer To increase number of interrupt pin, we can cascade more number of pins, by using cascade buffer. When we are going to increase the interrupt capability, CSA lines are used to control multiple interrupts.
See lessElaborate how interrupts are handled by 8259 and how priorities are assigned.
The 8259 is known as the Programmable Interrupt Controller (PIC) microprocessor. In 8085 and 8086 there are five hardware interrupts and two hardware interrupts respectively. Bu adding 8259, we can increase the interrupt handling capability. This chip combines the multi-interrupt input source to sinRead more
The 8259 is known as the Programmable Interrupt Controller (PIC) microprocessor. In 8085 and 8086 there are five hardware interrupts and two hardware interrupts respectively. Bu adding 8259, we can increase the interrupt handling capability. This chip combines the multi-interrupt input source to single interrupt output. This provides 8-interrupts from IR0 to IR7. Let us see some features of this microprocessor.
Data Bus Buffer This block is used to communicate between 8259 and 8085/8086 by acting as buffer. It takes the control word from 8085/8086 and send it to the 8259. It transfers the opcode of the selected interrupts and address of ISR to the other connected microprocessor. It can send maximum 8-bit at a time.
R/W Control Logic This block works when the value of pin CS is 0. This block is used to flow the data depending upon the inputs of RD and WR. These are active low pins for read and write.
Control Logic It controls the functionality of each block. It has pin called INTR. This is connected to other microprocessors for taking the interrupt request. The INT pin is used to give the output. If 8259 is enabled, and also the interrupt flags of other microprocessors are high then this causes the value of the output INT pin high, and in this way this chip can responds requests made by other microprocessors.
Interrupt Request Register It stores all interrupt level that are requesting for interrupt service.
Interrupt Service Register It stores interrupt level that are currently being execute.
Interrupt Mask Register It stores interrupt level that will be masked, by storing the masking bits of interrupt level.
Priority Resolver It checks all three registers, and set the priority of the interrupts. Interrupt with the highest priority is set in the ISR register. It also reset the interrupt level which is already been serviced in the IRR.
Cascade Buffer To increase number of interrupt pin, we can cascade more number of pins, by using cascade buffer. When we are going to increase the interrupt capability, CSA lines are used to control multiple interrupts.
See lessComment on the direction of the port for the following CWR values in 8255 80H 8A H 8B H 92H …
For 8A H, in mode 0. The value in CWR are D7 = 1, D6 = 0, D5 = 0, D4 = 0, D3 = 1, D2 = 0, D1 = 1 and D0 = 0 For 8B H, in mode 0. The value in CWR are D7 = 1, D6 = 0, D5 = 0, D4 = 0, D3 = 1, D2 = 0, D1 = 1 and D0 = 1 For 92 H, in mode 0. The value in CWR are D7 = 1, D6 = 0, D5 = 0, D4 = 1, D3 = 0, D2Read more
For 8A H, in mode 0. The value in CWR are D7 = 1, D6 = 0, D5 = 0, D4 = 0, D3 = 1, D2 = 0, D1 = 1 and D0 = 0
See lessFor 8B H, in mode 0. The value in CWR are D7 = 1, D6 = 0, D5 = 0, D4 = 0, D3 = 1, D2 = 0, D1 = 1 and D0 = 1
For 92 H, in mode 0. The value in CWR are D7 = 1, D6 = 0, D5 = 0, D4 = 1, D3 = 0, D2 = 0, D1 = 1 and D0 = 0
For 98 H, in mode 0. The value in CWR are D7 = 1, D6 = 0, D5 = 0, D4 = 1, D3 = 1, D2 = 0, D1 = 0 and D0 = 0
For 80 H, in mode 0. The value in CWR are D7 = 1, D6 = 0, D5 = 0, D4 = 0, D3 = 0, D2 = 0, D1 = 0 and D0 = 0
using real life examples discuss how AI can be used in detecting fraud
Using AI to detect fraud has aided businesses in improving internal security and simplifying corporate operations. Artificial Intelligence has therefore emerged as a significant tool for avoiding financial crimes due to its increased efficiency. AI can be used to analyze huge numbers of transactionsRead more
Using AI to detect fraud has aided businesses in improving internal security and simplifying corporate operations. Artificial Intelligence has therefore emerged as a significant tool for avoiding financial crimes due to its increased efficiency.
AI can be used to analyze huge numbers of transactions in order to uncover fraud trends, which can subsequently be used to detect fraud in real-time.
When fraud is suspected, AI models may be used to reject transactions altogether or flag them for further investigation, as well as rate the likelihood of fraud, allowing investigators to focus their efforts on the most promising instances.
The AI model can also offer cause codes for the transaction being flagged. These reason codes direct the investigator as to where they should seek to find the faults and aid to speed up the investigation.
AI may also learn from investigators when they evaluate and clear questionable transactions, reinforcing the AI model’s knowledge and avoiding trends that don’t lead to fraud.
Machine learning is a term that describes analytic approaches that “learn” patterns in datasets without the assistance of a human analyst.
AI is a wide term that refers to the use of particular types of analytics to complete tasks ranging from driving a car to, yep, detecting a fraudulent transaction.
Consider machine learning to be a method of creating analytic models, and AI to be the application of those models.
Because the approaches enable the automatic finding of patterns across huge quantities of streaming transactions, they are very successful in fraud prevention and detection
See lessDefine all single rotations and double rotations with examples.
Define all single rotations and double rotations with examples. Answer: Download the Below attachment For the Answer: Vote Up the answer
Define all single rotations and double rotations with examples.
Answer:
Download the Below attachment For the Answer:
Vote Up the answer
See lessWrite C program to find BFS and DFS of any graph.
Q.Write C program to find BFS and DFS of any graph. Answer: Click on the attachment link to download the answer.
Q.Write C program to find BFS and DFS of any graph.
Answer:
Click on the attachment link to download the answer.
See lessWhat is B+ tree? Write down its applications in file organization.
B+ Tree is an advanced method of ISAM file organization. It uses the same concept of key-index, but in a tree like structure. B+ tree is similar to binary search tree, but it can have more than two leaf nodes. It stores all the records only at the leaf node. Intermediary nodes will have pointers toRead more
B+ Tree is an advanced method of ISAM file organization. It uses the same concept of key-index, but in a tree like structure. B+ tree is similar to binary search tree, but it can have more than two leaf nodes. It stores all the records only at the leaf node. Intermediary nodes will have pointers to the leaf nodes. They do not contain any data/records.
B+ Tree are used to store the large amount of data which can not be stored in the main memory. Due to the fact that, size of main memory is always limited, the internal nodes (keys to access records) of the B+ tree are stored in the main memory whereas, leaf nodes are stored in the secondary memory.
B+ Tree Applications
Intelligent test were given to two groups of boys and girls with mean , Standard deviation and Size 75,8,60 for …
Just Click On below Link to Download Docx File.
Just Click On below Link to Download Docx File.
See lessIn a random sample of 200 people in a city, 108 like to purchase imported watches and the remaining like to …
DOWNLOAD BELOW ATTACHMENT FOR ANSWER:
DOWNLOAD BELOW ATTACHMENT FOR ANSWER:
See less