1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luden [163]
4 years ago
14

What is meant by polling mode in communication between software andUART and what is its disadvantage as compared to interrupt mo

de.[
Computers and Technology
1 answer:
g100num [7]4 years ago
3 0

Answer and Explanation:

POLLING MODE: In polling mode in communication process the processor     continually check UART port for data instead of UART port signaling the process through an interrupt when data is ready as is done in interrupt mode.

 THE DISADVANTAGES AS COMPARED TO THE INTERRUPT MODE :

the disadvantages in polling mode is that the processor wastes time in checking the UART continually while in interrupt mode it is  doing useful task

until the UART interrupt this  

You might be interested in
When you receive a phone call requesting on-site support, what is one thing you should do before you make an appointment?
steposvetlana [31]

Answer:

Ask to the client all the information about the problem and try to solve it by phone.

If its no possible to solve it by phone, then recall all the information about the problem, so the personal doing the on-site supports can pre-diagnose the problem and give an opportunity solution.

4 0
3 years ago
An example for Shareware?
Kryger [21]
A software that is free of cost for a certain amount of time such as Adobe programs, or Winzip.
6 0
2 years ago
Read 2 more answers
•Write a program to display the duplicate values in an array.
Maksim231197 [3]
I'm gonna help you out here by writing the jist of the loop that youll need because you may have to write this in c or java or python so all you need to do is create an array thats the same size as the array you want to duplicate and a for loop
int main ( ) {

int i,b [5],a [5] ={1,2,3,5,7};

for(i=0;i <5;i++)
{
b [i]=a [i];
}

return 0;
} //hope this helps :)
6 0
4 years ago
Question 3
Ksivusya [100]

Answer:

Output is the answer!

Explanation:

The input is when you move the mouse in real life, while the output is when the mouse moves around on the screen.

Brainliest plz

4 0
3 years ago
A list of the available nonkeyboard characters can be seen in Windows by opening what utility?
slava [35]

Answer:

charmap.exe

Explanation:

A list of available non keyboard characters can be seem in Windows by selecting start and entering a utility called charmap.exe. Enter charmap.exe in search box and then click on that non keyboard character.The character is inserted in application by holding Alt key and coressponding numerical or letter key on keyboard. It can also be invoked in Windows by typing charmap in command prompt. When a user is frequently using a specific character he can lean keystroke assigned to that character. Character Map is a free utility in Windows operating systems for locating and placing non keyboard characters, special symbols. It is also used for word processing programs like MS Word. This is an efficient way to make passwords stronger by using special characters which are not visible on keyboard.

Holding down the Alt key and the corresponding letter or number key on the keyboard, the character is placed in the application

5 0
4 years ago
Other questions:
  • Cuantos actos ay en el mito de aracne
    8·1 answer
  • You are most likely to automatically encode information about
    11·1 answer
  • What is similar software engineering, Hardware engineer, Network Architect, and Web developer?
    11·1 answer
  • What is Service Oriented architecture &amp; How is it different form Object Oriented Middleware?
    6·1 answer
  • What is the small window that pops up in a application that requieres a response for the user
    12·2 answers
  • What is the total resistance in a circuit that contains three 60 ohm resistors connected in a series?
    8·2 answers
  • To help determine to which application a transmission should be delivered on a particular computer, TCP uses the application lay
    8·2 answers
  • An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The at
    14·1 answer
  • Select the word or phrase from the drop-down menu to complete each sentence. File names consist of a ______ and a file extension
    10·1 answer
  • Which blu-ray standard defines rewritable disks?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!