1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
steposvetlana [31]
2 years ago
7

Write a program to generate a square wave with 80% duty cycle on bit P2.7 Microprocessor.​

Computers and Technology
1 answer:
zhenek [66]2 years ago
7 0

Answer:

assuming its assembly (otherwise just delete this ans)

Explanation:

MOV TMOD , #01 ;

MOV TLO, #00 ;

MOV THO, #DCH

CPL P1.5

ACALL DELAY

SJMP HERE

;generate delay using Timer 0

DELAY:

SETB TR0

AGAIN:

JNB TF0 ,AGAIN

CLR TR0

CLR TF0

RET

You might be interested in
Calcula l'energia (Kwh) consumida per una màquina de 30 CV que funciona durant 2 hores.
Sveta_85 [38]

Resposta:

44,76 Kwh

Explicació:

1 cavall = 746 watts

Per tant, 30 cavalls es convertiran en:

30 * 746 = 22380 watts

Temps = 2 hores

La quantitat d'energia consumida s'obté mitjançant la relació:

Energia consumida = Potència * temps

Energia consumida = 22380 watts * 2 hores

Energia consumida = 44760 Wh

A quilowatts (Kwh)

44760 Kwh / 1000 = 44,76 Kwh

4 0
2 years ago
7. Which cipher is based on the clues of the physical factors, rather than the hardware or a software cryptosystem
Stells [14]

Answer:

The concealment cipher.

Explanation:

A concealment cipher also known as null cipher can be defined as an obsolete encryption format that typically involves the mixture of plaintext with non-cipher elements. This ultimately implies that, the plaintext is hidden in another message through encryption.

The concealment cipher is based on the clues of the physical factors, rather than the hardware or a software cryptosystem.

Basically, the concealment cipher is solely dependent on the clues of the physical factors that mainly affects the sender and receiver in a communication system.

7 0
3 years ago
Pls help it’s on a test!! no links :) you can zoom in if hard to read
kotykmax [81]

Answer:

the last one

Explanation:

the domain specifies exactly what file is requested the path specifies where the browsers request should be sent

8 0
3 years ago
To help determine which technology to use, Raul creates a table to help him compare the pros and cons of his choices. What part
love history [14]

The answer is analyzing choices/options

Analyzing choices/options is one of the several steps of the decision making processes. Analyzing your choices will help you determine how your final decisions will impact yourself and everyone else around you. It is in this step that you will be asking yourself the likelihood of the results of your decisions now and in the future. In addition, this step will help you review the pros and cons of your choices listed in the previous steps.

5 0
3 years ago
With a(n) ______, a search engine will show ads that have the keyword typed exactly as the searcher used, but may also have othe
allsm [11]

Answer:

modified broad match.

Explanation:

A Search engine is an internet resource or service that searches for keywords or categories specified by the end user and then displays (shows) a list of website which matches or have informations similar to the query. Some examples of popular search engines are Goo-gle, Bing, Yahoo, etc.

At the retrieving stage of a web search, the search engine queries its database using a retrieval algorithm to extract the necessary and related terms to the search. After obtaining the search terms, the stored web addresses that are related to the search is then displayed.

There are different types of matching techniques used in configuring a search engine and these includes;

I. Exact match.

II. Phrase match.

III. Broad match.

IV. Modified broad match

When a modified broad match is used, the search engine shows adverts that have the keyword typed exactly as the searcher used, but may also include other words within the search term.

Hence, the name modified because it avail users other options by including other words within the search.

5 0
2 years ago
Other questions:
  • You're trying to decide which disk technology to use on your new server. the server will be in heavy use around the clock every
    10·1 answer
  • Which of the following commands is more recommended while creating a bot?
    9·1 answer
  • #We've started a recursive function below called #measure_string that should take in one string parameter, #myStr, and returns i
    5·1 answer
  • _____ are likely to support bigger government, social welfare programs, and legalized abortion.
    8·2 answers
  • How is actual cost calculated?<br><br> Please answer
    12·1 answer
  • What type of engineer is interested in designing, developing, and building different machines, devices, and tools? A.aerospace
    8·2 answers
  • Write the method addItemToStock to add an item into the grocery stock array. The method will: • Insert the item with itemName ad
    12·1 answer
  • A _____ can be used to create and test prototypes, develop interfaces, and simulate factory layouts and assembly lines, without
    10·1 answer
  • In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyon
    10·1 answer
  • What types of things were often NOT captured in early photographs?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!