1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oksian1 [2.3K]
3 years ago
8

17. What are the basic modes of operation of 8255?Write the features of mode 0 in 8255?

Computers and Technology
1 answer:
Andru [333]3 years ago
8 0

Answer:

There are two basic operational modes of 8255:

Bit Set/Reset mode (BSR mode).

Input/Output mode (I/O mode).

Features of 8255 Microprocessor:

Mode 0 : Simple Input/Output.

Mode 1 : Input/Output with handshake.

Mode 2 : Bi-directional I/O data transfer.

It has three 8-bit ports : Port A, Port B, and Port C, which are arranged in two groups of 12 pins.

The 8255 can operate in 3 I/O modes : (i) Mode 0, (ii) Mode 1, & (iii) Mode 2.

You might be interested in
How is the Microsoft Word 2013 window organized?
Alenkasestr [34]
The answer is (A): with contextual tabs for major groupings of editing features and ribbons with specific groupings to organize commands.


Contextual tab or tabs are hidden menu that appears when objects like images or texts are selected in programs like MS Word 2013. They typically contain one or more commands applicable to a selected text or object only. They are there in the Ribbon when you need them and disappear when you do not need them anymore. They are basically used for major groupings of editing features.
A ribbon on the other hand help users understand how commands are used directly and efficiently. It organizes a program’s features into a series of tabs.




6 0
3 years ago
Read 2 more answers
Firestick optimizing system storage and applications
Nat2105 [25]

seach up this on goggle many great videos will pop up

Explanation:

<3

7 0
2 years ago
Which cell has no nucleus ?​
Llana [10]
The answer is Prokaryotic Cell
5 0
3 years ago
Read 2 more answers
Bob received a message from Alice which she signed using a digital signature. Which key does Bob use to verify the signature?Gro
alexira [117]

Answer:

Alice's public key

Explanation:A Public key is a key that can be used for verifying digital signatures generated using a corresponding private key which must have been sent to the user by the owner of the digital signature.

Public keys are made available to everyone required and they made up of long random numbers.

A digital signature signed with a person's private key can only be verified using the person's private key.

7 0
3 years ago
Nadia's productivity at work is being hurt due to the large quantity of unwanted e-mail she receives. What steps can she take to
anastassius [24]

Answer:

Hi,

The best option in the list is <u>stop posting her e-mail address on newsgroups.</u>

Explanation:

Unwanted e-mail is categorized as a spam email.These emails can not be entirely avoided because we use the Internet thus it is recommended that you filter them.A program called my email client can help to filter spam though in some cases, it might not be effective.

The techniques Nadia can employ in this case is to hidden her email address when visiting newsgroups.News groups are forums online where people discuss certain topic.Avoid publishing the email in these web sites can hide her tackle this problem. Additionally, Nadia could train the filter serach feature in her email box through repoting such emails using the report button present, avoid responding/openning spam  or use a third party program to track spam emails and block them.

Wish you Luck!

8 0
3 years ago
Other questions:
  • In a five-choice multiple-choice test, which letter is most often the correct answer?
    7·2 answers
  • What is the very first thing a user usually must do to gain access to a secure computer?
    7·1 answer
  • Who is responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hac
    9·1 answer
  • Which composer below was not part of the classical period? <br> A. Beethoven B. Bach<br> C. Mozart
    6·1 answer
  • How will Mario know which words are misspelled in his document?
    11·2 answers
  • What type of network would be suitable for linking all computers in a building
    6·1 answer
  • Write if true or false
    11·1 answer
  • Add me on Fortn!te <br> TsarBacon (imma girl)
    11·1 answer
  • You should move around and take a rest for 30 minutes every 5 minutes.<br><br>True Or False​
    9·1 answer
  • what option can be used to create vpn connections that can be distributed to users' computers so that vpn clients do not have to
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!