1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oksian1 [2.3K]
3 years ago
8

17. What are the basic modes of operation of 8255?Write the features of mode 0 in 8255?

Computers and Technology
1 answer:
Andru [333]3 years ago
8 0

Answer:

There are two basic operational modes of 8255:

Bit Set/Reset mode (BSR mode).

Input/Output mode (I/O mode).

Features of 8255 Microprocessor:

Mode 0 : Simple Input/Output.

Mode 1 : Input/Output with handshake.

Mode 2 : Bi-directional I/O data transfer.

It has three 8-bit ports : Port A, Port B, and Port C, which are arranged in two groups of 12 pins.

The 8255 can operate in 3 I/O modes : (i) Mode 0, (ii) Mode 1, & (iii) Mode 2.

You might be interested in
What are the differences between message confidentiality and message integrity? Can you have confidentiality without integrity?
Artist 52 [7]

Answer:

message confidentiality

Two or more hosts communicate securely, typically using encryption. The communication cannot be monitored (sniffed) by non trusted hosts. The communication between trusted parties is confidential.

message integrity

The message transported has not been tampered with or altered. A message has integrity when the payload sent is the same as the payload received.

Sending a message confidentially does not guarantee data integrity. Even when two nodes have authenticated each other, the integrity of a message could be compromised during the transmission of a message.

Yes, you can have integrity of a message without confidentiality. One can take a hash or sum of the message on both sides to compare. Often we share downloadable files and provide data integrity using md5 hash sums.

Explanation:

3 0
3 years ago
Naynar kis dhrm se sambandhit hai​
Inessa05 [86]

Answer:

Islam dharm se sabandhit

5 0
3 years ago
Read 2 more answers
How do films use camera shots?
lorasvet [3.4K]
These advanced camera shots, or angles, are used in film to convey an effect or emotion rather than exemplify a sense of space. Before filming, cinematographers will write out their shot list in order to plan how each scene of their film should be shot
7 0
3 years ago
Read 2 more answers
A(n) _______ is a distributed networking architecture, residing on one or more computers, where one program requests a resource
vova2212 [387]

Answer: Client-Server model

Explanation:

The Client-server model is a distributed network application configuration, that partitions task or where one program requests a resource or service from another program, between the providers of a resource or service, called servers, and service requesters called clients. In the client-server architecture, when the client computer sends a request for data to the server through the internet, the server accepts the requested process and deliver the data packets requested back to the client.

4 0
3 years ago
Are the ways data is represented and transmitted with computers laws of nature or laws of man?
puteri [66]
I believe the correct answer is Laws of Man
4 0
3 years ago
Other questions:
  • How it print media used? ​
    9·1 answer
  • Optimization Score is made up of over 50 recommendations to optimize Search campaigns.A. TrueB. False
    11·1 answer
  • A device has an IP address of 10.1.10.186 and a subnet mask of 255.255.255.0. What is true about the network on which this devic
    9·1 answer
  • You want to boot a linux system into singer user mode/ what options might you add to a linux kernel options list in a boot loade
    9·1 answer
  • What does scarcity force people to do?
    11·1 answer
  • Which of the following involves making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those
    5·1 answer
  • Question 9 (1 point)
    14·1 answer
  • Write a program that uses a stack to test input strings to determine whether they are palindromes. A palindrome is a sequence of
    7·1 answer
  • According to institutional anomie theory, why is there a need to maintain cooperation between economic and non-economic institut
    9·1 answer
  • Write a program in c# that simulates the roll of two six sided dice.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!