1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ICE Princess25 [194]
2 years ago
7

Calculate the time necessary to perform a multiply using the approach described in the text (31 adders stacked vertically) if an

integer is 8 bits wide and an adder takes 4 time units.
Computers and Technology
1 answer:
Rudiy272 years ago
5 0

The time that will be used to perform a multiplication using the approach is 28 time units.

<h3>How to calculate time taken?</h3>

From the information given, the following can be noted:

A = 8 (bits wide)

B = 4 time units.

The multiplication will be performed based on the adder stack. Since A = 8, then, A - 1 = 8 - 1 = 7.

Now, the time taken will be:

= 7 × B

= 7 × 4tu

= 28 tu

In conclusion, the correct option is 28 time units.

Learn more about time taken on:

brainly.com/question/10428039

You might be interested in
attackers typically use ack scans to get past a firewall or other filtering device. how does the process of an ack scan work to
bogdanovich [222]

Attackers frequently use ACK scans to circumvent a firewall or other filtering tools. During a NULL scan, all packet flags are enabled. The most recent versions of Nessus Server and Client are compatible with Windows, Mac OS X, FreeBSD, and the vast majority of Linux variants.

<h3>What is ack scan ?</h3>
  • ACK scans are used to identify hosts or ports that have been blocked or are resistant to other types of scanning. An attacker uses TCP ACK segments to learn about firewall or ACL configuration.
  • Attackers probe our router or send unsolicited SYN, ACK, and FIN requests to specific UDP/TCP ports.
  • TCP ACK Scan sends an ACK message to the target port to determine whether or not it is filtered.
  • On unfiltered ports, a RST reply packet will be sent for both open and closed ports. Filtered ports will either generate no response or generate an ICMP reply packet with an unreachable destination.
  • The TCP ACK scanning technique attempts to determine whether a port is filtered by using packets with the ACK flag set.

To learn more about ask scan refer to:

brainly.com/question/13055134

#SPJ4

3 0
1 year ago
Proszę daje wszystko potrzebuje tego
Stolb23 [73]
I’m sorry I do not speak that
5 0
4 years ago
Read 2 more answers
Can someone help me with these questions on linear dimensions pls
andrew-mc [135]
Size dimentions reffer to overall dimentions and will tell the overall width, lenth height and depth of something location dimentions means the locatuon of each geometric shape.
7 0
3 years ago
Read 2 more answers
1. Why is it important to evaluate the website on which you plan to shop? (1 point)
UkoKoshka [18]
Hi there!

For #1 the answer is the site may not be trustworthy, and you risk identity theft. If you are not sure a site legit then don't trust it. Some sites can easy to tell if they can be trusted by the amount of detail put into the site itself, but others are not so easy to tell. In general, if a site does not have https:// in the web address, but instead has just http:// (no "s" in it) then don't trust it.

For #2 the answer is to use<span> a secure browser. If the browser you are using is insecure then the info you put into a site can be compromised and stolen by the browser itself because it reads all info put on it.

For #3 the answer is i</span><span>t has a secure payment page. Again going back to the https:// vs. the http:// if the page that you pay on is not secured then your credit card info can be stolen when put in because the site without a secured page will allow others with access to see your info.

-Your friend in tech, </span>ASIAX   Frequent Answerer
8 0
4 years ago
Read 2 more answers
Which of the following statements are true regarding technology and learning? Select 3 options.
bekas [8.4K]

Answer:

<h2>Knowledge can be acquired throughout your life, through both formal and informal methods.</h2>

As long as a person is alive, they can keep learning. With the amount of knowledge available in the world, it is improbable that a person can acquire all of it before they pass on. It is therefore possible to acquire information until the day a person dies.

<h2>Changes in technology both enable and require lifelong learning.</h2>

Technology keeps changing and developing in order to make things better and more efficient. As such, humans need to keep learning for their entire lives or else they will be left behind as newer technology comes out. Take smartphones for instance, a lot of older grandparents have had to learn how to use them to keep in contact with with their families.

<h2>Virtual reality simulations are being used for training in industries like healthcare and the armed forces.</h2>

Virtual reality has improved the effectiveness of training in both the medical and armed forces industry because with training capable of being done in a virtual world, it can be more in-depth. For instance, medical students can use more realistic subjects to learn the intricacies of the human body and soldiers can embark on dangerous training missions without actually risking their lives.

5 0
3 years ago
Other questions:
  • In the context of organizational decisions at the tactical management level, _____ decisions are often used in resolving conflic
    9·1 answer
  • Which type of link is normally used to interconnect two peripheral modules (pm) in the digital multiplex system (dms)?
    13·1 answer
  • How many generations of computer languages have there been since the middle of the 20th century?
    10·1 answer
  • Saas provides services to an organization that requires the standard business process infrastructure such a CRM
    7·1 answer
  • What is one reason why a business may want to move entirely online?
    13·1 answer
  • Calculate the performance of a processor taking into account stalls due to data cache and instruction cache misses. The data cac
    11·1 answer
  • What is the primary way to access applications in window 10
    7·1 answer
  • A type of multiprocessor chip that provides two or more separate and independent CPUs.
    8·1 answer
  • Implement a class Car with the following properties. A car has a certain fuel efficiency (measured in miles/gallon or liters/kmâ
    5·1 answer
  • Meaning of mesh topology​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!