1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
scoray [572]
2 years ago
9

How many 64 x 8 memory chips are needed to provide 4096 x 16 memory capacity? Create 4096 x 16 memory with the required number o

f memories.​
Computers and Technology
1 answer:
Licemer1 [7]2 years ago
4 0

Answer:

i World sat 4

Explanation:

i got th3 answer right

You might be interested in
The rules on the Internet for how messages are addressed and passed on are called ____ .
olganol [36]
Answer: Internet Protocal (IP)
7 0
3 years ago
Create an application for a library and name it FineForOverdueBooks. TheMain() method asks the user to input the number of books
andrew11 [14]

Answer:

//The Scanner class is imported which allow the program to receive user input

import java.util.Scanner;

//Class Solution is defined to hold problem solution

public class Solution {

   // The main method which signify the begining of program execution

   public static void main(String args[]) {

       // Scanner object 'scan' is defined to receive input from user keyboard

       Scanner scan = new Scanner(System.in);

       // A prompt is display asking the user to enter number of books

       System.out.println("Please enter number of books: ");

       // the user response is assigned to numberOfBook

       int numberOfBook = scan.nextInt();

       // A prompt is displayed asking the user to enter the number of days over due

       System.out.println("Please enter number of days over due: ");

       // the user response is assigned to numberOfDaysOverDue

       int numberOfDaysOverDue = scan.nextInt();

       //displayFine method is called with numberOfBook and numberOfDaysOverDue as arguments

       displayFine(numberOfBook, numberOfDaysOverDue);

   

   }

   

   //displayFine method is declared having two parameters

   public static void displayFine(int bookNumber, int daysOverDue){

       // fine for first seven days is 10cent which is converted to $0.10

       double firstSevenDay = 0.10;

       // fine for more than seven days is 20cent which is converted to $0.20

       double moreThanSevenDay = 0.20;

       // the fine to be paid is declared

       double fine = 0;

       // fine is calculated in the following block

       if(daysOverDue <= 7){

           //the fine if the over due days is less than or equal 7

           fine = bookNumber * daysOverDue * firstSevenDay;

       } else{

           // the extra days on top of the first seven days is calculated and assigned to extraDays

           int extraDays = daysOverDue - 7;

           //fine for first seven days is calculated

           double fineFirstSevenDays = bookNumber * 7 * firstSevenDay;

           // fine for the extradays is calculated

           double fineMoreThanSevenDays = bookNumber * extraDays * moreThanSevenDay;

           // the total fine is calculated by adding fine for first seven days and the extra days

           fine = fineFirstSevenDays + fineMoreThanSevenDays;

       }

       // The total fine is displayed to the user in a nice format.

       System.out.printf("The fine for " + bookNumber + " book(s) for " + daysOverDue + " day(s) is: $%.02f", fine);

   }

}

Explanation:

The program first import Scanner class to allow the program receive user input. Then the class Solution was defined and the main method was declared. In the main method, user is asked for number of books and days over due which are assigned to numberOfBook and numberOfDaysOverDue. The two variable are passed as arguments to the displayFine method.

Next, the displayFine method was defined and the fine for the first seven days is calculated first if the due days is less than or equal seven. Else, the fine is calculated for the first seven days and then the extra days.

The fine is finally displayed to the user.

4 0
3 years ago
The "offset" between the viewfinder and the lens in compact cameras results in a problem called
boyakko [2]
The answer is Parallax.

5 0
4 years ago
Which two tools used for incident detection can be used to detect anomalous behavior, to detect command and control traffic, and
allsm [11]

Netflow and IDS (intrusion detection system) are the two tools used for incident detection can be used to detect anomalous behavior, to detect command and control traffic, and to detect infected hosts.

The Netflow is CISCO feature used for collecting IP traffic information and monitoring network traffic on a specific interface. Similar to this, IDS is an a<span>pplication that monitors a network or systems for malicious activity or policy violations.</span>

8 0
4 years ago
WikiLeaks is a famous not-for-profit whistleblower website. MasterCard and Visa stopped payments to WikiLeaks after a series of
gayaneshka [121]

Answer:

Hacktivists

Explanation:

Hacktivists are individuals who gain unauthorized access to computer networks or information, then use unruly ways to effect social or political change. Hacktivism started as a way of protesting online to effect a change by pushing for a certain outcome. This saw the building of websites such as wiki leaks. Although hacktivists are not entirely driven by malicious intent they employ some tactics used by hackers to drive their message across.

5 0
3 years ago
Other questions:
  • In what way would web-based applications be useful to organizations?
    8·1 answer
  • _ is the use of a collection of computers, often owned by many people or different organizations, to work in a coordinated manne
    6·1 answer
  • The expectations I would discuss with Erica regarding the usage of the internet
    6·1 answer
  • Software that interprets commands from the keyboard and mouse is also known as the
    15·2 answers
  • Useful open source applications include the popular Web browser Mozilla Firefox, the e-mail application Thunderbird, the relatio
    7·2 answers
  • Helen is working on her colleague’s photos. She came across this particular photo and was confused about which effect the photog
    15·2 answers
  • What will be the output of the following code segment:
    12·1 answer
  • What feature is required to track customer search terms on a website?
    9·1 answer
  • 13. WHICH OF THE FOLLOWING IS INVOLVED IN CREATING A DOCUMENT? *
    7·1 answer
  • What type of software repairs or improves a larger application that is already installed on a system?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!