1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrezito [222]
3 years ago
5

3. Problem 5. A digital computer has a memory unit with 24 bits per word. The instruction set consists of 150 different operatio

ns. All instructions have an operation code part (opcode) and an address part (allowing for only one address). Each instruction is stored in one word of memory. a. How many bits are needed for the opcode? b. How many bits are left for the address part of the instruction? c. What is the maximum allowable size for memory? d. What is the largest unsigned binary number that can be accommodated in one word of memory?
Computers and Technology
1 answer:
igomit [66]3 years ago
5 0

Answer:

a) 8 bits b) 16 bits. c) 2¹⁶ * 24 bits d) 2²⁴ -1

Explanation:

a) In order to be able to accommodate 150 different instructions, the number of bits needed must be equal to the minimum power of 2 that satisfies this equation:

2n > 150, i.e. n=8.  

b) If the total number of bits for a word is 24, and 8 are used for the op code, there are 16 bits left for the address part.

c) If the address part has 16 bits, this means that the total addressable space is just 2¹⁶, so the maximum allowable size is 2¹⁶ * 24 bits.

d) As we have 24 bits to be filled, the largest unsigned binary number is just 2²⁴ – 1 .

(As we need to leave a position for all zeros).

You might be interested in
A wiki is best defined as:
Basile [38]

Answer:

a reverse chronological journaling site. a user-collaborated content site, typically text in nature

Explanation:

It is the website that is based on knowledge. It is the text based site that is also called structure content.

The most common example of Wiki is Wikipedia.

8 0
4 years ago
how would you determine if your employer or school has Network monitoring software? would you change your computer activities in
Maslowich

Answer:

It would be hard to tell if you were being monitored by a network monitoring software, however, you could use a VPN to avoid it. Whenever on a public network you should never use passwords and sign in to things like your online banking.

7 0
2 years ago
_______ are designed to provide connectivity for devices within a limited area, typically within the premises of a home, office
algol [13]

Answer:        

Local Area Network (LAN)                                                    

Explanation:

  • Local Area Network (LAN) is a type of computer network.
  • In a LAN the computers are interconnected within a limited locality.
  • This limited geographical area can be a building, a residence, an office, school etc.
  • It can connect few computers such as a few PCs to share resources like printer and also it can connect multiple computers within a company to share multiple resources like printers, hardware, data , applications, storage devices etc.
  • Although the network size is limited but the data rates are high in LAN.
  • LANs can use coaxial cables. The most common technology for connecting computers in a  LAN is called Ethernet having maximum data rate of up to 100 Mbps.
  • For example a Home Network with a computer, smartphone and smart TV connected through WiFi is an example of a Local Area Network.
7 0
4 years ago
How were the pages made to create the Book of Kells? a. Scribes prepared the papers using a printing press. b. 185 calves were s
NeX [460]

Answer:

The answer is "Option b".

Explanation:

This is the book of the liturgical manuscript for the catholic churches, which is the four Scriptural texts now in Cambridge, Dublin, and Ireland. It is the job, which is known for the sophistication, accuracy, and elegance of that same paintings in the Classically illustrated scripts. It was been built between 800 AD by Celtic monks to build vellum 185 calves had been killed, and the incorrect option can be defined as follows:

  • In option a, This book is not used in the printing press.
  • In option c, This book is used in the liturgical manuscript.
7 0
3 years ago
Which of this access specifies can be used for a class so that its members can be accessed by a different class in the same pack
Lelu [443]

Answer:

D) All the mentioned

Explanation:

public: This access modifier allows access from all classes in the program

protected: Means only classes within the same package or sub-classes (inheritance) can access members of the class

No Modifier: Omiting the modifier sets a class to the default. Which implies only classes in the same package can access members of the class.

The given question refers to class members in the same package so any these three access modifiers can be used.

6 0
3 years ago
Other questions:
  • Why must web designers select a common font?
    13·2 answers
  • What are the changes in ios 14.2? What are the benefits of the ios developer program? What is next for Apple? Base your answers
    14·1 answer
  • Which of the following is a good choice to help you stay organized when you are away from the office? A. Personal Information ma
    7·1 answer
  • Can somebody help me?
    11·1 answer
  • Factors of production are A. inputs into the production process. B. social and political conditions that affect production. C. t
    7·1 answer
  • Which is a type of display monitor? HDD CPU SSD LCD
    6·1 answer
  • Why were american colonists unhappy with king george iii?
    6·2 answers
  • Which of the following application delivery methods requires Internet access?
    9·1 answer
  • If a packet gets "sucked down a black hole" (figuratively speaking) and is not received by its sender, and no message is sent ba
    10·1 answer
  • Olivia is an amputee who wears a prosthetic right hand. Which technology would most help her operate a computer?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!