1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
UNO [17]
3 years ago
10

A. Assume a computer has a physical memory organized into 64-bit words. Give the word address and offset within the word for eac

h of the following byte addresses:
0, 9, 27, 31,120, and 256.

b. Extend the above exercise by writing a computer program that computes the answer. The program should take a series of inputs that each consist of two values: a word size specified in bits and a byte address. For each input, the program should generate a word address and offset within the word. Note: although it is specified in bits, the word size must be a power of two bytes.
Computers and Technology
1 answer:
Galina-37 [17]3 years ago
7 0

Answer:

Check the explanation

Explanation:

For 9th byte , it is from 8*8 bit to 9"8th bit so each word consists of 64 bits , to find word address u have to divide 8*8 by 64.

Offset within word = 9*8modulo 64.

For 27th byte , word address = 8*27/64.

Offset within word = 27* 8 modulo 64

For 21th byte , word address = 8*31/64

Offset within the word = 31*8 modulo 64

For 120 , word address = 8*120/64

Offset within the word = 120*8 modulo 64.

You might be interested in
List the components of a typical operating system and summarize the role of each in a single phrase.
yanalaym [24]

Answer:

The answer is below

Explanation:

There are several components of operating systems, this may be based on the specific types of Operating systems. However, here are some of the major components.

1. Kernel: it delivers the primary level of control on all the computer peripherals.

2. Process Execution: it serves as a connection between the hardware and application program

3. Interrupt: it provides a dependable technique for the OS to transmit & respond to their surroundings.

4. Memory Management: it regulates main memory and then moves processes between disk & main memory during implementation.

5. Multitasking: it interprets the activities of many independent computer programs on a similar computer system.

6. Networking: it defines the interaction of processor through communication lines

7. Security: it protects the activities of other processes going in the system

8. User Interface: it provides permission for a computer operator to get the information.

3 0
2 years ago
1. Create a view named customer_addresses that shows the shipping and billing addresses for each customer.
Verdich [7]

Answer:

Answer given below

Explanation:

1.

CREATE VIEW CustomerAddresses AS

SELECT custo. CustomerID, EmailAddress , LastName ,FirstName,

bill.Line1 AS BillLine1, bill.Line2 AS BillLine2, bill.City AS BillCity, bill.State AS BillState, bill.ZipCode AS BillZip,

ship.Line1 AS ShipLine1, ship.Line2 AS ShipLine2, ship.City AS ShipCity, ship.State AS ShipState, ship.ZipCode AS ShipZip

FROM Customers custo , Addresses ship , Addresses bill

WHERE custo. BillingAddressID= bill.AddressID AND custo.ShippingAddressID= ship. AddressID;

2.

SELECT CustomerID, LastName, FirstName, BillLine1 FROM CustomerAddresses;

3.

CREATE VIEW OrderItemProducts

AS

SELECT Orders.OrderID, OrderDate, TaxAmount, ShipDate,

ItemPrice, DiscountAmount, (ItemPrice- DiscountAmount) AS FinalPrice,

Quantity, and (Quantity * (ItemPrice-DiscountAmount)) AS ItemTotal,

ProductName FROM

Orders, OrderItems, Products

WHERE

Orders.OrderID = OrderItems.OrderID AND

OrderItems.ProductID = Products. ProductID;

4.

CREATE VIEW ProductSummary

AS

SELECT distinct

ProductName, COUNT(OrderID) AS OrderCount, SUM(ItemTotal) AS OrderTotal

FROM

OrderItemProducts

GROUP BY ProductName;

5.

SELECT ProductName, OrderTotal

FROM ProductSummary P

WHERE 5> (select count(*) FROM ProductSummary S

WHERE P.OrderTotal<S.OrderTotal)

ORDER BY OrderTotal;

5 0
3 years ago
quiz Flavio visits a local coffee shop on his way to school and accesses its free Wi-Fi. When he first connects, a screen appear
n200080 [17]

Answer:

Captive portal.

Explanation:

A Wi-Fi can be defined as a wireless local area network that allows network devices such as access points (APs), computers (both laptops and desktops), smartphones, smart televisions, etc., to communicate with each other wirelessly over a short-ranged network. It is a standard communication network that uses radio waves to establish a channel (medium) between multiple network devices.

In this scenario, when Flavio first connects to a Wi-Fi, a webpage appears requiring him to first agree to an Acceptable Use Policy (AUP) before continuing. Thus, the type of access point (AP) he encountered is a captive portal.

A captive portal can be defined as a webpage that's been designed on a networking device to be viewed and interacted with by the user of a public-access network such as a Wi-Fi, before he or she is granted an access to the network (internet).

6 0
2 years ago
Write a program that responds to a positive integer passed on the command line with the number of bits needed to express that nu
jolli1 [7]
You may want to rephrase the output.

```
#!/usr/local/bin/python3

### Written for Python version 3! ###

import sys

num = int( sys.argv[ 1 ] )
exp = 0

while( num > 2**exp ):
    exp += 1

print( "It takes %d bits to get to the center of a Tootsie Roll" % exp )

exit( 0 )
```


7 0
2 years ago
Give the difference betewen recursion and interation in C. Sight what are the advantages and their disadvantages?
mrs_skeptik [129]
I believe you mean iteration. Recursion is when you have a function that calls or uses it's self. it's advantageous because it reduces the amount of code but can fall victim to an endless loop. Iteration is using a while loop or any kind of loop to iterate through a data set normally an array, iteration allows you to do an action for every iterated item but a downside is that it takes a long time to iterate and it is not efficient
8 0
3 years ago
Other questions:
  • To extend the bottom border of a hyperlink across the complete width of a navigation list, change the ____ property of each hype
    9·1 answer
  • What type of lights are necessary for silhouettes?
    12·2 answers
  • To select all the text in a document, press ____.
    12·2 answers
  • Write a function to reverse a given string. The parameter to the function is a string. Function should store the reverse of the
    12·1 answer
  • After clicking the Start button on your computer screen desktop, what option would you then select to examine system components
    15·1 answer
  • _________function tells the cin object to skip one or more characters in the keyboard buffer.
    11·1 answer
  • you are working on creating a business document with two other co-workers. Based on just information, which of the following pre
    14·1 answer
  • Assume that you have the business data in various sources such as Excel, .csv, text files and Access, Oracle databases. Write th
    9·1 answer
  • What is the difference between EPROM and EEPROM, explain why​
    11·1 answer
  • ________ is a group meeting-based process for requirements collection. a. Reverse engineering b. Joint application design c. Hum
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!