1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timama [110]
3 years ago
10

A computer’s memory is composed of 8K words of 32 bits each. How many bits are required for memory addressing if the smallest ad

dressable memory unit is a word?
13

8

10

6

32
Computers and Technology
1 answer:
victus00 [196]3 years ago
7 0

Answer:

The minimum number of bits necessary to address 8K words is 13.

Explanation:

You have the number of words to address that is 8000 words, a word is the smallest addressable memory unit.  

8000 words can be addressed with 2^{n}  units. Now you have to find the value of n that approximates to the number of words.  

2^2=4\\2^4=16\\2^7=128\\2^{10}=1024\\2^{12}=4096\\2^{13}=8192

So you can see that 13 bits are needed to address 8K words.

You might be interested in
In Java the ______________are not objects. All of the rest areobjects, or any ___________ is called as object.
Scorpion4ik [409]

Answer:

Reference type,generic type

Explanation:

Reference types are used by a reference that maintains a reference (address) to the object but not the object itself. Because reference kinds reflect the variable's address rather than the data itself, assigning a reference object to another does not copy the information. Instead, it produces a second duplicate of the reference, which relates to the same heap place as the initial value.

Examples of reference types are Classes, Arrays,, Interfaces etc.

A generic type is a generic class or interface that is parameterized over kinds. Essentially, generic types enable you to write a particular, generic class (or method) that operates with distinct kinds, enabling code to be reused.

The class Object  describes the conduct of all Java objects. However, it does not describe the conduct of all Java data structures. That's because not all Java data structures are objects. Some of them are primitive values that can be stored in object variables, but they are not objects themselves.

Unlike object types, primitive types are not sub types or super types.

6 0
3 years ago
In the dental industry, light-activated adhesives have been used for decades to help adhere braces to teeth as well as being use
Bas_tet [7]

In the dental industry, light-activated adhesives have been used for decades to help adhere braces to teeth as well as being used in other dental procedures. These adhesives are one-part translucent polymers that cure and harden when exposed to specific light spectrum. Many of these took up to 30 seconds to cure. New technology brings LED blue light curing which uses blue LED with UV light to cure and harden a light-activated adhesive in 3-5 seconds. Which result below would NOT be an advantage of this new technology?<u> A)There is a higher up-front expense.</u> B)Could be used in other areas such as sealing cracked pipes. C)No filters or cooling fan required due to quick curing and low heat emission. D)There is a major time savings when using the faster high–intensity curing lights.

7 0
3 years ago
Read 2 more answers
julie was just hired to conduct a security assessment of dion training’s security policies. during her assessment, she noticed t
Tasya [4]

An Increase in individual accountability is the improvement that this recommended action will provide for the company.

<h3>What is the aim of the training’s security policies improvement?</h3>

In order to adequately provide accountability, the use of shared or group accounts should be disabled and this allows you to log and track individual user actions based on their individual user accounts.

Also, it will enables the organization to hold users accountable for their actions, too.

Therefore, the Increase in individual accountability is the improvement that this recommended action will provide for the company.

Read more about security policies

brainly.com/question/28165644

#SPJ4

3 0
1 year ago
__________ often causes overactive eye movement.
shepuryov [24]
The answer is ; D , xanax
3 0
3 years ago
Read 2 more answers
When computer criminals launch an intentional attack in which a malicious hacker floods a server with millions of bogus service
makkiz [27]
I'm pretty sure it's a DDOS or DOS attack
6 0
4 years ago
Other questions:
  • Explain how abstraction is used in a GPS system
    12·2 answers
  • A___________ is a person who can give information to potential employers about your character and your abilities. Employer emplo
    7·1 answer
  • Which of the following plug-ins was developed by microsoft and is a software development tool used to write and run internet app
    10·1 answer
  • A _________________________ can use SOAP headers to carry meta information in its messages. A. Web service B. REST Service C. Co
    14·1 answer
  • Jasmine is writing a shopping app. She has created a variable to keep track of the number of items in the shopping cart. Every t
    6·1 answer
  • For LG, on the app Messages, will the delete button on the upper right corner cancel a sending message?
    12·1 answer
  • Your job as a researcher for a college is going well. You have gained confidence and skill at pulling data and you are not makin
    13·1 answer
  • PLEASE GET THIS CORRECT I AM TIMED. CORRECT ANSWER GETS BRAINLIEST
    10·2 answers
  • What is the difference between ionizing and non-ionizing radiation?
    7·2 answers
  • 16. The Nintendo Entertainment System (NES) saw its sales skyrocket as a result of the launch of which of the following games?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!