1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
morpeh [17]
3 years ago
10

How do particles move at higher temperatures compared to how they move at lower temperatures?

Computers and Technology
1 answer:
olasank [31]3 years ago
6 0
At higher temps they are faster because the particles expand with heat an lower temps they hold tightly together
You might be interested in
A program that organizes sequences of automated provisioning tasks. A. Application Packager B. Sequence Manager C. Sequence Logg
love history [14]

Answer:

Application Packager B. Sequence Manager C. Sequence Logger D. Management Loade … r When a NIC reads a packet header and sees the destination address is not its own

Explanation:

Application Packager B. Sequence Manager C. Sequence Logger D. Management Loade … r When a NIC reads a packet header and sees the destination address is not its own

6 0
2 years ago
What is UTF-8 and why was it created?
Yuki888 [10]

Answer: UTF-8 (Unicode transformation format)  is a technique that is capable of producing any character in Unicode standard.

Explanation: UTF-8 is supporting technique that helps in changing any block of bits of any language.It is used for converting any code into the unicode characters.It was created because this coding technique that supports various languages and is also replacing the ASCII code. UTF-8 code is highly compatible with the ASCII codes and has better properties than it.

5 0
3 years ago
2. Suppose a computer using direct mapped cache has 220 words of main memory and a cache of 32 blocks, where each cache block co
Advocard [28]

Answer:

(a) The block size = 16 words (b) the format for the sizes of the tag, block, and word fields are stated below:

Tag Block Offset  

11 bits 5 bits 4 bits

(c)The memory address 0DB63 will map to 22nd block and 3 byte of a block. (d)  The main advantage of the cache is, when the cache block is made larger or bigger then, there are fewer misses. this occur when the data in the block is used.

One of the disadvantage is that if the data is not used before the cache block is removed from the cache, then it is no longer useful. here there is also a larger miss penalty.

Explanation:

Solution

(a)The Cache of 32 blocks and the memory is word addressable  

The main memory size is not stated, so let's consider it as 2^20  

The main memory size = 2^20  

The block size = 16 words  

The Number of blocks = main memory size/ block size = 2^20/16. = 2^16= 64 K words.

(b) The Main memory is 2^20, which says it is 1 M words size and it requires 20 bits  

Now,

From which 32 cache block requires 2^5, 5 bits and block size means offset requires 2^4, 4 bits

Thus, the sizes of the tag, block, and word fields are stated below:

Tag Block Offset  

11 bits 5 bits 4 bits

(c)The hexadecimal address is 0DB63 , its binary equivalent is  

0000 1101 1011 0110 0011  

The tag = ( first 11 bits) = 0000 1101 101  

block = ( next 5 bits ) = 1 0110  

offset = ( next 4 bits ) = 0011  

Therefore, the memory address 0DB63 will map to 22nd block and 3 byte of a block.

(d) The main advantage of the cache is that, when the cache block is made larger or bigger then, there are fewer misses. this occur when the data in the block is used.

One of the disadvantage is that if the data is not used before the cache block is removed from the cache, then it is no longer useful. here there is also a larger miss penalty.

3 0
3 years ago
A drink costs 2 dollars. A taco costs 5 dollars. Given the number of each, compute total cost and assign to totalCost. Ex: 2 dri
evablogger [386]

Answer:

OKKKkkkkkkayyyy

3 0
3 years ago
The packet storm web site includes a large collection of packaged shellcode, including code that can:_____.
elena55 [62]

The packet storm web site includes a large collection of packaged shellcode, including code that can create a reverse shell that connects back to the hacker, flush firewall rules that currently block other attacks, and set up a listening service to launch a remote shell when connected to.

6 0
2 years ago
Other questions:
  • What are two reasons for using layered protocols? what is one possible disadvantage of using layered protocols?
    13·1 answer
  • What is the area of a triangle whose base is 14 m and whose height is 22 m?
    7·1 answer
  • Describe how data center storage applications drive the development of SAN technology.
    8·1 answer
  • Can you please help me by sending a proposal onnanotechnology in networking applications
    8·1 answer
  • Why is it unlawful for an employer to refuse to employ someone based solely on their gender without evidence that such a charact
    9·1 answer
  • 1. Write a CFG to generate identifiers (IDs) in the Java Programming Language. An ID in Java is a string of characters consistin
    5·1 answer
  • Which characteristic of a relational database distinguishes it from a flat file?
    5·1 answer
  • Two things every professional PowerPoint presentation should have
    8·1 answer
  • Re-write the below program correcting the bugs
    8·1 answer
  • What could be done to make sure that people follow copy right laws?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!