1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kicyunya [14]
3 years ago
7

We have two processors. They are named PL and PS. PL has a large number of registers, and PS has a small number of registers. Th

ey are running the same program. In general, which processor will require a higher number of memory access to execute the whole program?
A. PS.
B. PL.
Computers and Technology
1 answer:
nataly862011 [7]3 years ago
3 0

Answer:

The answer is B.

Explanation:

PL contains large number of registers so it require a higher number of memory access to execute the whole program.

(Correct me if I am wrong)

You might be interested in
Why is spyware more dangerous than adware
steposvetlana [31]

To find out how spyware is more dangerous, we must know what each term mean.

Adware is a <em>software that automatically displays advertising material usually on a site that a user goes to</em>.

Spyware is a <em>unwanted software that steals your internet usage data and personal information</em>.

So while Adware can be extremely annoying, it is not as potentially harmful as Spyware, which can steal your personal information and potentially ruin your life.

~

7 0
3 years ago
Rachel is a junior system administrator for a network with a single Active Directory domain. The network has just expanded to in
Pepsi [2]

Answer: Ask a member of the Enterprise Admins group to authorize the server.

Explanation:

From the information given, we are informed that Rachel installed a new server running Windows Server 2016 on the new subnet and configure it as a DHCP server but then realizes that the DHCP server service has started, but that the server does not respond to DHCP lease requests.

In this case, the reason for this can be attributed to the fact that the server hasn't been authorized, therefore, she can ask a member of the Enterprise Admins group to authorize the server.

4 0
3 years ago
What are some areas to fill out in the New Formatting Rule dialog box? Check all that apply. rule type function name condition c
spayn [35]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

In this question the given options are:

  1. rule type
  2. function name
  3. condition
  4. cell reference
  5. argument
  6. format

<u>The correct options to this question are:</u>

1. rule type  

3. condition

6.  format

These are the areas that can be used to fill out in the New Formatting Rule dialog box. Other options are not correct becuase these are not used to fill out new formatting rule dialog box.

6 0
3 years ago
Read 2 more answers
Whose guidelines should you follow for the destruction of storage media such as thumb drives, Zip drives, and computers?
Kipish [7]

Answer:

Depends how bad you want to hide something. If the drive has previously been encrypted and the password hashed (like AES-256 with SHA-512 hashing), then deleting the content is enough since it will be slightly overridden and thus unusable. If it is not encrypted already, delete it, and override all your disk space with something. If you want it to die as a secrete 100%, burn it and pulverize it. Otherwise, if you want a quick method, use some real delete software.

5 0
3 years ago
Program C++ I need help!
nikitadnepr [17]

Answer:#include <iostream>

using namespace std;

int main()

{

   int factorial = 1;

   for (int i = 5; i > 0; i--) {

       factorial = factorial * i;

   }

   cout<<factorial;

   return 0;

}

Explanation:

3 0
3 years ago
Other questions:
  • A cashier distributes change using the maximum number of five-dollar bills, followed by one-dollar bills. Write a single stateme
    13·1 answer
  • Which database item would show details such as a customer’s name, their last purchase, and other details about a customer
    14·2 answers
  • Which step needs to be done before changing the font type, size, and color of a particular set of text
    7·1 answer
  • What are the pros and cons of the internet’s ability to access information
    8·2 answers
  • Given an array a, write an expression that refers to the first element of the array .
    5·1 answer
  • viewRatings(string, int) Takes a username and a minimum rating value. It prints all the books that the user has rated with a val
    10·1 answer
  • Using the simple alphabet code below, you will decode and encode the message. Write the Full
    6·1 answer
  • Use the drop-down tool to match each definition to the correct word or phrase. The computer that responds to requests from the c
    15·1 answer
  • MR. Tom asked her students could they plant a flower and bring it to class. Sarah brought his flower and said it was a rose. Jam
    6·1 answer
  • Can someone compress this ipv6 address? 558c:0000:0000:d367:7c8e:1216:0000:66be
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!