1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kicyunya [14]
3 years ago
7

We have two processors. They are named PL and PS. PL has a large number of registers, and PS has a small number of registers. Th

ey are running the same program. In general, which processor will require a higher number of memory access to execute the whole program?
A. PS.
B. PL.
Computers and Technology
1 answer:
nataly862011 [7]3 years ago
3 0

Answer:

The answer is B.

Explanation:

PL contains large number of registers so it require a higher number of memory access to execute the whole program.

(Correct me if I am wrong)

You might be interested in
Negative numbers are encoded using the __________ technique. a. two’s complement b. floating point c. ASCII d. Unicode
OLEGan [10]

Negative numbers are encoded using the two’s complement technique. Two's complement is used to encode negative numbers.

Option  A is correct .

<h3>What method does the in data type use to store negative numbers?</h3>

Most implementations you're likely to encounter store negative signed integers in a form known as two's complement. Another important way of storing negative signed numbers is called one's complement. The one's complement of an N-bit number x is basically defined as x with all bits inverted.

<h3>What is encoding method?</h3>

An encoding technique is the application of established industry conventions to a coded character set to create a coded character scheme. Such rules determine the number of bits required to store the numeric representation of a given character and its code position in the encoding.

Learn more about two complement technique encoding :

brainly.com/question/26668609

#SPJ4

5 0
1 year ago
Im trying to type in answers but where the text box is supposed to be it says unlock answers. What does that mean?
borishaifa [10]
You may have to pay or sign up for the text box or if it is a computer program you may need to get the full version of the software if it is a trial
3 0
3 years ago
Write a python program stored in file extra_credit.py that takes three different inputs from the user where : First Input: The p
LUCKY_DIMON [66]

Answer:

Check the explanation

Explanation:

print("************************************************************")

sentence = input("Enter a sentence : ").split()

replace_words = input("\nEnter the words that should be replaced : ").split()

special = input("\nEnter the replacing special Character : ")

result = []

for word in sentence:

   if word not in replace_words:

       result.append(word)

   else:

       result.append(special * len(word))

result = ' '.join(result)

print("\nThe Sentence with words censored is : " + result)

print("************************************************************")

4 0
3 years ago
1-5. Discuss briefly the function and benefits of computer network. (5pts​
Elden [556K]

Computer networks allow an unlimited amount of computers to communicate with each other. This is especially useful in enterprise environments, as technicians have to deal with hundreds of computers at a time. Computer networks make it easier to share files, increase storage capacity, better communication, easier to to control computers remotely, easier to share resources, ability to share a single internet connection on multiple devices. Computer networks also have a lot of cost benifits too, as network administration is centralised, meaning that less IT support is required, and you can cut costs on sharing peripherals and internet access.

Hopefully this helps you out!

7 0
3 years ago
________ is a dedicated device designed to manage encrypted connections established over an untrusted network such as the Intern
pantera1 [17]

Answer:

The correct answer to the following question will be Option B (VPN concentrator).

Explanation:

  • Virtual Private Network (VPN) is a virtual, limited-use network generated using protocol encryption and tunneling over physical, public network connections.
  • A dedicated tool for managing VPN connections built over an untrusted network, such as the Internet, is called a VPN concentrator.
  • It's a type of networking system that ensures secure VPN connections are established and messages are transmitted between VPN nodes.

Therefore, Option B is the right answer.

7 0
4 years ago
Other questions:
  • To enable a compute or device that does not have built-in networking capability, use a(n) ______.
    13·1 answer
  • Given that two int variables, total and amount, have been declared, write a sequence of statements that: initializes total to 0
    14·1 answer
  • Key differences between software and books include all of the following except
    15·2 answers
  • Sharon is responsible for the security on web applications. She’s looking to see if all applications have input validation. What
    12·1 answer
  • Kelly is a college sophomore majoring in computer science. She is interested in gaining exposure to the most useful and current
    13·1 answer
  • What is the purpose and what are some of the components of a wide area network connection?
    5·2 answers
  • Software that uses signature-based detection contains a library of signatures of known _____?
    11·2 answers
  • Independence day in school long passage plss​
    14·1 answer
  • Scripting languages are unique computer languages with a specialized function. explain what scripting languages do, and how this
    7·1 answer
  • Given a list of integers. find the size of the list
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!