1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marta [7]
3 years ago
5

Read the PIC Data sheet Chapter 2.0 and 3.0 2. List at least 3 big differences between the Flash and RAM 3. How many RAM locatio

ns are there and how many bits in each location 4. How many Flash locations are there and how many bits in each location 5. Based on the diagram in figure 2-1, what memory are the configuration words associated with 6. In section 3.5.2 there is a description of Linear Data Memory". This is accessed using indirect addressing via the registers FS0 or FSland it allows one to have an array or buffer that is more than 80 bytes long. Explain why this is needed. 7. When you access data RAM, you must always make sure that the BSR is pointing to the right memory bank if you are using the normal mode of direct addressing. Are there any locations in data RAM where you don't have to worry about having the right bank selected? Explain your answer.
Computers and Technology
1 answer:
Alex Ar [27]3 years ago
4 0

Answer: Incomplete question

Explanation: The question attached is incomplete and incoherent, possible solution of this will be difficult to assume. Take adequate time to post complete questions.

Regards.

You might be interested in
Default tab stops are set in word every _______ inch. a. ¾ b. ½ c. 1 d. ¼
Dennis_Churaev [7]
A) 3/4 inch Meow! XD
6 0
3 years ago
What is the autocad term for standard section line symbols?
seraphim [82]
I think the answer is hatch pattern.
8 0
3 years ago
A column letter above the grid, also called the ____, identifies each column.
Nostrana [21]

I guess the answer in the blank is Column Heading.

A column letter above the grid, also called the column heading, identifies each column.

8 0
3 years ago
An identifier that is prefixed with an @ and allows you to use code written in other languages that do not have the same set of
Nina [5.8K]

Answer:

Verbatim Identifier

Explanation:

  • Verbatim Identifier contains @ symbol as a prefix by which enables you to use reserved words of a programming language as identifier. For example the keywords like int, double, goto, char, else, while, for, float etc can be used as strings or variable names if @ symbol is added before these words e.g. @char, @while, @void, @int etc.
  • The compiler of a language will recognize such identifiers as verbatim identifiers and compiles them without giving an error that these are reserved words.
  • Verbatim identifier is used for program that is written in other languages and those languages don't have same reserved words.
  • For example: cout<<"use of verbatim identifier";<<@for;   In this statement, for keyword which is used in for loop can be used as an identifier with @ in the prefix.
  • The escape sequences if used with @ symbol in prefix then they are interpreted in a different way. For example in C#

                              string a = "\\C:\torrent\new\file";

                              Console.WriteLine(a);

This statement will give the following output:

                              \C:          orrent

                               ewfile

This means that the \t in the start of torrent and \n in the start of new word is taken as an escape sequence and output displayed is giving tab space because of \t and prints the rest of the words in new line because of \n escape sequence.

Now lets use this with the @ symbol

                               string a = @"\\C:\torrent\new\file";

                                Console.WriteLine(a);

The output will now be:

                                \\C:\torrent\new\file

\t and \n are not taken as escape sequences by the compiler because of @ symbol.

4 0
3 years ago
What does the shell of an operating system do
Andre45 [30]

The OS shell allows access to the operating system services

8 0
3 years ago
Other questions:
  • 4+4 act quick for brainliest
    10·2 answers
  • Select one of the following strategies: active listening, sandwich technique, constructive feedback. in 2-5 paragraphs, define a
    11·1 answer
  • Which term refers to a type of an attack in which an attacker makes his data look like it is coming from a different source addr
    10·1 answer
  • Anybody know this question???
    6·1 answer
  • 2. Which Interface uses
    7·1 answer
  • You’re having trouble connecting to the Internet so you call your Internet service provider for help. They need to know the perm
    15·1 answer
  • How do Computer Scientists use Binary Code?
    14·1 answer
  • The lower band and upper band of integer data type​
    6·1 answer
  • How to mark a discussion as read on canvas dashboard.
    10·1 answer
  • try the following code to see a nullpointer error (if you don’t see the error because of the autograding, you can copy it into t
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!