1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ehidna [41]
3 years ago
9

Suppose you have a 16-bit machine with a page size of 16B. Assume that any unsigned 16-bit integer can be a memory address. Also

, assume that the machine can support up to only 32KB of physical memory. (1K = 210)
Required:
For paging-based memory allocation, how many page table entries do you need to map the virtual address space of a process, with pure paging alone?
Computers and Technology
1 answer:
irinina [24]3 years ago
7 0

Answer:

2^11

Explanation:

Physical Memory Size = 32 KB = 32 x 2^10 B

Virtual Address space = 216 B

Page size is always equal to frame size.

Page size = 16 B. Therefore, Frame size = 16 B

If there is a restriction, the number of bits is calculated like this:  

number of page entries = 2^[log2(physical memory size) - log2(n bit machine)]

where

physical memory size = 32KB  which is the restriction

n bit machine = frame size = 16

Hence, we have page entries = 2^[log2(32*2^10) - log2(16)] = 2ˆ[15 - 4 ] = 2ˆ11

You might be interested in
Computer crimes are a big concern since the creation of innovative technological advances; which is/are examples of computer cri
Natali [406]

Answer:

The answer is E: All of the above

Explanation:

All of the above scenarios are examples of serious computer crimes. They are crimes that exist in the offline world but take place online. Sexual predators, for instance, mostly take advantage of the anonymity provided by the internet. They often target dating sites and find suitable victims. Cyber bullying and Cyber stalking are just as harmful as any other computer crime. Industrial Espionage may also somehow fall into this category. Less frequently, criminals may steal documents and computer files or more often, illegally gain access to company’s trade secrets on computers and servers.

3 0
3 years ago
Read 2 more answers
PLZ ANSWER ALL MY QUESTION. Which line of code will display the variable num rounded to the nearest tenth?
zavuch27 [327]

Answer:

A

Explanation:

5 0
3 years ago
The view that perceptual processes take place over time and can be thought of in terms of a software/hardware metaphor is known
Wittaler [7]

The view that perpetual processes can be thought of in terms of a software/hardware metaphor is known as the: information processing view.

<h3>What is the Information Processing View?</h3>

Information processing view is explained by the cognitive theory to explain how the brain encodes information and how information are filtered from what we pay attention to in a particular moment. This also determines what is stored in the short-term or in our long-term memory.

Therefore, the view that perpetual processes can be thought of in terms of a software/hardware metaphor is known as the: information processing view.

Learn more about the information processing view on:

brainly.com/question/24863946

3 0
2 years ago
If engine oil gets into the brake fluid, which of the following will happen?
Pani-rosa [81]
This happened to me on my car and the rubber seals swell 
8 0
3 years ago
Read 2 more answers
Describe how to create a new folder on the desktop​
Ne4ueva [31]

Justt create a new folder!

3 0
3 years ago
Read 2 more answers
Other questions:
  • How can development in ICT be utilized to speed up the development and integration efforts
    15·1 answer
  • Binary is best interpreted by a computer because?
    8·2 answers
  • You install a teanviewer on your work station at home so that you can access it when on the road. How can you be assured that un
    12·1 answer
  • Which hardware component is most suspect if a user can barely make out
    10·1 answer
  • J. A computer on a network that acts as the central storage location for
    5·1 answer
  • Jason works for a restaurant that serves only organic, local produce. What
    15·2 answers
  • How many times do you return after the dateline ?
    12·1 answer
  • Which of the following is true about binary search. A. It uses binary numbers in its algorithm B. It is slower than sequential s
    13·1 answer
  • Explain different users of computer in briefly?​
    14·1 answer
  • Higher Order Functions used for simulations of dice rolls. Definition: An n-sided dice function takes no arguments and always re
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!