1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ehidna [41]
3 years ago
9

Suppose you have a 16-bit machine with a page size of 16B. Assume that any unsigned 16-bit integer can be a memory address. Also

, assume that the machine can support up to only 32KB of physical memory. (1K = 210)
Required:
For paging-based memory allocation, how many page table entries do you need to map the virtual address space of a process, with pure paging alone?
Computers and Technology
1 answer:
irinina [24]3 years ago
7 0

Answer:

2^11

Explanation:

Physical Memory Size = 32 KB = 32 x 2^10 B

Virtual Address space = 216 B

Page size is always equal to frame size.

Page size = 16 B. Therefore, Frame size = 16 B

If there is a restriction, the number of bits is calculated like this:  

number of page entries = 2^[log2(physical memory size) - log2(n bit machine)]

where

physical memory size = 32KB  which is the restriction

n bit machine = frame size = 16

Hence, we have page entries = 2^[log2(32*2^10) - log2(16)] = 2ˆ[15 - 4 ] = 2ˆ11

You might be interested in
Computer science is a blank process
PSYCHO15rus [73]

i agree... its a interesting thing to learn, just like learning an actual new language.

4 0
2 years ago
Read 2 more answers
You are a very small company that sells healthcare insurance plans. You estimate that the breach of your customer database will
lozanna [386]

Answer:

C. Accept the risk

Explanation:

The first option is close but might not be suitable for a small company considering it's cost.

The second option which is to spend fifty thousand dollars per year on a data loss prevention solution is projected to cost you more than the risk.

The third option isn't specific and lacks a course of action.

6 0
3 years ago
The problem identification document commits the final and complete problem specification to paper and guides the software develo
tatuchka [14]

Answer:

False.

Explanation:

The problem identification document contains the description  of the problems that are restricting the goals and objectives of the project from being achieved.

It does not guide in decision making of the software developers.It helps them to see where the problem is not in decision making.

Hence the answer to this question is False.

7 0
3 years ago
What does "bbl" mean? my friend uses text slang all the time and i can never understand it unless it's lol.? please help!
Mariana [72]
<span>It means be back later :)</span>
5 0
3 years ago
1. Think about the various ways in which you have seen hackers portrayed in popular media over the past few years. Are they hero
Eva8 [605]
They are definitely not heroic characters, so you can rule that out. Definitely dangerous criminals. If you need me to help further I can. Is that a question or an essay?
3 0
3 years ago
Other questions:
  • A customer states that when she removes the printed pages from her laser printer output tray, the black ink smears all over her
    10·1 answer
  • Only class b and class c networks can be subnetted true or false
    6·1 answer
  • By using password-stealing software, ________ capture what is typed on a keyboard and easily obtain enough personal information.
    5·1 answer
  • Which one is correct?
    7·2 answers
  • File Sales.java contains a Java program that prompts for and reads in the sales for each of 5 salespeople in a company. It then
    8·1 answer
  • Consider the following threats to Web security, and describe how each is countered by a particular feature of SSL.
    15·1 answer
  • Cursor/Blinking line is used to show current_ on document. A- Color b- Status c- Type d- Location
    11·1 answer
  • In a relational database, the three basic operations used to develop useful sets of data are:_________.
    14·1 answer
  • The physical layer of the OSI model is not foundational to any of the other layers. True or False
    8·1 answer
  • What is the best description of a programming language?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!