1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrey2020 [161]
3 years ago
5

In a system using the relocatable dynamic partitions scheme, given the following situation (and using decimal form): Job Q is lo

aded into memory starting at memory location 42K. a. Calculate the exact starting address for Job Q in bytes. b. If the memory block has 3K in fragmentation, calculate the size of the memory block. c. Is the resulting fragmentation internal or external
Computers and Technology
1 answer:
densk [106]3 years ago
5 0

Answer:

a) The exact starting address for Job Q is 43008 bytes

b) The size of the memory block is 46080 bytes

c) Resulting fragmentation is external

Explanation:

a) Job Q starting address

   42 k ⇒ 42 × 1024 = 43008.

b) memory block has 3 k in fragmentation ∴ the size of the memory block is calculated as 3 k ⇒ 3 × 1024 = 3072.

The fact that it is a block means that we have end address = 3072 + 43008 = 46080.

c) External Fragmentation: It will come in a system that uses the relocatable dynamic partitions scheme.

You might be interested in
Whats the correct answer
dem82 [27]
Line 2 or line 4 sorry if I’m wrong
7 0
3 years ago
Read 2 more answers
What does an SQL injection do
Afina-wow [57]

Answer:

SQL injection is a form of hacking that uses user input fields.

Explanation:

SQL injection is when a piece of code or entire algorithm is input where a program prompts for user input. They can be used to change or access data. To prevent this, a programmer should scrub inputs. Scrubbing data removes slashes and arrows, which or commonly used in code.

3 0
3 years ago
Read 2 more answers
Most _____ focus on galning entry over the internet to a secure computer system by finding a
dangina [55]

Most <u>Malware</u>  focus on gaining entry over the internet to a secure computer system by finding a  working user ID and password combination.

<u>Explanation:</u>

A malware is a small computer program which works on the user’s system without knowing to the user. Different malware works differently.

Some malware sits on the user computer, create multiple unnecessary files and make the hard drive full, some people create viruses to show their computer skills which they tend to prove in a wrong way, some malware sits in the computer to steal data especially while using internet.

So there are malware's like Virus, Worm, Trojan, spyware, etc.

5 0
3 years ago
PLEASE HELP :(
belka [17]

Taking data and instructions from a user, processing the data as per instructions, and displaying or storing the processed data, are the four major functions of a computer. These functions are also known as the input function, process function, output function, and storage function, respectively.

5 0
3 years ago
In the context of a manager's roles, a _____ is an informational role that involves seeking and receiving information, scanning
Marina CMI [18]

Answer: Monitor

Explanation: Monitor role is the role played by the person in the management that processes the information.The role has the responsibility of the seeking data and records of the organization.

Organizing or managing ,scanning the data that is seeked and accordingly changes are made is the function of the monitor. Monitors also examines the productivity and the processing in the management.

5 0
3 years ago
Other questions:
  • Which two computer peripherals are connected to the computer through a port?
    9·1 answer
  • The breastbone or ________________ extends down the chest.
    5·1 answer
  • Write a machine-language program to add the three numbers 2, –3, and 6 and output the sum on the output device. Write it in a fo
    11·1 answer
  • What error occurs in the following program? #include using namespace std; int main() { int number1, number2, sum; cout &lt;&lt;
    13·1 answer
  • Create a macro named mReadInt that reads a 16- or 32-bit signed integer from standard input and returns the value in an argument
    5·1 answer
  • Write a function sumOfMultiples, that inputs two integers - seed and cap. The function should return the sum of all the multiple
    6·1 answer
  • Three types of keys on the keyboard​
    15·2 answers
  • Which type of backup ensures you capture a complete snapshot of everything that makes your computer run?.
    10·1 answer
  • What would be an ideal scenario for using edge computing solutions?
    6·1 answer
  • Assume the name of your data frame is flavors_df. What code chunk lets you review the structure of the data frame?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!