1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrey2020 [161]
3 years ago
5

In a system using the relocatable dynamic partitions scheme, given the following situation (and using decimal form): Job Q is lo

aded into memory starting at memory location 42K. a. Calculate the exact starting address for Job Q in bytes. b. If the memory block has 3K in fragmentation, calculate the size of the memory block. c. Is the resulting fragmentation internal or external
Computers and Technology
1 answer:
densk [106]3 years ago
5 0

Answer:

a) The exact starting address for Job Q is 43008 bytes

b) The size of the memory block is 46080 bytes

c) Resulting fragmentation is external

Explanation:

a) Job Q starting address

   42 k ⇒ 42 × 1024 = 43008.

b) memory block has 3 k in fragmentation ∴ the size of the memory block is calculated as 3 k ⇒ 3 × 1024 = 3072.

The fact that it is a block means that we have end address = 3072 + 43008 = 46080.

c) External Fragmentation: It will come in a system that uses the relocatable dynamic partitions scheme.

You might be interested in
It converts Assembly Language into machine language?​
docker41 [41]

Answer:

An assembler.

Explanation:

Input is (as with any programming language) files with lists of instructions (typically assembler mnemonics), output is a binary format representing these instructions in machine language.

6 0
2 years ago
You plan to use the Fill Down feature on a formula and you need to keep a cell reference the same. Which of the following format
yKpoI14uk [10]
A $E19 I now it because I am in college
6 0
3 years ago
Read 2 more answers
The matrix theory is used in the ___ technique
wlad13 [49]

Answer:

The matrix theory is used by hill cipher.

Explanation:

Th technique which uses matrix theory is hill cipher technique.

Hill cipher technique is a polygraphic substitution cipher and it is based on linear algebra.

For encrypting a message in Hill Cipher technique each block of n letters is multiplied by an invertible matrix of nxn and that to against modulus 26 and  for the decryption of the message, every block is multiplied by the inverse of the matrix that was used for encryption.

3 0
3 years ago
I’m confused what any of this means can anyone help?
raketka [301]
The answer will be
97
98
96
194
5 0
3 years ago
Jeremie ran around the track at the YMCA for 2 hours.
tekilochka [14]
What's the question your asking here cause I'd be happy to answer it.
4 0
3 years ago
Other questions:
  • _ includes websites that encourage interaction and connection among people, businesses, and organizations.
    5·1 answer
  • Which of the following are examples of algorithms? (Select all that apply, if any do.)
    15·2 answers
  • What part of the computer gives access to the internet
    10·1 answer
  • In this question, you must create a function in C++ using an external editor. When satisfied with your work, you shall attach it
    10·1 answer
  • Where is NumPy used?
    6·2 answers
  • When a client computer wants to connect to a service instance, what specific name type does it use to find the service?
    9·1 answer
  • i know this not school related but my grandmothers RCA RCT6272W23 tablet is saying type password to decrypt storage and i dont k
    5·1 answer
  • Write a c program to count the total number of commented characters and words in a c file taking both types of c file comments (
    11·2 answers
  • 40 points for this question
    7·2 answers
  • What is the best example of personally identifiable information.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!