1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotegsom [21]
3 years ago
5

Offset bits tell us how many bytes of data are in a block. These bits are the right-most bits of the memory address. You can con

sider this as the number of columns of data in a cache. With a specific value of the offset bits from an address, we know which column of a block we are trying to access. Given the block size of a cache is 16B (bytes), how many bits do we need for offset? What is the number of bits in offset as a function of block size? Is it practical to have a cache of block size = 1 byte?
Computers and Technology
1 answer:
Verdich [7]3 years ago
8 0

128 bits is needed to offset the 16 bytes.

Explanation:

It is practical to have a cache of block size = 1 byte

It is made up of 8 bits.

You might be interested in
Write the use of the Goto statement with the help of an example.
kogti [31]
Sorry for this but to be honest we do t get taught this in the school I go to sorry
3 0
3 years ago
If you configure any more passwords on the switch, will they be displayed in the configuration file as plain text or in encrypte
Elza [17]

Answer:

The "service password-encryption" global configuration command encrypts passwords configured before and after the command is issued.

Explanation:

A switch is an intermediate network device that is used to transfer frames to nodes on its collision domain. It operates in the Data-link layer of the OSI model.

Switches uses media address control (MAC) table, containing the MAC addresses of the nodes in the network, to determine the destination of nodes.

In the global configuration mode in a switch, the password and other protocols are configured. The service password-encryption command in the global execution mode encrypts passwords configured before and after the command.

4 0
4 years ago
you have been tasked with configuring a digital information station in the office's lobby. guests will be able to use the statio
REY [17]

The most important security consideration for the station is code signing. With code signing, consumers may feel confident about the software they are downloading and can stop worrying about infecting their computer.

With code signing, consumers may feel confident about the software they are downloading and can stop worrying about infecting their computer or mobile device with malware. Code signing has grown in importance for software developers and distributors as more software may be downloaded from the Internet.

Malware can be easily installed on a victim's computer by an attacker who poses as a trustworthy source. As long as users only download software that is regarded as safe by their operating system, code signing ensures that these types of assaults cannot happen.

Nowadays, the Operating System looks for the digital certificate produced through code signing when software is downloaded onto a computer to ensure the security of the software being installed. The user is informed and given the option to stop or continue the installation if no digital certificate is detected.

To know more about code signing click here:

brainly.com/question/28860592

#SPJ4

3 0
1 year ago
In c++
Elodia [21]

Answer:

class studentType: public personType

{

public:

virtual void print() = 0;

virtual void calculateGPA() = 0;

void setID(long id) {

studentId = id;

}

void setCourses(const string c[], int noOfC) {

noOfCourses = noOfC;

for (int i=0; i<noOfCourses; i++) {

courses[i] = c[i];

}

}

void setGrades(const char cG[], int noOfC) {

noOfCourses = noOfC;

for (int i=0; i<noOfCourses; i++) {

coursesGrade[i] = cG[i];

}

}

long getID() {

return studentId;

}

string* getCourses() {

return courses;

}

char* getGrades() {

return coursesGrade;

}

studentType(string fName = "", string lastName = "",

long id = 0, string c[] = NULL, char cG[] = NULL, int noOfC = 0);

private:

long studentId;

string courses[6];

char coursesGrade[6];

int noOfCourses;

};

Explanation:

Code rewritten

5 0
3 years ago
write HTML code to create a web page which will contain a title my favourite book as a centralised heading feluda somogro and bo
Trava [24]

Answer:

Satyajit Ray (1921–1992), a Bengali film director from India, is well known for his contributions to Bengali literature. He created two of the most famous characters in Feluda the sleuth, and Professor Shonku the scientist. He wrote several short novels and stories in addition to those based on these two characters. His fiction was targeted mainly at younger readers (mostly teenagers) , though it became popular among children and adults alike.



Ray during recording of his film Pather Panchali

Most of his novels and stories in Bengali have been published by Ananda Publishers, Kolkata; and most of his screenplays have been published in Bengali in the literary journal Ekshan, edited by his close friend Nirmalya Acharya. During the mid-1990s, Ray's film essays and an anthology of short stories were also published in the West. Many of the stories have been translated into English and published.

3 0
3 years ago
Other questions:
  • True or false the primary advantage of the worksheet is the ability to solve numerical problems quickly and accurately
    11·1 answer
  • How to make a sad face on keyboard using alt?
    5·2 answers
  • You are configuring a switch that has three hosts attached to FastEthernet 0/2 through 0/4. All three hosts are part of a public
    11·1 answer
  • Translate I don't sing into Spanish​
    11·2 answers
  • Page No.
    10·1 answer
  • Opportunities in nanotechnology apply broadly to many fields. Identify TWO areas of IT that may be impacted by its further devel
    6·1 answer
  • A model is replica that?
    11·2 answers
  • A program that doesn’t work properly needs to be debugged. true or false
    8·1 answer
  • What would a bar graph best be used for? State why and give 2-3 examples of things you could demonstrate with a bar graph
    5·1 answer
  • Edit the following statement so it uses the constant named YEAR:
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!