1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nataly [62]
4 years ago
15

Tom is very curious as to whether terrorism is truly linked to levels of religiosity around the world. As such, he gathers data

from the Global Terrorism Database and the World Religion Dataset and examines the data together. Tom is looking at this issue from a(n) ___________ perspective.
Computers and Technology
1 answer:
Ede4ka [16]4 years ago
4 0

Answer:

Macrosociology

Explanation:

Sociological perspective or perspectives on sociology is an implied definition on how sociologists study and creates theories systematically, through predetermined theories. There are two perspectives sociologists view subject matters, they are macrosociology and microsociology perspectives.

The microsociology perspective describes the symbolic interactionism of individuals as a unit.

The macrosociology perspective studies the functional and conflict theories, which are the interaction of individuals in groups or communities and their impact to the society.

You might be interested in
Direct Mapped Cache. Memory is byte addressable. Fill in the missing fields based upon the properties of a direct-mapped cache.
xz_007 [3.2K]

The question given is incomplete and by finding it on internet i found the complete question as follows:

Direct Mapped Cache.

Memory is byte addressable

Fill in the missing fields based upon the properties of a direct-mapped cache. Click on "Select" to access the list of possible answers Main Memory Size Cache Size Block Size Number of Tag Bits 3 1) 16 KiB 128 KiB 256 B 20 2) 32 GiB 32 KiB 1 KiB 3) 64 MiB 512 KiB 1 KiB Select] 4 KiB 4) 16 GiB 10 Select ] Select ] 5) 10 64 MiB [ Select ] 6) Select] 512 KiB 7

For convenience, the table form of the question is attached in the image below.

Answers of blanks:

1.  3 bits

2. 20 bits

3. 64 MB

4. 16 MB

5. 64 KB

6. 64 MB

Explanation:

Following is the solution for question step-by-step:

<u>Part 1:</u>

No. of Tag bits = No. of bits to represent

Tag bits = Main memory - cache size bits -------- (A)

Given:

Main memory = 128 KB = 2^7 * 2^{10} = 2^{17}

Cache Memory  = 16 KB = 2^4 * 2^{10}= 2^{14}

Putting values in A:

Tag bits = 17 - 14 = 3 bits

<u>Part 2:</u>

Tag bits = Main memory - cache size bits -------- (A)

Given:

Main memory = 32 GB = 2^5 * 2^{30} = 2^{35}

Cache Memory  = 16 KB = 2^5 * 2^{10}= 2^{15}

Putting values in A:

Tag bits = 35 - 15 = 20 bits

<u>Part 3:</u>

Given:

Tag bits = 7

Cache Memory = 512 KB = 2^9 * 2^{10}  = 2^{19}

So from equation A

7 = Main Memory size - 19

Main Memory = 7 + 19

Main memory = 26

OR

Main Memory = 2^6 * 2^{20} = 64 MB

<u>Part 4:</u>

Given that:

Main Memory Size = 2^4 * 2^{30} = 2^{34}

Tag bits = 10

Cache Memory Bits = 34 - 10 = 24

Cache Memory Size = 2^4 * 2^{20} = 16 MB

<u>Part 5:</u>

Given that:

Main Memory Size  = 64 MB = 2^6 * 2^{20}

Tag bits = 10

Cache Memory Bits = 26 - 10 = 16

Cache Memory Size = 2^{16} = 2^6 * 2^{10} = 64 KB

<u>Part 6:</u>

Cache Memory = 512 KB = 2^9 * 2^{10} = 2^{19}

Tag Bits = 7

Main Memory Bits = 19 + 7 = 26

Main Memory size = 2^{26} = 2^6 * 2^20 = 64 MB

i hope it will help you!

6 0
3 years ago
When engineers consider _____, they propose giving up a benefit of one proposed design in order to obtain a benefit of a differe
spin [16.1K]

Answer:

The answer is A. Constraint.

5 0
3 years ago
A hard drive cannot be partitioned until the device <br> is set.
PilotLPTM [1.2K]
Yeah that true I asked my grandpa
3 0
2 years ago
A computer has dose not have ___________
Ksivusya [100]

Answer:

A computer does not have brain of its own

4 0
3 years ago
Read 2 more answers
Which symbol would be used in a flowchart to represent a connection to another part of the flowchart
Lisa [10]
The answer is an arrow
3 0
3 years ago
Other questions:
  • Pointsfor a failover cluster, what type of network would you use to communicate with an iscsi device?
    15·1 answer
  • A communications system connecting two or more computers is called a(n) ________.
    7·1 answer
  • What is a way to Procter your social security number and other sensitive information from identity theft
    9·1 answer
  • What is a flash player?
    9·2 answers
  • The following relation schema can be used to register information on the repayments on micro loans.
    13·1 answer
  • What will be the output of the following code? &lt;?php $foo = 'Bob'; $bar = $foo; $bar = "My name is $bar"; print $bar; print $
    8·2 answers
  • Given the following structure and variable definitions, struct customer { char lastName[ 15 ]; char firstName[ 15 ]; unsigned in
    6·1 answer
  • Which of the following is a type of input device?
    5·1 answer
  • What is the role of computer in education sector?​
    13·1 answer
  • Select the WRONG statement about Slide Transitions.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!