1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erica [24]
3 years ago
6

There are reasons for machine designers to want allinstructions to be the same length. Why is this not a good idea ina STACK mac

hine?
Computers and Technology
1 answer:
swat323 years ago
7 0

Answer and Explanation:

It is generally seen that instruction are of same length in a machine design. But this is not a good factor for the stack machine as there is the function of push and pop which requires addresses and opcodes for the execution of the arithmetic operation .So, there will be lot of waste of memory space if the length of the instruction are of same .That is why stack machines should not have same length instruction.

You might be interested in
Current versions of windows support file names up to ________ characters long
Verizon [17]
Newer, or current versions of Windows from XP to 10 use the NTFS file system. The file system supports up to 255 characters in a file name. The total path length supports up to 30,000 characters.
3 0
3 years ago
-- of 5 points Question 3 1 try left While designing a new system, a company uncovered several processes that were quite rule-ba
Anna [14]

Answer:

B. robotic process automation.

Explanation:

In the design of a new system, a company was able to uncover several processes that were typically rule-based, and which did not really require staff to control or handle.

Hence, the company chose to automate those processes using robotic process automation so they would no longer need to assign people to perform those tasks.

4 0
2 years ago
Explain the developments RAM since it was created in 1968 til today.
xenn [34]

Answer:

From DRAM to DDR4

Explanation:

RAM stands for <em>Random Access Memory.</em> In 1968, Mr. Robert Dennard at IBM's Watson Research obtained the patent for the one-transistor cell that will eventually substitute the old magnetic core memory allocated in computers of the time. By 1969 Intel released the TTL bipolar 64-bit SRAM (Static Random-Access Memory) as well as the ROM "Read Only Memory"; also in 1969 it evolved into "<em>Phase - change memory - PRAM - </em>". However this evolution was not commercialized, Samsung expressed its interest in developing it. In 1970 the first DRAM product was commercially available; it was developed by Intel. In 1971 it was patented EPROM; in 1978 George Perlegos developed EEPROM.

By 1983 a nice breakthrough happened with the invention of SIMM by Wang Labs. In 1993 Samsung came up with KM48SL2000 synchronous DRAM (SDRAM), this variation soon turned into an inductry standard.

In 1996 DDR began a revolution in the memory sector, then in 1999 RDRAM. Both DDR2 SDRAM. DDRR3 and XDR DRAM were commercialized. Finally in 2007 and 2014 the developments of DDR3 and DDR4 were available for the general public.

6 0
3 years ago
We can harden a host by: a. Limiting physical access to it b. Turning off unnecessary services c. Installing patches d. All of t
Rina8888 [55]

Answer:

D

Explanation:

All three of A, B and C are required to harden a host. Thus, All of the above makes the best option.

Hardening simply refers to making your data impossible to be penetrated. More like bulletproof.

To do this, ensure measures like

- Regular Program cleanup

- Patches management

- service pack installation

- service or usage policies

...among others.

Cheers

3 0
3 years ago
Why ues storage unit?​
Jet001 [13]

Huh? I don’t understand your question... please be more specific so we can help you

6 0
3 years ago
Other questions:
  • Shortcuts will help you complete spreadsheet tasks more efficiently.
    12·1 answer
  • Which scenario depicts an ethical workplace practice by a business owner? A. sharing personal information of its employees with
    8·2 answers
  • What answer best explains why improper netiquette is considered dangerous? Individuals who violate user policies are often charg
    14·2 answers
  • Which renewable resources are available at any time?​
    15·1 answer
  • On his computer desktop, Rodney can see several different files, each immediately accessible. Because he is actively working on
    13·1 answer
  • What is an advantage and disadvantage to file compression
    8·1 answer
  • What Fortnite skin is more og?
    5·2 answers
  • Moving your Sprite from right to left is considered the X coordinate?
    5·1 answer
  • Information to develop a project network is collected from the.
    6·1 answer
  • What are 2 ways to send a message to your client when signed in as an accountant user?.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!