1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nonamiya [84]
3 years ago
7

The code size of 2-address instruction is________________.? 5 bytes? 7 bytes? 3 bytes? 2 bytes

Computers and Technology
1 answer:
Finger [1]3 years ago
5 0

Answer:

7 bytes

Explanation:

<u>2 Address Instruction</u>

The 2 address instruction consist 3 components in the format.

One is opcode,other two are addresses of destination and source.

<u>Example-</u>

load b,c | Opcode   destination address,source address

add a,d  | Opcode   destination address,source address

sub c,f    | Opcode   destination address,source address

Opcode consists of 1 bytes whereas destination address and source address consist of 3 bytes each.

(1+3+3) bytes=7 bytes

You might be interested in
What are the max amount of warnings you get before you get banned?
Olenka [21]

Answer:

I'm not sure but I just got a warning from this person Kaite....

5 0
3 years ago
Read 2 more answers
How does and employer judge a candidate
nlexa [21]

Answer:

Explanation:

An employer can judge a candidate from these factors.

1) Confidence Level

2) Way of talking

3) Written or screening test

4) Experience Level

5) Resume

6 0
3 years ago
Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0
konstantin123 [22]

Answer:

Explanation:

World Wide Web (www) has advanced as a major technology since its introduction during the 1980s. In beginning web sites were primarily used only by few number of users to share information related to their academic work. As the user interface evolved over the next coming years with each new version bringing in new frameworks and techniques, it powered web as a hub of technology. Web 1.0, 2.0 and 3.0 brought more dynamic features to the users. Web 1.0 used to describe the web content in static resulting in rigid user experience. Web 2.0 which powered social networking sites became popular developing the web which ultimately served as a platform for people to create and share their own content on the web in the form of blogs, wikis, feeds, tagging systems, user-created publication systems etc. The evolution of web technology began to spread its roots into the major business areas which brought in the requirement for high speed and expanded availability for substantial number of users.

On the other hand, Web 2.0 has also brought some security’s concerns. Mainly the component of client interaction with web, it opened doors to unauthorized actions in the application. In order to provide a rich user experience majority Web 2.0 sites have adopted lightweight user interface code such as asynchronous JavaScript and XML (AJAX). In the Conventional client-server models, many of calls (requests) are handled and processed on the server side. AJAX allows a higher percentage of requests to be processed on the client side. This may give malicious users many options to modify any application code running on a client machine by exploring and testing the application for vulnerabilities.

To overcome this objective, developers should consider installing an appliance at the Internet gateway, which performs real-time code inspection of traffic flowing through the corporate network. High performance and high availability appliances capable of monitoring and acting swiftly to block any suspicious web traffic are paramount. Also, it is very important that developers develop the application with security in mind. Following the coding convention, having the code reviewed, testing the application thoroughly are all part of securing the application in the web.

7 0
4 years ago
William is an HR manager in a textile-manufacturing firm. He is creating a file on the hours each employee worked during the las
Vika [28.1K]

The Round function will do the mentioned operation.

so answer is option C.ROUND

3 0
3 years ago
Read 2 more answers
At Greenwood ATCT, arrival information need NOT be forwarded while FDIO is operational unless the sequence of aircraft changes a
GuDViN [60]

The available options are:

A. Arrival time differs by more than 3 minutes

B. Aircraft is issued an approach other than the tower specified

C. Verbal coordination has not been yet accomplished

Answer:

Aircraft is issued an approach other than the tower specified

Explanation:

Considering the situation described in the question, and according to Instrument Flight Rules (IFR), Approach Clearance Procedures, when at Greenwood Air Traffic Control Tower (ACTC), arrival information need not be forwarded while Flight Data Input-Output (FDIO) operational unless the sequence of aircraft changes and the "Aircraft is issued an approach other than the tower specified."

3 0
3 years ago
Other questions:
  • Designing the moving parts of a car—including the engine, drivetrain, steering, and brakes—is done by what type of engineer?
    11·2 answers
  • Which three of the following are requirements for receiving federal financial aid for college education?
    14·2 answers
  • so im thinking about building my own pc for a decent price can anyone point me to a website where i can buy the parts and name t
    13·2 answers
  • What do you click to move to the next cell in the row?
    7·1 answer
  • List six parts of a computer system and which are output and which is an input device
    5·1 answer
  • Write code to check that HairEyeColor is an array. e) Write code to determine: (i) the total number of respondents in the survey
    6·1 answer
  • Your job as a researcher for a college is going well. You have gained confidence and skill at pulling data and you are not makin
    13·1 answer
  • In which drawer can you set certain lights to light up on your micro:bit?
    12·2 answers
  • A print server uses a print ________ as a software holding area for jobs waiting to be printed.
    5·2 answers
  • Why would a business consider using virtual machines?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!