1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nonamiya [84]
3 years ago
7

The code size of 2-address instruction is________________.? 5 bytes? 7 bytes? 3 bytes? 2 bytes

Computers and Technology
1 answer:
Finger [1]3 years ago
5 0

Answer:

7 bytes

Explanation:

<u>2 Address Instruction</u>

The 2 address instruction consist 3 components in the format.

One is opcode,other two are addresses of destination and source.

<u>Example-</u>

load b,c | Opcode   destination address,source address

add a,d  | Opcode   destination address,source address

sub c,f    | Opcode   destination address,source address

Opcode consists of 1 bytes whereas destination address and source address consist of 3 bytes each.

(1+3+3) bytes=7 bytes

You might be interested in
What dd command would you use to copy the contents of a partition named /dev/drive1 to another partition, called /dev/backup?
Advocard [28]

Answer:

dd if=/dev/drive1 of=/dev/backup

Explanation:

Linux operating system is an open-source computer application readily available to system operators. The terminal is a platform in the operating system used to write scripts like bash and directly communicate with the system kernel.

There are two commands used in bash to copy files, the "cp" and "dd". The dd is mostly used to copy files from one storage or partition to another. The syntax of dd is;

dd if= (source partition/directory) of= (target partition/directory)

4 0
3 years ago
Which network device sends data to every device that is connected to it?.
rusak2 [61]

Answer:

Router

Explanation:

A router is a more complex device that usually includes the capability of hubs, bridges and switches. A hub broadcasts data to all devices on a network. This can use a lot of bandwidth as it results in unnecessary data being sent - not all computers might need to receive the data.

6 0
2 years ago
Consider the following C code fragment:
wlad13 [49]

Answer:

10

Explanation:

Pointer arithmetic is tricky. The address is incremented by the sizeof the pointed element. A short is 2 bytes.

So adding 10 adds 20 bytes to the starting address of arr[].

In the expression, you're adding 10-6 = 4 to the start of the array, so you're pointing at the fifth element, arr[4] which is 10.

8 0
3 years ago
What is the code for Pong that would work on Khan Academy?
Rashid [163]
Draw = function() {
if () {
if (keyCode === ){
();
}
else if (keyCode === ) {
();
}
}
};
7 0
3 years ago
A router has a valid operating system and a configuration file stored in nvram. the configuration file contains an enable secret
Makovka662 [10]
The answer is user EXEC mode. This is for setting, viewing, and testing system processes. In common, the user EXEC commands let you to link to remote devices, modify terminal line settings on a temporary basis, perform basic tests, and list system information. This also used by common system administrators, while the privileged EXEC mode is used by the root administrator. Use the enable and disable instructions to shift between the two levels. Access to the user-level EXEC command line needs a valid password.
8 0
3 years ago
Other questions:
  • 1. In the.js file, write the JavaScript code for this application. Within the click event handlers for the elements in the sideb
    14·1 answer
  • PLEASE HELP!!!!! David has gone to the Niagara Falls with his camera. He wants to click photos of the people around him and also
    11·2 answers
  • A technician is talking to end users about the specifications for an upgraded application server. The users of the application r
    11·1 answer
  • How can you create the first row of the table as the header of the table?
    14·2 answers
  • Explain the computer according to size​
    10·1 answer
  • Define the terms of data and information .​
    6·1 answer
  • Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integer
    9·1 answer
  • Select the correct answer.
    7·2 answers
  • Which image file format is the best format to use for photographs on the Web
    15·1 answer
  • To reduce the potential for repetitive stress injury you should use proper?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!