1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nonamiya [84]
3 years ago
7

The code size of 2-address instruction is________________.? 5 bytes? 7 bytes? 3 bytes? 2 bytes

Computers and Technology
1 answer:
Finger [1]3 years ago
5 0

Answer:

7 bytes

Explanation:

<u>2 Address Instruction</u>

The 2 address instruction consist 3 components in the format.

One is opcode,other two are addresses of destination and source.

<u>Example-</u>

load b,c | Opcode   destination address,source address

add a,d  | Opcode   destination address,source address

sub c,f    | Opcode   destination address,source address

Opcode consists of 1 bytes whereas destination address and source address consist of 3 bytes each.

(1+3+3) bytes=7 bytes

You might be interested in
A technician installs a new WAP and users in the area begin to report poor performance. The technician uses a ping and only 3 of
krek1111 [17]

Answer: the correct answer is D. Spectrum Analyzer tool

Explanation:

A spectrum analyzer is a piece of electronic equipment that is used to gauge the magnitude (amplitude or strength) of a given input signal set against the full frequency range of the instrument. It is mainly used to measure the strength of the range of known and unknown signals.

4 0
3 years ago
Which of the following statements regarding EFT is false? EFT still requires the endorsement of a check EFT allows payment to be
hammer [34]

A smart way of moving money from one personal banking account directly to another account is called EFT or electric fund transfer. There is a maximum clearance time of 24 hours for transfer.  The most widely-used program is Direct Deposit, in which payroll is deposited straight into an employee's bank account initiated through an electronic terminal, including credit card, Therefore, the following<span> statement regarding EFT is false?</span>

<span>1.                  </span><span>EFT still requires the endorsement of a check </span>

3 0
3 years ago
A user has reported that their workstation is running slowly. You perform a reboot of their workstation and receive a S.M.A.R.T.
abruzzese [7]

The  actions that one need todo or perform FIRST is to backup the hard drive.

<h3>What causes a SMART error?</h3>

A composition of bad blocks can be a tool that can  lead to a SMART error, or when the drive of the system's temperature is known to have gotten too high as a result of poor ventilation or other environmental factors.

Note that The  actions that one need todo or perform FIRST is to backup the hard drive. because by doing so, one can be able to retrieve information back.

Hence the answer is correct.

Learn more about S.M.A.R.T. error from

brainly.com/question/26985946

#SPJ1

5 0
2 years ago
What is the difference between basic auth and oauth.
ratelena [41]

Answer:

Basic auth is an authentication where username and password are sent with an HTTP request unencrypted (just base64 encoded).

OAuth is a scheme whereby you perform a login at an IAM server, which gets you a token, and then you provide the token with requests to another server.

4 0
2 years ago
Select all True statements! Question 1 options: a) Host A is sending Host B a large file over a TCP connection. Assume Host B ha
VikaD [51]

<u>Solution:</u>

a)   False. Piggyback is used only for efficiency. If there's no data packet to be piggybacked to, then B will just send the acknowledgement packet.

b)  False. It is the size of the receiver's buffer that's never changed. RcvWindow is the part of the receiver's buffer that's changing all the time depending on the processing capability at the receiver's side and the network traffic.

c)  The given statement is True.

 d) False. The sequence number of the subsequent segment depends on the number of 8-byte characters in the current segment.

e)  True. Every TCP segment has a current value of rwnd in the receive window.

f)  False. Next_RTT = alpha * last_estimated_RTT + (1-alpha)*newly_collected_RTT_sample. In this case even though the last sampleRTT which is the newly_collected_RTT_sample is 1sec, the next_RTT still depends on alpha and last_estimated_RTT. Therefore, the next_RTT is not necessarily greater than 1sec.

g) False. The acknowledgement number has nothing to do with the sequence number. The ack. number indicates the next sequence number A is expecting from B.

5 0
4 years ago
Other questions:
  • Is this picture the CPU, RAM, CD, or Operating System
    15·1 answer
  • When running JavaApplication8, the following output is seen on the display:
    15·1 answer
  • ______________is a collection of technologies for abstracting the details of how applications, storage, network, and other compu
    6·1 answer
  • You open a folder Properties box to encrypt the folder, click Advanced, and discover that Encrypt contents to secure data is dim
    10·1 answer
  • Outputting all combinations. Output all combinations of character variables a, b, and c using this ordering abc acb bac bca cab
    7·1 answer
  • PLSSS HELP!! During the late 20th century, immigration to the United States increased dramatically from
    7·1 answer
  • Expresa tu reflexión sobre la necesidad de un código de etica para la IA (inteligencia artificial) , oponia sobre los bots en la
    15·1 answer
  • Typing which capitals and exclamation points in an email is an example of
    14·1 answer
  • How do I make time go by faster?? school is so boring gosh..
    10·2 answers
  • Convert the binary number 100101 to decimal. Show your solution
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!