1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lilit [14]
3 years ago
11

Suppose that a system uses 32-bit memory words and its memory is built from 16 1M × 16 RAM chips. How large, in words, is the me

mory on this system?
Computers and Technology
1 answer:
Aleksandr-060686 [28]3 years ago
5 0

Answer:

Memory of the system is 2^{23} .

Explanation:

Computer programs are usually written in Byte. That is to say we expressing our megabyte in byte.

NOTE :  1 Megabyte  (MB)  = 2^{20} in Byte

Mathematically written as  :   1 MB=2^{20}

                                                16 MB=X

Cross multiplying the above to make X the subject of the formula.

                X = \frac{16 x 2^{20} }{1}  ………………i

Converting 16 to factor of two

We having  = 16 = 2^{4}  

Therefore equation I becomes =  x =  \frac{2^{4} x 2^{20}  }{1}

          Applying multiplication law of indices

               X =  =2^{4} + 2^{20} =2^{24}  ……………………………..ii

To convert  equation ii to the number of words we divide by 2

Therefore number of words :  \frac{2^{24} }{2}

applying the law of indices x^{a} ÷ x^{b}  = x^{a-b}

Number of words is equal to =2^{24-1} = 2^{23}

Thank you.

You might be interested in
Which Internet Explorer security zone includes all Internet Web sites that are not specifically assigned to another zone?
Anna007 [38]

Answer:

Internet is the correct answer for the above question.

Explanation:

  • The Internet Explorer define some security zone (which includes the Restricted sites, internet, Trusted sites, and Local intranet) which is used to block the unwanted sites which can be opened by some other websites.
  • When any user use any website, sometimes that websites open different websites. This security zone gives the features to secure the user from this event.
  • There are four-zone which are described in the first line, in which the internet zone is used to take all the websites which are not defined for the other security zone. It means that when any user does not decide the security zone for any websites then by default it comes in the internet zone.
  • This is also asked by the question, Hence "internet" is the correct answer.
4 0
3 years ago
Several of the items below indicate the steps required to move a slide to a different location in a presentation. Select those s
Llana [10]

Answer:

1 - Select the slide you want to move

2- Hold down the mouse button

3- Drag the slide where you want it

4 - NA

5- NA

6- NA

Explanation:

1 - Select the slide you want to move

it allows us to select the slide which we want to move by just clicking left mouse button

2- Hold down the mouse button

it allows the selected slide to stick with cursor

3- Drag the slide where you want it

It allows the slide stick with the cursor to drag it by moving the cursor to the required position

4 - NA (Choose move from the toolbox menu)

There is on toolbox against the slide as toolboxes are only available within a slide that is what we are writing on the slides

5- NA (Enter the slide position you want)

There is no command line in which we may enter the slide position to move the slide to a different serial number

6- NA (Switch to the Notes view)

Switching to notes view allows us to write notes with the corresponding slide whereas it doesn't do anything related to moving the slide

5 0
3 years ago
​______________________ is a general security term that includes computer​ viruses, worms, and trojan horses.
VashaNatasha [74]
Malware
-------------------
6 0
3 years ago
Why was the first computer developed? a.) for personal use, b.) for military purposes, c.) for transportation, d.) for communica
IgorLugansk [536]
B) For Military Purposes but around the 1970s they became widely available to consumers.
5 0
3 years ago
Before you insert a page break, what should you do? select the font you want to use for the text that comes after the page break
Triss [41]
Put the insertion point where you want the page to break is what I would write.
7 0
3 years ago
Other questions:
  • What is the Code of Conduct/Ethics for the company/of Department of Defense?
    7·1 answer
  • Jeremy is typing a term paper on his computer and saves it every five minutes or so for good measure. which of the following bes
    11·1 answer
  • Jabari is writing a program which prompts a user for a value with a decimal. Which function should he use? float() int() print()
    9·2 answers
  • Force field meaning in science fiction
    6·1 answer
  • A BufferedReader has a constructor that takes a single InputStreamReader parameter. InputStreamReader has a constructor that tak
    8·1 answer
  • IT professionals should help to protect users’ personal information, such as bank account information or Social Security numbers
    14·1 answer
  • How does recorded audio stay on an audio tape
    12·1 answer
  • When preparing a technical document, do all of the following EXCEPT:_______.
    12·1 answer
  • When Alice turned on her laptop this morning, the screen displayed only colorful horizontal lines. Which of the following is mos
    15·1 answer
  • When software is purchased, a _____ is being bought that gives the purchaser the right to use the software under certain terms a
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!