1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ber [7]
3 years ago
15

He memory unit of a computer has 2 20 words. The computer has instruction format with four fields; an operation code field, a mo

de field to specify one of 4 addressing modes, a register address field to specify one of 6 5 processor registers, and a memory address.
Assume an instruction is 32 bits long. Answer the following:
A: How large must the mode field be? B: How large must the register field be? C: How large must the address field be? D: How large is the opcode field?
Computers and Technology
1 answer:
Mashutka [201]3 years ago
3 0

Answer:

Opcode = 3

Mode =2

RegisterRegister =7

AR = 20

Explanation:

a) Number of addressing modes = 4 = 22 , So it needs 2 bits for 4 values

Number of registers = 65 = 1000001 in binary , So it needs 7 bits

AR = 20

Bits left for opcode = 32 -(2+7+20) = 3

You might be interested in
The equation x + y2-4x+2y=b describes a circle.
liberstina [14]

Answer:

-1

Explanation:

The given equation can be written as

-3x +y^2 +2y +1=b+1

-3x +(y+1)^2=b+1

(-3x-b)+ (y+1)^2=1

This is to be compared with (x-a)^2 + (y-b)^2=c^2

where (a,b) is the center, and c is the radius of the circle.

Thus, we get y=-1, and this is our answer.

6 0
4 years ago
Which menu would most likely allow you to choose a font A.file B.Edit C.format D.insert​
Ksivusya [100]

Answer:

D

Explanation:

7 0
3 years ago
To prove that fghj is a parallelogram which theorem or postulate has to be used first to prove to fhj is congruent to hfg
Ket [755]
ASA is the Theorem or Postulate that verifies that fghj is a parallelogram by proving that fhj is congruent to hfg. ASA condition is only satisfied if the 2 angles and 1 side is included in the Triangle. Two opposite adjacent angle are visible upon having the parallelogram a diagonal on it.
5 0
4 years ago
Consumer protection laws are meant to
lord [1]
B) prevent unfair or deceptive business practices.
5 0
3 years ago
You work for a company that hired a pen testing firm to test the network. For the test, you gave them details on operating syste
Bingel [31]

Answer:

White box testing strategy

Explanation:

Pen or penetration testing, also known as ethical hacking is a technique used by an organisation to examine the computer systems, networks and web applications for security vulnerabilities such as loopholes, that can be exploited by an attacker.

There several strategies in pen testing that can be used to check for network vulnerabilities, they are, internal testing, external testing, black box testing, white box testing, blind testing etc.

Unlike in black box testing, white box testing provides all necessary information like IP addresses, network structure, operating system etc, to the pen tester.

4 0
3 years ago
Other questions:
  • Explain how increasingly standardized data, access to third-party datasets, and current trends in hardware and software are coll
    9·1 answer
  • What does a shutter speed of 1 mean
    5·2 answers
  • Assume you have written a method with the header num mymethod(string name, string code). the method's type is
    5·1 answer
  • 3. (20 points) Write a C++ recursive function that finds the maximum value in an array (or vector) of integers without using any
    9·1 answer
  • For an activity with more than one immediate predecessor activity, which of the following is used to compute its earliest finish
    9·1 answer
  • For Official Use Only (FOUO) and Controlled Unclassified Information (CUI) may include all of the following except: (circle one)
    13·1 answer
  • A. Carly’s Catering provides meals for parties and special events. In Chapter 3, you created an Event class for the company. The
    5·1 answer
  • Why do people yeet yeet and ree
    12·2 answers
  • Explain what a datalist element does and is used for.
    12·1 answer
  • Which command must you use at the command prompt to determine the names of the network interfaces (including the isatap interfac
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!