1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergio [31]
4 years ago
8

Suppose an array with six rows and eight columns is stored in row major order starting at address 20 (base 10). If each entry in

the array requires only one memory cell, what is the address of the entry in the third row and fourth column?
Computers and Technology
1 answer:
Ronch [10]4 years ago
3 0

Answer:

39

Explanation:

Since each of the address occupies only 1 memory cell and the 2-D array is row-major 2-D array.So the elements will be filled row wise.First the first row will be fully filled after that second row and so on.Since we want the address of the element at third row and fourth column.

we can generalize this :

address of the element at ith row and jth column=s + ( c * ( i - 1 ) + ( j - 1 ) ).

s=Starting address.

c=Number of columns in the 2-D array.

address=20+(8*(3-1)+(4-1))

=20+(8*2+3)

=20+16+3

=39

Or you can make a matrix of six rows and eight columns and put first cell with 20.Start filling the elements row wise one by one and look what is the count of 3rd row and 4th column.

You might be interested in
A company uses the account code 669 for maintenance expense. However, one of the company's clerks often codes maintenance expens
kotegsom [21]

Answer:

The correct answer to the following question will be "Valid-code test".

Explanation:

Even though no significance labels (including a standardized test score parameter) exist, valid data input codes or protocols could still be defined by having to type the correct codes as well as ranges.

  • To diagnose the given mistake, a valid code review will be the strongest internal control audit to incorporate into the organization's computer program.
  • To insert valid code the syntax is: <Code or Range>. Throughout this scenario, each code is decided to enter on another step.
3 0
3 years ago
The MAA is responsible on a daily basis to protect office computers and patient records and personal information from hackers. R
d1i1m1o1n [39]

Two things that I can do in order to protect these assets with the use of the computer or the internet is by first, downloading and using an antivirus software where this has the ability to protect the computer from invaders, hackers and other viruses that could get into the system of the computer. Second, making the data encrypted, so that it will be protected with a code to prevent other people who are trying to get in the data.

3 0
4 years ago
Hybrid processors that can process 32 bits or 64 bits are known by what term?
patriot [66]
For the answer to the question above asking, what h<span>ybrid processors that can process 32 bits or 64 bits are known by what term?

I think you are referring to the Chipset. and they are Manufactured by Intel and Advance Micro Devices (AMD). Intel's Pentium is the first one to have 32 bits and 64 bits of processors.</span>
4 0
3 years ago
In the __________ Standard, chemical manufacturers, importers, and distributors are required to provide hazard information by wa
Bas_tet [7]
The correct answer is C
5 0
3 years ago
You use a cisco 2900 router in your network. you are considering purchasing and implementing the Unifield communications feature
Olenka [21]

Explanation:

License boot module c2900, technology-package uck9

7 0
3 years ago
Other questions:
  • What acts as a platform on which application software runs?
    8·1 answer
  • You can use the_______key if your cursor is at the end of the word. Use the______key if you place the cursor on the left side of
    11·1 answer
  • In what areas is leslie's underspending hurting her
    10·1 answer
  • If you have a document that is relevant to more than one folder in your computer what should you do?
    8·1 answer
  • Which of the following attack is a threat to confidentiality?
    10·1 answer
  • The amount of blank space between each line of text line spacing
    5·1 answer
  • Who innovated an aeroplane? ​
    5·1 answer
  • when working with smart which tab would provide the ability to change the shape or size of the smart art shapes
    15·2 answers
  • Can you help me with this question please ​
    13·1 answer
  • 2
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!