1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MrRissso [65]
3 years ago
15

What is work flexibility?

Computers and Technology
1 answer:
Feliz [49]3 years ago
7 0
Working at a time that is convenient to you <span />
You might be interested in
How could each of the two-proposed changes decrease the size of an mips assembly program? On the other hand, how could the propo
Phoenix [80]

Based on the question attached, the Number of bits that is needed to address a register is 7 bits.

<h3>3.  How could the proposed change increase the size of an mips assembly program?</h3>

The two-proposed changes decrease the size of an mips assembly program because a lot of complicated operations will need to be put in place or implemented in one instructions instead of numerous instructions due to the lowered register leaking issue. The program's size will be therefore be lowered as a result of this issue.

The proposed change will increase the size of an mips assembly program because  The size of the instruction word will then be brought up or raised if the required bits are added to the opcode and that of the register fields, which will bring up the size of the programmed.

In  the MIPS register file;

The Number of MIPS registers = 128

The Number of bits needed = log₂128

The  Number of bits needed = 7 bits

So Increasing number bits for opcode will be = (6 + 2)

                                                                       = 8

Therefore the answers to question one:

1. R-type instruction

Op-code = 6 bits

rs = 5 bits

rt = 5 bits

rd = 5 bits

shamt = 5 bits

funct = 6 bits

Hence, the size of the opcode field will be go up by two bits, to eight bits and the size of the rs ,rt, and rd fields is also go up to 7 bits.

For question 2 which is I-type instruction, there is:

Op-code = 6 bits

rs = 5 bits

rt = 5 bits

Immediate = 16 bits

Hence, The size of the opcode field will also go up by two bits, to eight bits and the size of the rs, rt  fields will is also go up to 7 bits.

Therefore, Based on the question attached, the Number of bits that is needed to address a register is 7 bits.

Learn more about program from

brainly.com/question/14897427

#SPJ1

See full question below

Assume that we would like to expand the MIPS register file to 128 registers and expand the instruction set to contain four times as many instructions. 1. How this would this affect the size of each of the bit fields in the R-type instructions? 2. How this would this affect the size of each of the bit fields in the I-type instructions? 3. How could each of the two proposed changes decrease the size of an MIPS assembly program? On the other hand, how could the proposed change increase the size of an MIPS assembly program?

6 0
2 years ago
Consider the following code segment.
Bingel [31]

Answer:

A.)

arr[0] = 10;

arr[1] = 10;

Explanation:

Given the array:

arr = {1,2,3,4,5}

To set the first two elements of array arr to 10.

Kindly note that ; index numbering if array elements starts from 0

First element of the array has an index of 0

2nd element of the array has an index of 1 and so on.

Array elements can be called one at a time using the array name followed by the index number of the array enclosed in square brackets.

arr[0] = 10 (this assigns a value of 10 to the index value, which replace 1

arr[1] = 10 (assigns a value of 10 to the 2nd value in arr, which replaces 2

3 0
3 years ago
Write a program that accepts a file name from the command line, then initializes an array with test data using that text file as
postnew [5]

Answer:

Complete code is given below:

Explanation:

import java.io.BufferedReader;

import java.io.FileNotFoundException;

import java.io.FileReader;

import java.io.IOException;

import java.util.Arrays;

import java.util.Scanner;

public class ArrayCalcs {

private int size;

String [] parts =null;

// based on number of elements in file, array will create.

double[] arr=null;

public void readFile(String file){

try{

FileReader fr = new FileReader(file+".txt");

BufferedReader br = new BufferedReader(fr);

String line = br.readLine();

int count = 0;

while (line != null) {

parts = line.split(" ");

for( String w : parts)

{

count++;

}

line = br.readLine();

}

size=count;

arr=new double[size];

for(int i=0;i<size;i++){

arr[i]=Double.parseDouble(parts[i]);

}

// System.out.println(count);

// System.out.println(Arrays.toString(parts));

System.out.println(Arrays.toString(arr));

} catch (FileNotFoundException ex){

System.out.println("This file does not exist");

} catch (IndexOutOfBoundsException e){

System.out.println("Thie file has more than 7 lines");}

catch (IOException e) {

System.out.println(e.getMessage());

}

}

public double getTotal(){

double sum=0.0;

for(double d:arr){

sum=sum+d;

}

return sum;

}

public double getAverage(){

double avg=getTotal()/arr.length;

return avg;

}

public double getHighest(){

double high=arr[0];

for(int i=0;i<arr.length-1;i++){

if(arr[i] > high)

high = arr[i];

}

return high;

}

public double getLowest(){

double low=arr[0];

for(int i=0;i<arr.length-1;i++){

if(arr[i] < low)

low= arr[i];

}

return low;

}

public static void main(String[] args) {

Scanner s = new Scanner(System.in);

System.out.println("Enter file name:");

String file=s.next();

ArrayCalcs ac=new ArrayCalcs();

ac.readFile(file);

System.out.println(" Highest Element: "+ac.getHighest());

System.out.println("Lowest Element: "+ac.getLowest());

System.out.println("Total: "+ac.getTotal());

System.out.println("Average: "+ac.getAverage());

}

}

4 0
3 years ago
Which ie tab is used to configure how to manage cookies?
Virty [35]
Hmm I think it's the favorite bar
4 0
3 years ago
After creating an organizational strategy based on porter's models, a company can?
malfutka [58]
1.B 2.B 3.C 4.B 5.B 6.C 7.A 8.A 9.C 10.A
3 0
3 years ago
Read 2 more answers
Other questions:
  • Powerpoint provides only three picture effects. true or false.
    5·1 answer
  • Unlocking your smart phone remote security protections that protect your mobile device from meniscus applications
    5·1 answer
  • How do you leave a conversation or group text on iphone (ios 10)? Help!!
    5·1 answer
  • Algorithmic Complexity: what is the asymptotic complexity (Big-O) of each code section? Identify the critical section of each.\
    8·1 answer
  • Firewall ____ indicate whether a large number of echo messages are being received.
    9·1 answer
  • Primitives of transport service assume asymmetry between the two end points during connection establishment, one end (server) ex
    8·1 answer
  • Java: Programming Question: Reverse OrderWrite a program that reads ten integers into an array; define another array to save tho
    10·1 answer
  • Anyone know how to fix black screen of death on computer​
    6·1 answer
  • You have learned a lot about the types of careers that are involved with building a playground. Create two job descriptions of p
    7·2 answers
  • The following questions requires manipulation an analysis of String objects. a. Create a class named String_Manipulation with a
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!