1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleksandr [31]
3 years ago
5

5. Assume a computer has a physical memory organized into 64-bit words. Give the word address and offset within the word for eac

h of the following byte addresses: 0, 9, 27, 31,120, and 256.
6. Extend the above exercise by writing a computer program that computes the answer. The program should take a series of inputs that each consist of two values: a word size specified in bits and a byte address. For each input, the program should generate a word address and offset within the word. Note: although it is specified in bits, the word size must be a power of two bytes.

Computers and Technology
1 answer:
spin [16.1K]3 years ago
4 0

Answer:

see explaination and attachment

Explanation:

5.

To convert any byte address, By, to word address, Wo, first divide By by No, the no. of bytes/word, and ignores the remainder. To calculate a byte offset, O, in word, calculate the remainder of By divided by No.

i) 0 : word address = 0/8 = 0 and offset, O = 0 mod 8 = 0

ii) 9 : word address = 9/8 = 1 and offset, O = 9 mod 8 = 1

iii) 27 : word address = 27/8 = 3 and offset, O = 27 mod 8 = 3

iv) 31 : word address = 31/8 = 3 and offset, O = 31 mod 8 = 7

v) 120 : word address = 120/8 = 15 and offset, O = 120 mod 8 = 0

vi) 256 :word address = 256/8 = 32 and offset, O = 256 mod 8 = 0

6. see attachment for the python programming screen shot and output

You might be interested in
Technology
Mashcka [7]

Answer

✔ user interface

✔ rendering engine

✔ browser engine

✔ Networking

✔ Data storage

:)

4 0
2 years ago
1. Imagine that you sit down to your computer (after finishing all your homework) to play your favorite video game. However, whe
klasskru [66]

Answer:

I would go to my email, (well make sure your account is connected) then check about who changed my password/username and what they changed it to.

7 0
3 years ago
Select all that apply. Two physical things you can do to demonstrate you are paying attention to a speaker are _____ and _____.
omeli [17]
B and d ............
7 0
3 years ago
Read 2 more answers
When you apply a multiple sort in access columns are sorted?
Orlov [11]
Columns are sorted on a multilevel sort allowing the user to view their data including more than one sorted field. It allows data to be simply organised and cross-referenced on one single sheet in Access. 
7 0
3 years ago
In this lab, you complete a partially written C++ program that includes built-in functions that convert characters stored in a c
Sunny_sXe [5.5K]

Answer:

#include <iostream>

using namespace std;

int main()

{

   const int LENGTH = 9;

   char sample1[LENGTH];

   char sample2[LENGTH];

   

   cout << "Enter 9 characters to be converted to uppercase: ";

   

   for(int i = 0; i < LENGTH; i++){

   

       cin >> sample1[i];

       sample1[i] = toupper(sample1[i]);

       cout << sample1[i];

   }

   cout << endl;    

   cout << "Enter 9 characters to be converted to lowercase: ";

       

   for(int i = 0; i < LENGTH; i++){

       

       cin >> sample2[i];

       sample2[i] = tolower(sample2[i]);

       cout << sample2[i] ;

   }

   return 0;

}

Explanation:

- Declare the variables

- Ask the user for the characters

- Using for loop, convert these characters into uppercase and print them

- Ask the user for the characters

- Using for loop, convert these characters into lowercase and print them

3 0
4 years ago
Other questions:
  • Int, char, bool, and double are all valid data types in c , true or false
    15·1 answer
  • Under the common criteria, which term describes the user-generated specifications for security requirements?
    12·1 answer
  • Jennifer is trying to install an anti-malware program on a computer that she believes might be infected. During the installation
    13·1 answer
  • All of the following are types of goals listed in the course except?
    14·2 answers
  • Technology has proliferated in Kenya and Somaliland, with text messages used to replace cash, creating mobile money use that, on
    11·1 answer
  • Tests that replace_punctuation() replaces 1 exclamation point and 2 semicolons in "we'll continue our quest in space. there will
    14·1 answer
  • What is computer? Write is features <br><br><br><br><br>​
    14·1 answer
  • Write a program to input the TotalCost and display the Assured gift as per the following criteria TotalCost(TC) Assured Gift Les
    6·1 answer
  • 5. Name the special window that displays data, when you insert a chart.
    8·1 answer
  • How to find HCF and LCM of a number in Q Basic program?? ​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!