1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Romashka [77]
3 years ago
6

Which type of game controller has a set of controls for each hand?

Computers and Technology
1 answer:
svet-max [94.6K]3 years ago
6 0
If you play the Wii, they have the controller and then they have a nunchuck that connects to the other controller, and you use that with your other hand. Hope that helps :)
You might be interested in
To apply a style to one or more elements on a web page, configure a css ________.
saul85 [17]
External style sheet

element {
background-color: #ffffff

}
5 0
3 years ago
2. Suppose a computer using direct mapped cache has 220 words of main memory and a cache of 32 blocks, where each cache block co
Advocard [28]

Answer:

(a) The block size = 16 words (b) the format for the sizes of the tag, block, and word fields are stated below:

Tag Block Offset  

11 bits 5 bits 4 bits

(c)The memory address 0DB63 will map to 22nd block and 3 byte of a block. (d)  The main advantage of the cache is, when the cache block is made larger or bigger then, there are fewer misses. this occur when the data in the block is used.

One of the disadvantage is that if the data is not used before the cache block is removed from the cache, then it is no longer useful. here there is also a larger miss penalty.

Explanation:

Solution

(a)The Cache of 32 blocks and the memory is word addressable  

The main memory size is not stated, so let's consider it as 2^20  

The main memory size = 2^20  

The block size = 16 words  

The Number of blocks = main memory size/ block size = 2^20/16. = 2^16= 64 K words.

(b) The Main memory is 2^20, which says it is 1 M words size and it requires 20 bits  

Now,

From which 32 cache block requires 2^5, 5 bits and block size means offset requires 2^4, 4 bits

Thus, the sizes of the tag, block, and word fields are stated below:

Tag Block Offset  

11 bits 5 bits 4 bits

(c)The hexadecimal address is 0DB63 , its binary equivalent is  

0000 1101 1011 0110 0011  

The tag = ( first 11 bits) = 0000 1101 101  

block = ( next 5 bits ) = 1 0110  

offset = ( next 4 bits ) = 0011  

Therefore, the memory address 0DB63 will map to 22nd block and 3 byte of a block.

(d) The main advantage of the cache is that, when the cache block is made larger or bigger then, there are fewer misses. this occur when the data in the block is used.

One of the disadvantage is that if the data is not used before the cache block is removed from the cache, then it is no longer useful. here there is also a larger miss penalty.

3 0
3 years ago
When is a handrail required for stairs
ch4aika [34]

Answer: when is not able to get up the stairs like a normal person

Explanation:

5 0
4 years ago
Read 2 more answers
A(n) ___________________ is a set of characters that the originator of the data uses to encrypt the text and the recipient of th
Sindrei [870]

Answer:

The appropriate response will be "Public key".

Explanation:

  • A public key would be created in something like such key encryption cryptography consisting incorporates asymmetric encryption of the keys algorithms.
  • Those same keys have been utilized to transform a document to even such an unintelligible form. Decryption consists done using only a separate, however corresponding, secret address or private key.
6 0
3 years ago
You want to draw a rectangle over the moon you added to your slide and then move it behind the moon. You want it to look like a
Ray Of Light [21]
I choose Home and it’s a good thing to have
5 0
3 years ago
Other questions:
  • What are tags?
    13·1 answer
  • In Rizzati Corp, vice presidents in departments such as engineering, manufacturing, IT, and human resources report directly to t
    15·1 answer
  • which option of the AutoCorrect tool enables you to add and delete words that do not follow abbreviation rules?
    10·2 answers
  • A ____ is approximately a billion bytes.
    9·1 answer
  • A __________ acts as separate network that rests outside the secure network perimeter so untrusted users can access web servers
    10·1 answer
  • ​"To busy multitaskers who need help remembering​ things, Evernote is a digital content management application that makes it eas
    12·1 answer
  • EMERGENCYYYYY what does it mean when i get a security alert when i download an addon on google docs
    7·1 answer
  • Explain why the computer is powerful working tool???​
    7·1 answer
  • Write a C program that reads two hexadecimal values from the keyboard and then stores the two values into two variables of type
    15·1 answer
  • Sftp uses which mechanism to provide security for authentication and data transfer?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!