1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex787 [66]
3 years ago
11

Which act will the person be punished by trying to obtain personal information employees illegally?

Computers and Technology
1 answer:
solong [7]3 years ago
3 0

Jail or something worse

You might be interested in
"kannst du mir bitte helfen" in German-English from Reverso Context: Hier, kannst du mir bitte helfen?
tatuchka [14]

Answer:

"Come help me, please" "Can you help me here?"

Explanation:

Some form of question or help, i think...

4 0
2 years ago
There is an increasing need for private security personnel because of declining resources for many government agencies and a sho
aivan3 [116]
<span>True
</span><span>There is an increasing need for private security personnel because of declining resources for many government agencies and a shortage of police officers in many communities due to lack of funding.

</span>
8 0
4 years ago
Below is a list of 32-bit memory address references, given as word addresses.
Maru [420]

For a direct mapped cache the general rule is: first figure out the bits of the offset (the right-most bits of the address), then figure out the bits of the index (the next-to right-most address bits), and then the tag is everything left over (on the left side).

One way to think of a direct mapped cache is as a table with rows and columns. The index tells you what row to look at, then you compare the tag for that row, and if it matches, the offsettells you which column to use. (Note that the order you use the parts: index/tag/offset, is different than the order in which you figure out which bits are which: offset/index/tag.)

So in part (a) The block size is 1 word, so you need 0 offset bits (because <span><span><span>20</span>=1</span><span><span>20</span>=1</span></span>). You have 16 blocks, so you need 4 index bits to give 16 different indices (because <span><span><span>24</span>=16</span><span><span>24</span>=16</span></span>). That leaves you with the remaining 28 bits for the tag. You seem to have gotten this mostly right (except for the rows for "180" and "43" where you seem to have missed a few bits, and the row for "181" where you interchanged some bits when converting to binary, I think). You are correct that everything is a miss.

For part (b) The block size is 2 words, so you need 1 offset bit (because <span><span><span>21</span>=2</span><span><span>21</span>=2</span></span>). You have 8 blocks, so you need 3 index bits to give 8 different row indices (because <span><span><span>23</span>=8</span><span><span>23</span>=8</span></span>). That leaves you with the remaining 28 bits for the tag. Again you got it mostly right except for the rows for "180" and "43" and "181". (Which then will change some of the hits and misses.)

5 0
3 years ago
Read 2 more answers
Explain the four (4) important attributes that all professional software should have. ​
Mashcka [7]

Answer:

Acceptability, Dependability and Security, Efficiency, and Maintainability.

Explanation:

Acceptability, Dependability and Security, Efficiency, and Maintainability.

3 0
2 years ago
Read 2 more answers
At Michael’s school, 38% of the students have a pet dog and 24% of the students have a pet cat. Michael found that 11% of the st
Anastasy [175]

Answer:

b

Explanation:

b Roll out of sentence to the end result of sentence of the sentence I think that the

3 0
3 years ago
Other questions:
  • Is this photo considered rim photography
    11·1 answer
  • How Oracle 12c advances the security discussion?
    12·1 answer
  • Which website can help you find antivirus software ?
    10·1 answer
  • Nuclear batteries use devices called thermocouples, which convert the ____ of a nuclear reaction into electricity.
    9·1 answer
  • Colin Mackay Inc., a software company with its head office in Amsterdam, has employees across three continents. Certain project
    11·1 answer
  • An integrated file is one that includes information created in _____ Office application(s).
    15·1 answer
  • What is the purpose of a Post Mortem Review? (5 points)
    5·1 answer
  • A software is made from​
    10·1 answer
  • What are some limitations when it comes to testing and ensuring program quality? List at
    15·1 answer
  • Non related to school but im interested,<br><br> Who here actually watches dream smp be honest
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!