1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irakobra [83]
3 years ago
10

If you use the assign software to a user option, how does the new software install to the user's computer? 70-411

Computers and Technology
1 answer:
Serggg [28]3 years ago
3 0
Hi,

If you install a new software and you select option for all users the software will be installed in a special folder that is shared by all the users and each user would represent a subfolder in the shared folder.

Hope this helps.
r3t40
You might be interested in
What are the disadvantages of vector images when compared to bitmap images?
Lana71 [14]
I don’t understand what you mean
7 0
3 years ago
In the following nested loop structure, which loop does the program EXIT first?
seropon [69]

Answer:

The loops are nested, and the program ends when loop 1 is completed. Since loop 4 is the innermost one, that one is completed first.

7 0
3 years ago
A variation of pronounce is a. Proclaim c. Produce b. Profound d. Pronunciation Please select the best answer from the choices p
Rashid [163]

The answer, according to my knowledge, is (d) <em>pronunciation.</em>

<em />

<em>- Lee Hae :) Have a great day!</em>

3 0
3 years ago
(Correct Answer Recieves Brainliest)
astraxan [27]

Answer:

D

Explanation:

3 0
3 years ago
Read 2 more answers
Direct Mapped Cache. Memory is byte addressable. Fill in the missing fields based upon the properties of a direct-mapped cache.
xz_007 [3.2K]

The question given is incomplete and by finding it on internet i found the complete question as follows:

Direct Mapped Cache.

Memory is byte addressable

Fill in the missing fields based upon the properties of a direct-mapped cache. Click on "Select" to access the list of possible answers Main Memory Size Cache Size Block Size Number of Tag Bits 3 1) 16 KiB 128 KiB 256 B 20 2) 32 GiB 32 KiB 1 KiB 3) 64 MiB 512 KiB 1 KiB Select] 4 KiB 4) 16 GiB 10 Select ] Select ] 5) 10 64 MiB [ Select ] 6) Select] 512 KiB 7

For convenience, the table form of the question is attached in the image below.

Answers of blanks:

1.  3 bits

2. 20 bits

3. 64 MB

4. 16 MB

5. 64 KB

6. 64 MB

Explanation:

Following is the solution for question step-by-step:

<u>Part 1:</u>

No. of Tag bits = No. of bits to represent

Tag bits = Main memory - cache size bits -------- (A)

Given:

Main memory = 128 KB = 2^7 * 2^{10} = 2^{17}

Cache Memory  = 16 KB = 2^4 * 2^{10}= 2^{14}

Putting values in A:

Tag bits = 17 - 14 = 3 bits

<u>Part 2:</u>

Tag bits = Main memory - cache size bits -------- (A)

Given:

Main memory = 32 GB = 2^5 * 2^{30} = 2^{35}

Cache Memory  = 16 KB = 2^5 * 2^{10}= 2^{15}

Putting values in A:

Tag bits = 35 - 15 = 20 bits

<u>Part 3:</u>

Given:

Tag bits = 7

Cache Memory = 512 KB = 2^9 * 2^{10}  = 2^{19}

So from equation A

7 = Main Memory size - 19

Main Memory = 7 + 19

Main memory = 26

OR

Main Memory = 2^6 * 2^{20} = 64 MB

<u>Part 4:</u>

Given that:

Main Memory Size = 2^4 * 2^{30} = 2^{34}

Tag bits = 10

Cache Memory Bits = 34 - 10 = 24

Cache Memory Size = 2^4 * 2^{20} = 16 MB

<u>Part 5:</u>

Given that:

Main Memory Size  = 64 MB = 2^6 * 2^{20}

Tag bits = 10

Cache Memory Bits = 26 - 10 = 16

Cache Memory Size = 2^{16} = 2^6 * 2^{10} = 64 KB

<u>Part 6:</u>

Cache Memory = 512 KB = 2^9 * 2^{10} = 2^{19}

Tag Bits = 7

Main Memory Bits = 19 + 7 = 26

Main Memory size = 2^{26} = 2^6 * 2^20 = 64 MB

i hope it will help you!

6 0
3 years ago
Other questions:
  • Open a command prompt on PC1. Issue the command to display the IPv6 settings. Based on the output, would you expect PC1 to be ab
    7·1 answer
  • On the 74ls74 d flip-flop, the clk input has a small triangle. the pr (preset) and clr (clear) inputs have a circle. what do the
    15·1 answer
  • A(n) _____ is a telephone facility that manages incoming calls, handling them based on the number called and an associated datab
    5·1 answer
  • Consider the following threats to Web security, and describe how each is countered by a particular feature of SSL.
    15·1 answer
  • Two routers connect with a serial link, each using its S0/0/0 interface. The link is currently working using PPP. The network en
    6·1 answer
  • What is the decrypted binary
    9·1 answer
  • You have a small business.Due to the recent pandemic you seem to be losing contacts with your suppliers and customers.You want t
    10·1 answer
  • If an electric circuit has 30ohms and 10amps. How many volts the battery voltmeter should read?
    10·1 answer
  • Barbara, an employee, has properly connected her personal wireless router to a network jack inside her office. The router is una
    7·1 answer
  • How many 60 KB jpeg files can be stored on a 2 MB folder in your hard drive?​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!