Answer:
bright colors around dull surroundings
Explanation:
Explanation:
Once a virus has successfully attached to a program, file, or document, the virus will lie dormant until circumstances cause the computer or device to execute its code. In order for a virus to infect your computer, you have to run the infected program, which in turn causes the virus code to be executed.
MARK AS BRAINLIST IF IT IS USEFUL
The correct answer is C. A die
Answer:
Offset bits: 3-bits
Set number of cache: 12-bits
Tag bits: 7-bits
22-bit physical address
Explanation:
Since the system is 32K so,
=2⁵.2¹⁰
=2¹⁵
As we know that it is 8-way set associative so,
=2¹⁵/2³
=2¹⁵⁻³
=2¹²
2¹² are cache blocks
22-bit physical address
Off-set bits are 3 as they are calulated from 8-way set associative information.
Set number of cache : 12-bits
For tag-bits:
Add off-set bits and cache bits and subtract from the total bits of physical address.
=22 - (12+3)
=22 - 15
=7
Answer:
Routers control traffic between networks while switches control traffic within a network
Explanation:
There are different devices involves in computer networking. These devices include hub, switch, router and other components.
Switch is used to connect the computer with in the network. It controls the traffic between different computers within the network. Different computers are connected with each other through different cables with the help of switch.
On the other hand, different LAN's connected through the cable with a router to communicate with each other. This device is used to control the traffic between different networks.