1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jasenka [17]
3 years ago
15

Please help!

Computers and Technology
1 answer:
MaRussiya [10]3 years ago
4 0
Use Easybib.com for your citations. All you have to do is type the name of your sources in to "easybib" and choose if it is a book or a website, then copy it on to a word document.

I hope you can understand this and it helps!!
You might be interested in
I need some help with this project. The picture of the assignment is above
Mekhanik [1.2K]

Answer:

sorry

Explanation:

you need to do this on your own Wahhabi

but if you sub to my you-tube channel at chris got ha,x i will help you out

6 0
3 years ago
You have been assigned to investigate whether or not an employee at a local hospital has been accessing patient records and sett
Over [174]

Answer: The pharmacies and the employee and  patient  must be examined during the investigation.

Explanation:

8 0
3 years ago
1. Defines and uses an interface block to connect to the test program and the DUT. The interface block should also contain a clo
Roman55 [17]

Answer:

It might helpful or might be the correct answer to provide the complete question or problem:

This is a testbench design problem, within it, you need to consider the module describing an accumulator.

Explanation:

Consider the following module describing an accumulator:

module  accumulator (

       output reg:  [ 15:0 ]   sum,     // acumulated out

       input [ 7:0 ] in,                      //in

       input rst / clk ) ;                   //reset and clock inputs

       wire  carry ;

       wire [ 15:0 ] sum_in ;

       assign  { carry , sum_in } =  sum + in ;

        alwaysatt ( posedge clock )

                 if ( rst ) sum ∠ = 0 ; else

                 sum ∠ = ( carry ) ?  16´hFFFF  :   sum_in ;

endmodule

From the design code, these are the specifications:

- An active high reset ( rst ) that is synchronous to the positive edge of the clock ( clk ) and clears the output ( sum ) to zero.

- Once reset is removed, the accumulator accumulates summation of the data present on the input ( in ) on every positive clock edge and if the summation exceeds the maximum value that can be represented using a 16-bit number (i.e. 16´hFFFF), the output gets saturated at 16´hFFFF

- The design treats the input data as an unsigned number and produces the output also as unsigned value.

Now write a complete system verilog for this desing that:

(See  1, 2, 3, 4, 5, 6, 7, 8 system requirements)

Defines and uses an interface block to connect to the test program and the DUT.

The interface block should also contain a clocking block and modport statements for defining signal direction to the testbench and to the DUT.

2. Generates the clock signal

3. Applies reset at the beginning

4. Checks the success of the reset operation and displays a success/fail message

5. Makes use of a class for defining random variables and a dynamic array to hold the random values.

6. Constraints the generated random values such that the number of generated random values (i.e. size of dynamic array) is less than 500 and their sum will be greater than 16'hFFFF

7. Applies the generated random values to the design input (in), one at every clock cycle

8. Checks the correctness of the design output (sum) at every clock cycle while applying inputs, and reports if there is a mismatch between the output of the design and the expected output.  

 

Explanation:

 

7 0
3 years ago
Why are computers assigned IP addresses?
ladessa [460]

Answer:An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. An IP address serves two main functions: host or network interface identification and location addressing.

6 0
3 years ago
_____________ is the characteristic of a resource that ensures that access is restricted to only permitted users, applications,
Maksim231197 [3]

Answer:

The answer to this question is "Confidentiality".

Explanation:

The answer is Confidentiality because in any computer system many files are important for there user. If the file was deleted, corrupted or stolen from the computer. So the user faces the difficulty to avoid this type of problem computer system provides a technique that is access control or it is also known as Confidentiality. It is a technique that controls who or what type of user's use of resources in a computing environment.

So the answer to this question is Confidentiality.

4 0
3 years ago
Other questions:
  • Which of the following is true about the strategy that uses page fault frequency (PFF) to prevent thrashing?
    6·2 answers
  • What is occurring when an attacker manipulates commonplace actions that are routinely performed in a business?
    6·1 answer
  • Suppose that you have been running an unknown sorting algorithm. Out of curiosity, you once stopped the algorithm when it was pa
    8·1 answer
  • The fill command try’s to fill or generate content for cells based on a ________.
    15·1 answer
  • Domestic refers to things that happen __________ of the united states
    15·2 answers
  • Use MPLAB to write an asemply program to multipy two numbers (11111001) and (11111001). Then save the product in file reisters 0
    8·1 answer
  • Select the correct answer.
    5·2 answers
  • Tools used to type text on Ms -paint​
    10·1 answer
  • How do you determine if a name is a variable holding a value or if it is a function call?
    6·1 answer
  • : Compute the 9 partial derivatives for the network with two inputs, two neurons in
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!