1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Illusion [34]
3 years ago
8

Consider a multidimensional array A stored in row-major order with 22 rows and 6 columns whose subscripts start at 0. If each el

ement occupies eight bytes, then how many bytes from the start address of A will element A[3, 5] be stored? a. 284 b. 136 c. 184d. 568
Computers and Technology
1 answer:
siniylev [52]3 years ago
4 0

Answer:

Option c is the correct answer for the above question.

Explanation:

  • If the array will store in row-major order, then it will be a store like the first row, then second row and then third row.
  • If the user wants to conclude the address of the A[3,5], then the address of the A[3,5] will be 184.
  • It is because the 3 states the row number and the 5 states the column number.
  • The above question states that every value take 8 bit. and there are 4 rows from 0 to 3 and 6 column (0 to 5) for every row (except the fourth rows because it takes 5 columns from 0 to 4) before the A[3,5].
  • So there are 23 value before A[3,5] which are as-- [00,01,02,03,04,05][10,11,12,13,14,15][20,21,22,23,24,25][30,31,32,33,34].
  • So when every value takes 8 bit then 23 value takes 184 bits(23*8).
  • So the address of A[3,4] is 184.
  • Hence option c is the correct and the other is not because of 184 stated from the c option only.
You might be interested in
How can E-Commerce Portals ensure Security of online Transactions by Customers?
beks73 [17]
Ffkjlfdhaslkjfhlaksdfhlkajsdfh
6 0
3 years ago
What is an example of the most important role of a systems analyst in any corporation?
dsp73

Answer: The system analyst is one of the most important members in any organisation. These system analyst has to analyse different data of the organisation which would help to bring out the different any new business policy changes or any kind of improvement.

Explanation:

An example to know this better would be the system analyst of a telecom company. Here the role of the system analyst would be bring out the design and implementation of new telecom information system and also should be aware of previous data of the organization. The system analyst would also be responsible to bring out the new business policies based on latest telecom standards and ensure the systems conforms to the latest standards.

5 0
3 years ago
Which are examples of copyrighted online materials? Check all that apply.
Stella [2.4K]
The answers are 1, 3, and 5.
7 0
3 years ago
Read 2 more answers
Choose a firewall that is currently on the market and write a technical "sales pitch" to your classmates on why they should choo
stellarik [79]

Answer:

I would propose Comodo Firewall to my schoolmate. It is very easy to understand and have an appealing graphical UI. It gives the most significant level of security from dangers. It checks all the traffic going to the framework and leaving the framework. It quickly cautions you when there is any sort of suspicious action. There are no mind boggling design issues. It learns the conduct of the client to convey customized protection. It gives you the usefulness of Spyware filtering and infection checking in a single tick. There are a lot more functionalities that the firewall gives to its clients.

Explanation:

Choose a firewall that is currently on the market and write a technical "sales pitch" to your classmates on why they should choose the firewall you are selling.

I would propose Comodo Firewall to my schoolmate. It is very easy to understand and have an appealing graphical UI. It gives the most significant level of security from dangers. It checks all the traffic going to the framework and leaving the framework. It quickly cautions you when there is any sort of suspicious action. There are no mind boggling design issues. It learns the conduct of the client to convey customized protection. It gives you the usefulness of Spyware filtering and infection checking in a single tick. There are a lot more functionalities that the firewall gives to its clients.

3 0
4 years ago
3.1.5 Which network component connects a device to transmission media and allows the device to send and receive messages?
Rom4ik [11]

Answer:

Network Interface Card (NIC)

Explanation:

Also called Ethernet Card, the Network Interface Card (NIC) allows a computer or any device to make wired or wireless connections with other devices in a network. This connection made possible by the NIC allows the device to send and receive messages in the network.

An application of this is seen in Internet of Things(IoT) where devices communicate with one another. This is actually possible because all of the devices one way or the other have a network interface card.

8 0
3 years ago
Other questions:
  • Write a program that asks the user to input four numbers (one at a time). After the four numbers have been supplied, it should t
    6·1 answer
  • 20 Points!! Please hurry!!
    9·1 answer
  • High productivity will typically get you positive attention and feedback when you are on a job.
    7·1 answer
  • How can an individual find career data?
    13·1 answer
  • To read visual and audio text means
    11·1 answer
  • Outlines are effective because
    13·2 answers
  • Is 5g harmful to the body ?
    9·2 answers
  • Before you insert a page break, what should you do? select the font you want to use for the text that comes after the page break
    8·1 answer
  • Visual media that gives the appearance of a movement can be a collection of graphics<br>​
    10·2 answers
  • Explain why the program did not print "clap", and how to fix it.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!