1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Illusion [34]
3 years ago
8

Consider a multidimensional array A stored in row-major order with 22 rows and 6 columns whose subscripts start at 0. If each el

ement occupies eight bytes, then how many bytes from the start address of A will element A[3, 5] be stored? a. 284 b. 136 c. 184d. 568
Computers and Technology
1 answer:
siniylev [52]3 years ago
4 0

Answer:

Option c is the correct answer for the above question.

Explanation:

  • If the array will store in row-major order, then it will be a store like the first row, then second row and then third row.
  • If the user wants to conclude the address of the A[3,5], then the address of the A[3,5] will be 184.
  • It is because the 3 states the row number and the 5 states the column number.
  • The above question states that every value take 8 bit. and there are 4 rows from 0 to 3 and 6 column (0 to 5) for every row (except the fourth rows because it takes 5 columns from 0 to 4) before the A[3,5].
  • So there are 23 value before A[3,5] which are as-- [00,01,02,03,04,05][10,11,12,13,14,15][20,21,22,23,24,25][30,31,32,33,34].
  • So when every value takes 8 bit then 23 value takes 184 bits(23*8).
  • So the address of A[3,4] is 184.
  • Hence option c is the correct and the other is not because of 184 stated from the c option only.
You might be interested in
Really helpful, I want to get together tomorrow ,Later I will follow and make it the best answer
blagie [28]

Answer:

c

Explanation:

8 0
2 years ago
Consider the university enrollment database schema: 547 Student(snurn: integer, snarne: string, majoT: string, level: string, ag
trapecia [35]

Enroll a student identified by her snum into the class named 'Introduction to Database Systems' is the following transactions, state the SQL isolation level you would use.

1. Enroll a student identified by her snum into the class named 'Introduction to Database Systems'.

<u>Explanation:</u>

Since enroll is unique in the university enrollment database schema and field name is SNUM and it is data type is an integer. To identify student class name and department name and name of student SNUM field is used for searching in university enrollment database schema. Enrollment changing is not possible of the student’s not possible or not good practices in university enrollment database schema.

If a query had been made class wise or department wise enrollment is played an important role.

For  assign, a faculty is made on the class id or  department id.

8 0
3 years ago
Company A has a project plan for a new product under development. The product will be one of many released in the coming year. T
gizmo_the_mogwai [7]

Answer:

Company A

The ISO 27002 classification level that is most likely assigned to this document is:

b) Proprietary

Explanation:

The ISO 27002 classification levels adopted by commercial organizations are Restricted (top secret is preferred in government circles), Confidential, Internal (or proprietary), and Public. Since the new product is under development, one of many, and most likely known to the project team, the project plan will be classified as Proprietary.  Company A designates this document as Proprietary or Internal to show that disclosure of the information to its competitors is not allowed.  This level of classification shows that Company A can establish intellectual property rights over the document.

4 0
3 years ago
NEED DONE ASAP Which option in the Insert Table dialog box should you check if you want smaller tables to fit on a single page?
Damm [24]
The correct answer is Border
3 0
3 years ago
Read 2 more answers
On the line below, write two ways page numbers can be added to a document.
IgorC [24]

Answer: wiriting it and printing it

Explanation: duh

8 0
2 years ago
Other questions:
  • Behaving in an acceptable manner within a workplace environment is referred to as having
    9·1 answer
  • You are holding a rock tied to a string, which is an example of a pendulum. identify and explain the proper term for each part o
    10·2 answers
  • Which term collectively describes hard disks, CDs, and flash drives?
    11·2 answers
  • True or false a computer with a high efficiency rating should stay cooler than one with a low effiency rating
    9·1 answer
  • What are the benefits of building redundancy into a network?
    12·1 answer
  • After you configure backup settings using the backup plugin, backup jobs will run automatically and start taking backups at the
    13·1 answer
  • Which of the following is a key difference between a Windows 7 restore point and one you set yourself?
    11·1 answer
  • Jiz<br>Active<br>2<br>3<br>- 2(7 - 15)<br>What is the value of<br>4​
    10·2 answers
  • When would the Jerusalem virus attack?<br> 1. Friday the 13th<br> 2. Wednesday the 13th
    13·2 answers
  • Describe some things that this person might say that might cause you to NOT hire them. Explain.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!