1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brums [2.3K]
3 years ago
12

"The principle of ______________ states that programs tend to access data and instructions nearby recently used data and instruc

tions."
Computers and Technology
1 answer:
maria [59]3 years ago
4 0

Answer:

<em>Locality of reference.</em>

Explanation:

In computing, The principle of locality of reference is the probability of a processor to repeatedly access the same set of memory locations within a small time interval. This reference of locality can be spatially based (repetitive usage of data within the same location on the computer memory), or temporally based (repetitive usage of a particular data or resources within a shot time interval). The ability of some computing system to perform this action increases their predictability, and efficiency of memory hierarchy use, among other abilities.

You might be interested in
Write a program with a method computeCommission which takes a double that is the salesAmount and returns the commissions for sal
miv72 [106K]

Answer:

Explanation:

def computeCommission(salesAmount):

   commission=0

   if salesAmount <= 50000:

       commission = 5000*0.08 + (salesAmount-5000)*0.1

   elif salesAmount > 50000:

       commission = 5000*0.09 + (salesAmount-5000)*0.12

   return commission

print("commission for 45000 : "+str(computeCommission(45000)))

print("commission for 54000 : "+str(computeCommission(54000)))

4 0
3 years ago
A technician has been dispatched to a customer site to diagnose an issue where the computer turns off intermittently. Upon arriv
alisha [4.7K]

Answer:

The answer is "Option B".

Explanation:

When the technician detects a smoke smell, which is coming from the computer system it means it will sort to solve this problem the technician will shut the system down and substitute electricity, at this, it overcomes the problem, and wrong choices can be defined as follows:

  • In choice A, It is wrong because in this system component may be destroyed.
  • In choice C and D both are wrong because it is not a software and side panel problem.-
6 0
3 years ago
Question 3
goldfiish [28.3K]

Answer: Zero is output.

8 0
3 years ago
To print the number of elements in the array named ar, you can write :
Diano4ka-milaya [45]

Answer:

Option c is correct.

Example :

public class Subject

{

public static void main(String [] args)

{

int ar[]={5,4,6,7,8};

System.out.println("the number of array elements are: ",ar.length);

}

}

Explanation:

The above program is created in java language in which Subject is a class name.Inside Subject class , there is main method.

Inside the main method, there is An array named 'ar' which data type is an integer and we have assigned the value to this array.

in the next line, we are printing the total no. of the element in the array with the length function which displays the length of an array or variable.

8 0
3 years ago
A device that filters data traffic at a network boundary​
Semmy [17]

Answer:

Bridges

Explanation:

A bridge is a transition effects that separates network traffic at the network's edge. By splitting a local area network into two parts, bridges minimise the number of bandwidth.

6 0
2 years ago
Other questions:
  • System uses a 6-bit 2’s complement signed integer representation. What is the range of decimal values it can represent?
    14·1 answer
  • What standard linux utility is used to install and configure software on centos operating systems?
    8·1 answer
  • Pls help! ive been looking everywhere online but I couldn't find the answer to this:
    5·1 answer
  • In a typical e-mail address, what is the "host"? A. an account designated by a user name. B. the computer that houses an Interne
    7·1 answer
  • What is one of the most effective security tools available for protecting users from external threats?
    15·1 answer
  • The material of this section assumes that search keys are unique. However, only small modifications are needed to allow the tech
    7·1 answer
  • _ models are non visual ways of communicating how someone thinks about something in the natural world
    12·1 answer
  • Kelly is a college sophomore majoring in computer science. She is interested in gaining exposure to the most useful and current
    14·1 answer
  • A social cause is: O A. when one person protests without the support of others. B. something that not many citizens think or car
    8·1 answer
  • Keyshia wants to add movement to her PowerPoint presentation. Which tab should she use to complete this task
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!