1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dmitriy555 [2]
4 years ago
6

Although the chi-square distribution is continuous, it is used to analyze discrete (counts) data

Computers and Technology
1 answer:
Roman55 [17]4 years ago
4 0
This is true! The chi-square distribution is continuous and it is used to analyze discrete (counts) data.
You might be interested in
What are the applications of computer in the field of study​
Reptile [31]

Answer: it is what it is

Explanation:

5 0
3 years ago
Read 2 more answers
which statement describe “Hackers”? | A. all have the same motive | B. break into other people’s computers | C. may legally brea
AysviL [449]

Answer:

A

Explanation:

There's levels to it. As someone who use to play watchdogs anything is considered hacking.

5 0
3 years ago
What file holds the preferences and settings of the currently signed-in user??
VashaNatasha [74]
The answer to the question above is ntuser.dat. This is actually a registry file that contains the registry information of the user or account. According to Windows, this is known to be as the <span>"central hierarchical database" as this contains relevant information of the user such as profiles, and both of its hardware and software.</span>
3 0
3 years ago
What happens when you double-click a column border??
IrinaVladis [17]
<span>The column width is adjusted to fit the text.</span>
7 0
3 years ago
The address of the last cell of a memory RAM is 3FFFFh.a total capacity of the main memory and 4M bits and the data bus can tran
marysya [2.9K]

Hey there!:

Given the address of the last cell of a memory RAM is 3FFFFh then   :

There are 8 bits in a byte  

1024 bytes in a kilobyte  

 so 8*1024= 8192  

 so 8192 bits in a kb  

 32*8192 = 262144  

there are 262144 bits in 32KB .

a) 32 bit address registers must match 2^32 byte = 4 GB of physical memory.

However, with 32 Bit you can also address more than 4 GB, like Physical Address Extension (PAE) does.

The other way is that you can access 4 GB with less than 32 bit address register.

____________________________________________________

b) Main Memory = 4M × 32Kbits, RAM chips = 32K × 4bit.

For this memory we require 4 × 2 = 8 RAM chips.

Each chip requires 18 address bits (ie. 218 = 256K).

And 1M × 8 bits requires 20 address bits (ie. 220 = 1M )

_____________________________________________________

c) The size of the storage cells is known as the word size for the computer.

In some computers, the word size is one byte while in other computers the word size is two, four, or even eight bytes. In our 4M main memory the size of cell is 4*2^20 bytes.

Each storage cell in main memory has a particular address which the computer can use for storing or retrieving data.  

______________________________________________________

d) The size of MBR is the 4M bits of main memory.

_____________________________________________________

Hope this helps!

6 0
3 years ago
Other questions:
  • How could a system be designed to allow a choice of operating systems from which to boot? What would the bootstrap program need
    14·1 answer
  • Which of these practices should you follow while creating your résumé?
    14·1 answer
  • Susan's monthly goal to open five new customer
    10·1 answer
  • Suppose we want to adjust the page numbering for our Works Cited section so that it starts over at page 1. Is this possible to d
    12·2 answers
  • Narrate an incident from the experience of a 14 year old girl which brings out the message: " Never leave till tomorrow what you
    10·1 answer
  • Members of the sales team use laptops to connect to the company network. While traveling, they connect their laptops to the inte
    15·1 answer
  • Any task done by software can also be done using computer hardware, and any operation performed directly by hardware can be done
    8·1 answer
  • What is the best response to cyberbullying?
    10·2 answers
  • A diminished triad can be indicated by
    5·1 answer
  • What are the two protocols used most often with iot devices? (select two. )
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!