1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Harman [31]
4 years ago
9

The _____________ RTN describes the overall effectof instructions on the programmer visible registers

Computers and Technology
1 answer:
mart [117]4 years ago
6 0

Answer: Concrete

Explanation: Concrete RTN(register transfer notation) is a RTN that uses a certain set of registers and buses that are real for the completion of abstract RTN verdicts effect.They deal with the abstract RTN also for the registers transfer .They give the idea of the transferring of registers on the programmer's side and then defines the effect of it.

You might be interested in
Which symbol shows an input?
LenaWriter [7]

Answer:

Document symbol

Explanation:

This symbol is shaped like a rectangle with its bottom side in a wave, and it is used to represent the input or output of a document. For instance, this symbol might be used to outline a document input, such as receiving an email or report.

hope it helps

mark me brainliest pls

8 0
3 years ago
The belief that the odds of two events occurring together are greater than the odds of either event occurring alone is the _____
iris [78.8K]
The answer is D.) conjunction fallacy
3 0
3 years ago
Read 2 more answers
A trust domain is defined as Select one: a. The agreed upon, trusted third party b. A scenario where one user needs to validate
soldier1979 [14.2K]

Answer:

A construct of systems, personnel, applications, protocols, technologies, and policies that work together to provide a certain level of protection

Explanation:

Creation of dynamic Trust Domains can be realized through collaborative, secure sharing solutions. The local system is able to trust a domain to authenticate users. If an application or a user is authenticated by a trusted domain, all domains accept the authenticating domain. For instance, if a system trust domain X, it will also trust all domains that domain X trusts. It is a two-way trust relationship and is transitive.

7 0
3 years ago
Read 2 more answers
How many bytes are in 1 kilobyte of storage
topjm [15]

Answer:

1000

Explanation I SEARCHED IT Up

5 0
4 years ago
“is available for...”. PLS HELP ASAP I DONT HAVE TIME
frutty [35]

Answer:

icloud for the first one

7 0
3 years ago
Other questions:
  • What does the hard disk drive do?
    9·2 answers
  • X=10 ;
    14·1 answer
  • A(n) ___________________ process is initiated by individuals who are subjected to forensic techniques with the intention of hidi
    6·1 answer
  • Brad is joining a big website design firm. He is worried that he may not be able to adapt to the company culture. What can he do
    15·1 answer
  • A network resource is masquerading as a network server and is causing hosts on the network to send requests to the attacker rath
    11·1 answer
  • A (an) block can arise from set ways of thinking.
    15·1 answer
  • A field is _____. a complete entry in a database one of the categories in a database a group of twenty-seven records a cell in a
    8·1 answer
  • A letter of application should be written on:
    13·1 answer
  • Ok I'm sorry to all those who are trying to messasge me on brainly my brainly inbox is not working and hasn't work since the beg
    12·2 answers
  • The force of impact is
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!