1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mademuasel [1]
3 years ago
7

During the course of execution of a program, the processor will increment the contents of the instruction register (program coun

ter) by one word after each instruction fetch, but will alter the contents of that register if it encounters a branch or call instruction that causes execution to continue elsewhere in the program. There are two alternatives with respect to instruction addresses:
a. Maintain a relative address in the instruction register and do the dynamic address translation using the instruction register as input. When a successful branch or call is encountered, the relative address generated by that branch or call is loaded into the instruction register .
b. Maintain an absolute address in the instruction register. When a successful branch or call is encountered, dynamic address translation is employed, with the results stored in the instruction register
Computers and Technology
1 answer:
Oksana_A [137]3 years ago
8 0
Bdbdbdhdhdhdhdjdbsbbrvrvrrvrvrvfvfvvfvfvfvfvfhdhdhdhdhdhdhhdududududududuebebbedvdvd I known why ahh it happened
You might be interested in
I GOT A 65% LAST TIME AND IM DOING RETAKE! PLEASE DONT FAIL ME THIS TIME
yawa3891 [41]

Answer:

Explanation: c vecause am pro

4 0
3 years ago
Read 2 more answers
To adjust the height of cells, position the pointer over one of the dividing lines between cells. When the pointer changes to th
Sergio [31]

Answer:

double arrow shape

Explanation:

To adjust the height of the cells

1. We have to position the mouse pointer over one of the column line or the one of the row line.

2. As we place the pointer between the dividing lines, the cursor of the mouse pointer change from singe bold arrow to double arrow symbol.

3.Now press or click the left mouse button and drag the dividing lines of the   cells to the desired position to have the required width or height of the cell.

5 0
4 years ago
Which of the following is an example of synchronous communication?
kirza4 [7]

The answer is D) on Oddessey Ware

4 0
3 years ago
True or false
ICE Princess25 [194]
1. True
2. Usually true, but it depends on the search engine you're using.  For example, Google lets you search for several words without commas.
3 0
3 years ago
A database administrator (DBA) must have a clear understanding of the fundamental business of an organization, be proficient in
Alexus [3.1K]

Answer: True

Explanation:

 Yes, the given statement is true that the DBA (Database administrator) utilize particular programming to store and arrange information.

The DBA is the proper understanding of the comprehension of the key business of an association, be capable in the utilization of chose database the executives frameworks, and remain side by side of developing advancements and new plan draws near.

The main purpose of the database administrator that it incorporate scope organization, establishment, setup, database plan, movement, execution checking, security, investigating, just as reinforcement and information recovery.

8 0
4 years ago
Other questions:
  • Which practice represents the trait of effective communication?
    6·2 answers
  • How does this app work?
    11·2 answers
  • What is the difference between ReactJS and AngularJS
    10·2 answers
  • What is the full form of ICT?​
    14·2 answers
  • One side in a Transmission Control Protocol (TCP) connection has not been able to properly recover from a series of malformed se
    6·1 answer
  • Why do some people have random numbers as their usernames?
    9·2 answers
  • A computer projecter is an example of a(n):<br> Input Device<br> Output Device<br> Storage Device
    12·2 answers
  • Which of the following is true of lossy and lossless compression techniques?
    13·1 answer
  • It is recommended that systems administrators analyze logs in order to determine if they have been altered because monitoring ca
    14·1 answer
  • What is a security strategy comprised of products and services that offer remote support for mobile devices, such as smart phone
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!