1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
FinnZ [79.3K]
3 years ago
6

Suppose that a 2M x 16 main memory is built using 256kB x 8 RAM chips and memory is word addressable, how many RAM chips are nec

essary?
Computers and Technology
1 answer:
hoa [83]3 years ago
5 0

Answer:

16 RAM chips

Explanation:

To calculate the number of RAM chips needed, we divide the total size of the main memory by the size of each RAM chip. Hence:

Number of RAM chips required = Main memory size / size of one RAM

2M = 2²¹, 16 = 2⁴, 256K = 2¹⁸, 8 = 2³

Hence:

Number of RAM chips required = (2²¹ * 2⁴) / (2¹⁸ * 2³) = 2⁴ = 16

Therefore 16 RAM chips are necessary

You might be interested in
How do I type over Images (photo posted ​
Ber [7]
Oh a document, I do not believe that you have type on images, but if you were to type a text in a app called PicsArt and saved it and then put it onto the document over the picture it would work.
3 0
3 years ago
Read 2 more answers
When someone asks, Is this information specific enough?, he or she is interested in more _____.
AVprozaik [17]

Answer:

precision

Explanation:

In simple English precise means exact or something specific

5 0
3 years ago
Read 2 more answers
In addition to compiling the list of user access requirements, applications, and systems, the BIA also includes processes that a
laila [671]

Answer:

automated

Explanation:

Basically a Business Impact Analysis (BIA) estimates and determines the effects of a business activity and process disturbances. These disruptions can be natural or electronic disasters. It also collects information which is used to establish recovery plan. It identifies the business vulnerabilities and works on the strategies in order to reduce such potential hazards. The BIA involves both manual and automated processes. BIA involves automated processes which include the automated software tools that enables the protection of the confidential information of the users and also generates automated reports about the critical business processes.

5 0
4 years ago
What are the risks associated with this kind of connectivity?.
Eva8 [605]

Answer:

The risks associated with this kind of connectivity are that online hackers may see your information and that makes the human race too dependent on robots and technology which is never a good thing.

Explanation:

<h3>be happy</h3>
8 0
3 years ago
You receive a phone call from a co-worker telling you that "the network is down." Just as you are about to look into the issue,
Dvinal [7]

This issue will happen mostly if cellular network will not be down, or suppose if cellular network is down mostly, or it will be rainy or a current cutoff issue might be occurred.

<u>Explanation:</u>

The following step to be made for trouble shoot his phone when cellular network is down.

1. Restart the mobile:- After restarting kindly check mobile connectivity.

2. Check for mobile air plane mobile and make sure the mobile phone is not in air plane mode.

3. Check the income and outgoing vapidity.

4. Switch off the mobile, Remove service provider sim card from mobile and reinsert the sim card and start the mobile.

5. Still connectivity problem, either contact the service provider or replace with new sim card.

5 0
3 years ago
Other questions:
  • Which area of the network would a college it staff most likely have to redesign as a direct result of many students bringing the
    10·1 answer
  • What is a constructor? Why would you include a constructor in a class?
    6·1 answer
  • If johnny has 800 socks and john has 1000 more how much does john have
    9·1 answer
  • Which line in the following program contains the header for the showDub function? 1 #include«iostream» 2 using namespace std; 4
    15·1 answer
  • Which type of security software prevents, detects, and removes the malware program that tries to collect personal information or
    8·2 answers
  • DECIPHER AND SOLVE THIS<br><br> SCC:R<br> D<br> YJOTE VP=GPIMFRT
    15·1 answer
  • Hich of these statements is a value statement?
    14·2 answers
  • Compile and Execute a Program
    13·1 answer
  • Write a function endpoints that takes a list of numbers (eg. [5, 10, 15, 20, 25]) and returns a new list of only the first and l
    15·1 answer
  • What is the most common knowledge computer programmers need in order
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!