Answer:
Total Memory= 4 KB = 4096 bytes = 32768 bits
Explanation:
<em><u>1. Data lines are 8 From D0 to D7</u></em>
so
Total memory at single address locations is 8 bits.
<em><u>2. Address lines are 12 (A0 to A11)</u></em>
There are 12 address lines but 3 out 12 are for selction of chip or memory bank.
so only 9 pins are there to address the locations on one chip.
Total No. of address locations on single chip = 2^9 = 512 locations
as 1 location is 1 byte so total memory of single chip is 512 bytes.
<u><em>3. Total Memory Bank </em></u>
There are total 3 selection pins for memory bank.
so
Total chips = 2^3 = 8.
<em><u>4. Total Memory </u></em>
Total size of 1 chip = 512 bytes
Total size of 8 chip = 8x512 bytes = 4096 bytes = 4096/1024 kb = 4 kb
<em>So total memory of system is 4 Kb = 4096 bytes = 32768 bits</em>
Answer:
OLTP(Online transaction processing) is the correct answer.
Explanation:
It is the database application that is used to catching the transection and that data or information which is related to the technology for the purpose of.
- Process that data and information which is related to the following rules of the business or company.
- It stores the data or information related to the online transaction.
- It also helps to modify the current data or information for the new data or information.
Nintendo Entertainment System
The awnser is task 6 because 6 plus 8 is 20 and that equals for 6 gallons to go the the teen choice awards
Cybersecurity breaches in the workplace generally happen because:
- People deliberately try to hack into the network people.
- People make unintentional mistakes.
- People do not know about cybersecurity protocols
<h3>What are the three main causes of security breaches?</h3>
The major reasons for data breaches are:
- Old, Unpatched Security Vulnerabilities.
- Human Error
- Malware, etc.
Therefore, Cybersecurity breaches in the workplace generally happen because:
- People deliberately try to hack into the network people.
- People make unintentional mistakes.
- People do not know about cybersecurity protocols
Learn more about Cybersecurity from
brainly.com/question/12010892
#SPJ1