1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
levacccp [35]
3 years ago
15

For each of the following memory accesses indicate if it will be a cache hit or miss when carried out in sequence as listed. Als

o, give the value of a read if it can be inferred from the information in the cache.
Operation Address Hit? Read value (or unknown)
Read 0x834
Write 0x 836
Read 0xFFD
Computers and Technology
1 answer:
nika2105 [10]3 years ago
6 0

Answer:

Explanation:

Operation Address Hit? Read Value

Read 0x834 No Unknown

Write 0x836 Yes (not applicable)

Read 0xFFD Yes CO

You might be interested in
Which of the following is the best example of a manager with a delegator leadership style
Vera_Pavlovna [14]
I think the answer should be answer D.
8 0
3 years ago
Read 2 more answers
How do most business applications and websites process credit card transactions?
klasskru [66]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

Most business applications and websites use and process the credit card for their transaction.

For example, e-commerce website such as ali baba, am a zon, accepting credit card transaction when the customer gets to purchase any product from their stores. Their transactions are processed by in house credit card apps/service. But these apps/services owned by a third party. They just give you API services and related code to integrate the credit card services.  

By using their in-house credit card apps/services, they know that user has transferred the money into their account for the purchased product, upon receiving payment confirmation, they then prepare and dispatch the order.

So, the correct answer to this question is:

To process the credit card transactions, they license third-party credit card apps/services backed by the internet merchant who is responsible for handling and managing the money of the business account.    

6 0
3 years ago
Considering the traffic problem, do you think Rod handled the situation well?
svet-max [94.6K]
No he did not that was a poor choice.
7 0
3 years ago
Question Workspace Check My Work Copying computer software, video games, movies, or music without paying the producer for them i
Tcecarenko [31]

Answer:

Option B, CUSTOMER MISBEHAVIOR.

Explanation:

Consumer misbehavior can defined as the behavioral acts by consumers which violate the generally accepted norms of conduct in consumption situations, and disrupt the order expected in such situations. Misbehavior by consumers disrupts the openness, impersonal trust, and orderliness of the exchange environment.

Some of the examples of customer misbehavior are: shoplifting, bending rules, breaking rules by ignoring warnings and using products in forbidden or ways not recommended...

* Routinized response behaviour is a type of purchasing scenario whereby the purchaser of a product or a service has past experience with purchasing it and automatically makes the decision to purchase again.

* Psychological influences refers to the workings of the mind or psyche that influences customer decisions.

* Social influences refers to the intentional and unintentional efforts to change another person's beliefs, attitudes, or behavior.

Therefore, the option that best suits the question is option B, CUSTOMER MISBEHAVIOR.

3 0
3 years ago
Question 4 1 pts The following code could be rewritten using: if (x > 12): if (x < 34):​
artcher [175]

Answer:

if(x>12 || x<34)

Explanation:

Mashing the two together using the or '||' operator would allow to run both necessary functions for the next code.

7 0
3 years ago
Other questions:
  • You just read an msds for acetic acid. based on what you read, what type of information is included in an msds sheet? record you
    7·1 answer
  • An ideal line length would include how many characters? A. 6570 B. 100 C. 100125 D. 4055
    8·1 answer
  • ____ the styles allows the designer to start from a known baseline, confident that no unwanted styles will creep in from any bro
    6·1 answer
  • What is technology? *
    10·1 answer
  • Which picture should i put as my profile picture.
    15·2 answers
  • What will be the range of the random numbers generated by the following code snippet? rand() % 50 + 5;
    14·1 answer
  • Como a contribuido el desarrollo tecnologico a mejorar la calidad debida de los seres humanos
    11·1 answer
  • What are the main dimensions of information system and their components
    13·1 answer
  • It specifies the amount of memory needed to store data.
    7·2 answers
  • How to make a Java GUI application? Discuss each step needed.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!