1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
harkovskaia [24]
3 years ago
6

Steps to run a Q-BASIC programme​

Computers and Technology
1 answer:
jarptica [38.1K]3 years ago
5 0

Answer:

Cls

Read

Input

Print

END

You might be interested in
What is TLB for? Why TLB? Given the following number, what is theeffective memory access time?
vodomira [7]

Answer:

A lookaside buffer translation (TLB) is a memory cache that reduces the time it takes to access a user memory place. TLB includes the most lately used page table entries.

TLB is used to overcome the issue of sizes at the time of paging. Page Table Entry (PTE) is used for framing the memory ,but it uses two references one for finding  the frame number and the other for the address specified by frame number.

<u>Formula for finding effective memory access time-</u>

Effective Memory Access Time = (TLB access_time+Memory Access Time)*hit ratio + (TLB access_time+2*Memory Access Time)*(miss ratio)

Given in question,

Hit ratio = 0.90

Memory Access Time = 150ns

TLB access time= 5ns

Effective Memory Access Time = (TLB access_time+Memory Access Time)*hit ratio + (TLB access_time+2*Memory Access Time)*(miss ratio)

                            =(5+150) * 0.90 + (5+2*150)*(1-0.90)

                             =155 * 0.90 + (305*0.1)

                             =139.5 + 30.5

                             = 170ns

8 0
3 years ago
Why does temperature decrease with higher altitude?
Lelu [443]
It's B.

As you go up, the air thins out, meaning it is less dense. Since there are less molecules that can transfer heat, the temperature is lower.
4 0
4 years ago
A 1000 elements array is used to store integers ascending order . The array is used to search binary search algorithm for the in
Yuri [45]

Answer:

The overview of the given scenario is described in the explanation section below.

Explanation:

  • BTS (Binary search tree) tends to be a tree with several nodes noting that perhaps the left sub-tree, along with its leaf, tends to have a key which is less than or equal to anything like the parental node value. The do-tree, including its leaf, seems to have a value greater than those of the key from it's own parent node.
  • Binary search algorithm finds a general vicinity in the collection of O(log n) time complexity items whereby n represents the number of elements in the array.

So the provided has never been the binary search trees of its algorithm.

A. 249

B. 342

5 0
3 years ago
1. Defines and uses an interface block to connect to the test program and the DUT. The interface block should also contain a clo
Roman55 [17]

Answer:

It might helpful or might be the correct answer to provide the complete question or problem:

This is a testbench design problem, within it, you need to consider the module describing an accumulator.

Explanation:

Consider the following module describing an accumulator:

module  accumulator (

       output reg:  [ 15:0 ]   sum,     // acumulated out

       input [ 7:0 ] in,                      //in

       input rst / clk ) ;                   //reset and clock inputs

       wire  carry ;

       wire [ 15:0 ] sum_in ;

       assign  { carry , sum_in } =  sum + in ;

        alwaysatt ( posedge clock )

                 if ( rst ) sum ∠ = 0 ; else

                 sum ∠ = ( carry ) ?  16´hFFFF  :   sum_in ;

endmodule

From the design code, these are the specifications:

- An active high reset ( rst ) that is synchronous to the positive edge of the clock ( clk ) and clears the output ( sum ) to zero.

- Once reset is removed, the accumulator accumulates summation of the data present on the input ( in ) on every positive clock edge and if the summation exceeds the maximum value that can be represented using a 16-bit number (i.e. 16´hFFFF), the output gets saturated at 16´hFFFF

- The design treats the input data as an unsigned number and produces the output also as unsigned value.

Now write a complete system verilog for this desing that:

(See  1, 2, 3, 4, 5, 6, 7, 8 system requirements)

Defines and uses an interface block to connect to the test program and the DUT.

The interface block should also contain a clocking block and modport statements for defining signal direction to the testbench and to the DUT.

2. Generates the clock signal

3. Applies reset at the beginning

4. Checks the success of the reset operation and displays a success/fail message

5. Makes use of a class for defining random variables and a dynamic array to hold the random values.

6. Constraints the generated random values such that the number of generated random values (i.e. size of dynamic array) is less than 500 and their sum will be greater than 16'hFFFF

7. Applies the generated random values to the design input (in), one at every clock cycle

8. Checks the correctness of the design output (sum) at every clock cycle while applying inputs, and reports if there is a mismatch between the output of the design and the expected output.  

 

Explanation:

 

7 0
3 years ago
An academic or professional blog would be especially useful in which of the following fields?
Vesna [10]
Blogs, even academic and professional, are not usually considered reliable sources. Most importantly, that's because they don't undergo the peer review process, which ensures the quality of the published papers (that they don't publish lies, in simple words).

So usually, you would prefer a published paper.

When then would you use a blog?
One such instance is when you want to find out about a quickly changing field , for example the newest standards in software development. So software engineering is one such field.

Another field is internet protection and security, as the viruses and the ways to defend against them also develop faster than can be published in a paper
7 0
3 years ago
Read 2 more answers
Other questions:
  • Write a program named TypingGrades that allows a user to enter a student’s number of words typed. The output is the letter grade
    9·1 answer
  • âwhat service uses a private cloud in conjunction with a web browser or downloaded client software to access desktop software?
    10·1 answer
  • Why is Brainly always deleting either my answers or my questions? I am putting nothing inappropriate in them. Can someone answer
    7·2 answers
  • __________ is a website that offers a variety of Internet services from a single, convenient location.
    13·1 answer
  • What is the function of the command prompt?
    8·1 answer
  • Ted is asked to create a page of family photos for his family reunion Web site. He will have about 20 pictures to post, with a c
    5·1 answer
  • Calculate the addition and multiplication of N integers numbers read from the keyboard
    6·1 answer
  • Ignorance of policy is a legal excuse for an employee. TRUE or FALSE
    11·1 answer
  • Which language is written using 0s and 1S​
    11·1 answer
  • How do cybercriminals use JavaScript maliciously?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!