1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
drek231 [11]
3 years ago
13

A digital computer has a memory unit with 26 bits per word. The instruction set consists of 756 different operations. All instru

ctions have an operation code part (opcode) and an address part (allowing for only one address). Each instruction is stored in one word of memory. a. How many bits are needed for the opcode? b. How many bits are left for the address part of the instruction? c. What is the maximum allowable size for memory? d. What is the largest unsigned binary number that can be accommodated in one word of memory?
Computers and Technology
1 answer:
ycow [4]3 years ago
3 0

Answer:

a. the number of bits needed for the opcode = 10

b. address part is = 16 bits

c. maximum allowable size of memory = 65536

d. Maximum memory size per word = 67108864

Explanation:

The memory size of the instruction set is 756 which is less than 2^10 (that is 1024).

Since the word size is 26 bits and the instruction takes 10, the remaining 16 is for the address part which is 65536 memory address. The maximum number of memory size for a word is 67108864.

You might be interested in
What is one difference between a web page and a web application? Web pages provide information, while web applications allow the
Assoli18 [71]

Webpage is a page of a site, such as https://example.com/test, where the bolded text is the page.

On the other hand, web applications, or simply web apps, are found in many websites, such as here and also in Connexus. They end in either aspx or jsp, which stand for asp.net appx and javascript page, respectively.


So, your answer would be A: Web pages provide information, while web applications allow the user to do something.

Hope this was answer you were looking for. Have a nice day!

7 0
3 years ago
Is technology a legal discipline or law is a technological artifact.
ANEK [815]

Answer:Technology law scholars have recently started to consider the theories of affordance and technological mediation, imported from the fields of psychology, human-computer interaction (HCI), and science and technology studies (STS). These theories have been used both as a means of explaining how the law has developed, and more recently in attempts to cast the law per se as an affordance. This exploratory paper summarises the two theories, before considering these applications from a critical perspective, noting certain deficiencies with respect to potential normative application and definitional clarity, respectively. It then posits that in applying them in the legal context we should seek to retain the relational user-artefact structure around which they were originally conceived, with the law cast as the user of the artefact, from which it seeks certain features or outcomes. This approach is effective for three reasons. Firstly, it acknowledges the power imbalance between law and architecture, where the former is manifestly subject to the decisions, made by designers, which mediate and transform the substance of the legal norms they instantiate in technological artefacts. Secondly, from an analytical perspective, it can help avoid some of the conceptual and definitional problems evident in the nascent legal literature on affordance. Lastly, approaching designers on their own terms can foster better critical evaluation of their activities during the design process, potentially leading to more effective ‘compliance by design’ where the course of the law’s mediation by technological artefacts can be better anticipated and guided by legislators, regulators, and legal practitioners.

Keywords

Affordance, technological mediation, postphenomenology, legal theory, compliance by design, legal design

7 0
3 years ago
A ________ is a virus that is triggered on a certain date.
marysya [2.9K]
A time bomb virus is a virus that is triggered on a certain date. It is a malicious program that is designed to release virus unto a system. Once the time has arrived, it will automatically start working what it is programmed to do since any virus could do anything depending on what it is designed to do.
8 0
4 years ago
which type of encoding involves relating new information to existing knowledge that you already have stored in long-term memory?
rjkz [21]

A type of encoding that involves relating new information to existing knowledge that you already have stored in long-term memory is: Semantic encoding.

Encoding can be defined as a communication process in which the sender of a message transforms an information into an encrypted message, in the form of notable symbols that represent ideas or concepts.

Generally, a message that has been encoded by a sender requires a decoding action by the recipient, in order for the communication process to be complete.

Semantic encoding is a type of encoding which typically involves the relation of new information with respect to an existing knowledge that has been stored in long-term memory.

In conclusion, semantic encoding deals with the encoding of meaning from new information rather than perceptual characteristics such as the meaning of words in English language.

Read more: brainly.com/question/24113575

7 0
3 years ago
1. Our Systems are Microsoft Dynamics OLTP, we move data from the Source Systems through Staging to a Data Warehouse. Our report
zmey [24]

Answer:

1. More access to data

2.convenience

3. Easy creation of BI solutions

4. Report creation

5. Saves time

Explanation:

A data warehouse can be described to be an electronic storage system that contains large amount of facts and information which sources for and also maintains data from different sources; either external or internal.

The most important reason for a data warehouse is for it to store great amounts of data to be used for query and also to be used for analysis.

Why do we use a data warehouse?

1. Users have more access to data due to the integration of various sources of data. It makes use of real time data facts

2. You can conveniently store and also create metadata

3. Business intelligence solutions can easily be created using data warehouses.

4. Users can easily create their own reports

5. Data warehouses makes accessing different data sets faster. It is a time saver as business users are not going to spend time trying to retrieve data from various sources.

4 0
3 years ago
Other questions:
  • Web definition what means web
    9·1 answer
  • Utility software is also known as _____​
    11·1 answer
  • Which of the following are some of the ways that the media influences consumers behavior
    9·1 answer
  • Choose the correct term to complete the sentence.
    15·2 answers
  • 1. Describe data and process modeling concepts and tools.
    9·2 answers
  • Which of the following statements is true regarding a user account? Once a user account has been created, it cannot be completel
    8·1 answer
  • What is the difference between RELIABLE and UNRELIABLE sources of<br> income?
    7·2 answers
  • Which of the following is true about overloaded methods?
    6·1 answer
  • Explain drawing and painting package.​
    12·1 answer
  • Impromptu speaking ability is very important in the workplace to clearly and effectively communicate ideas. An effective impromp
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!