1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alchen [17]
3 years ago
8

If i had apple and microsoft both on my computer and they both fight what would i do

Computers and Technology
2 answers:
riadik2000 [5.3K]3 years ago
5 0

Answer:

ok

Explanation:

Dennis_Churaev [7]3 years ago
4 0
PEACE OUTTTTTTTTTTTTTTTTT
You might be interested in
What is an interactive site where users write about personal topics
ycow [4]
This is called a blog.
6 0
3 years ago
1. Defines and uses an interface block to connect to the test program and the DUT. The interface block should also contain a clo
Roman55 [17]

Answer:

It might helpful or might be the correct answer to provide the complete question or problem:

This is a testbench design problem, within it, you need to consider the module describing an accumulator.

Explanation:

Consider the following module describing an accumulator:

module  accumulator (

       output reg:  [ 15:0 ]   sum,     // acumulated out

       input [ 7:0 ] in,                      //in

       input rst / clk ) ;                   //reset and clock inputs

       wire  carry ;

       wire [ 15:0 ] sum_in ;

       assign  { carry , sum_in } =  sum + in ;

        alwaysatt ( posedge clock )

                 if ( rst ) sum ∠ = 0 ; else

                 sum ∠ = ( carry ) ?  16´hFFFF  :   sum_in ;

endmodule

From the design code, these are the specifications:

- An active high reset ( rst ) that is synchronous to the positive edge of the clock ( clk ) and clears the output ( sum ) to zero.

- Once reset is removed, the accumulator accumulates summation of the data present on the input ( in ) on every positive clock edge and if the summation exceeds the maximum value that can be represented using a 16-bit number (i.e. 16´hFFFF), the output gets saturated at 16´hFFFF

- The design treats the input data as an unsigned number and produces the output also as unsigned value.

Now write a complete system verilog for this desing that:

(See  1, 2, 3, 4, 5, 6, 7, 8 system requirements)

Defines and uses an interface block to connect to the test program and the DUT.

The interface block should also contain a clocking block and modport statements for defining signal direction to the testbench and to the DUT.

2. Generates the clock signal

3. Applies reset at the beginning

4. Checks the success of the reset operation and displays a success/fail message

5. Makes use of a class for defining random variables and a dynamic array to hold the random values.

6. Constraints the generated random values such that the number of generated random values (i.e. size of dynamic array) is less than 500 and their sum will be greater than 16'hFFFF

7. Applies the generated random values to the design input (in), one at every clock cycle

8. Checks the correctness of the design output (sum) at every clock cycle while applying inputs, and reports if there is a mismatch between the output of the design and the expected output.  

 

Explanation:

 

7 0
3 years ago
In Python please.
Lubov Fominskaja [6]

Answer:

Explanation:

We have the following

t is the number of test cases.

n is the number of trips for each testcase

name is the name of the city

all the unique names are added to the list and at last the length of the list is printed.

The program is written as follows

t = int(input) - for i in range(t): n = int(input) 1 = [] for j in range(n): name = input if name not in l: 1.append(name) pr

t = int(input())

for i in range(t):

n = int(input())

l = []

for j in range(n):

name = input()

if name not in l:

l.append(name)

 

print(len(l))

Output:

8 0
4 years ago
__________ implements a security policy that specifies who or what may have access to each specific system resource and the type
malfutka [58]

Answer: Access control

Explanation:

Access control implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.

A typical example of this is in ERPs where access controls defines what access codes a process owner has and what access a reviewer and an approval has. Where a personnel has access to carry out a transaction, review and approve the transaction, access controls are said to be deficient.

The right answer is Access control

Hope this helps!!

6 0
3 years ago
How many total bits would there be in the largest possible image we could make with the pixelation widget?.
3241004551 [841]
The largest dimensions we can make in an image with a pixelation which it is to 255×255. The largest image we can make with the pixelation widget would be 65,041 bits
3 0
2 years ago
Other questions:
  • If you receive an increase in pay, how will that affect your payroll deductions?
    8·1 answer
  • What is TCP/IP's Transport layer's primary duty?
    8·1 answer
  • Clarifying and developing our personal values involves a number of steps including critical thinking
    8·1 answer
  • What makes up an HTML element?
    12·2 answers
  • Compare and contrast an example of an actual company that has a brick and mortar location with an actual company that does not h
    8·1 answer
  • How to check if serial interface is dte ot DCE?
    13·1 answer
  • 71 81 77 15 63 96 36 51 77 18 17
    14·1 answer
  • What are placeholders in Java?
    8·1 answer
  • Read the problem listed below. Formulate a Decomposition or Outline of the problem. Determine if you have seen this problem befo
    15·1 answer
  • I hs no life hahahaha
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!