1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mars2501 [29]
3 years ago
13

Explain the three schemes via which the binding of instructions and data to memory addresses can be done. In each scheme, how th

e logical address can be converted to physical address?
Computers and Technology
1 answer:
pav-90 [236]3 years ago
6 0

Answer:

Compile time

Load time

Execution time

Explanation:

The binding of instructions can be done in three steps, which are:

Compile time

Load time

Execution time

• Compile time In compile time, absolute code is usually generated when the compile time where the process resides in the memory is known

• Load time - in contrary to compile time, if it is not known at compile time where the process will reside in memory, then the compiler has to generate a relocatable code. In this scenario, the final binding is usually delayed until load time.

• Execution time - if the process is able to be moved during its execution from a particular memory segment to another segment, then binding is delayed until run time.

You might be interested in
Write a Python function that join the two string and print it ​
liubo4ka [24]

Answer:

string1 = "this is string 1"

string2 = " this is string 2"

print(string1 + string2)

Explanation:

the string1 variable is assigned with a string value(aka. str)

string2 is also a variable assigned with a slightly different string value

the 3rd line then prints string 1 and 2 to the console.

5 0
2 years ago
Read 2 more answers
Can somebody hack ur account on Brainly bc I feel like I have bc I have answered waaaaaay more questions than shows on my profil
QveST [7]
It says you’ve only answered 11, but yeah it you’re account CAN be hacked
4 0
2 years ago
Universal Containers needs the ability to generate contract documents. All the data required for a contract resides in a custom
Fittoniya [83]

Answer: (D) Select and install an App Exchange product to meet the contract generation needs.

Explanation:

The App exchange is the type of salesforce market place in the cloud platform and it included various types of cloud application and the services. We can select and then install the app exchange different types of product and services to meets the given generation needs.

The app exchange service is mainly used in the universal container that mainly needs for generating the document in the system. The user can able to install and access this type of app salesforce easily.

Therefore, Option (D) is correct.

 

6 0
2 years ago
Why do some people argue that tech companies like Apple should do more to address the smartphone addiction problem?
Neko [114]

Answer:

Cause It Will Help Make A Fix For The Issue

Explanation:

Does This Help?

5 0
3 years ago
Select the correct answer.
galben [10]

Answer:

the RAM if i am not mistaking

8 0
3 years ago
Other questions:
  • Write a Java program to print the result in the series 10, 15, 20, 25, ..., 50. Hint: You can use an iteration statement for wri
    9·1 answer
  • Which device lets you hear audio on your computer?
    12·2 answers
  • Prominent is another word for stands out. True False
    13·1 answer
  • A restaurant has a case type that allows customer to book the dining room for events. Customers provide basic information includ
    7·1 answer
  • The most complex part of ssl is the ___________ protocol.
    7·2 answers
  • Can you use public domain images without violating copyright laws?
    5·1 answer
  • Which of the following statements about the break statement is false? Group of answer choices Common uses of the break statement
    12·1 answer
  • The browser on which you are viewing web pages is called the
    13·1 answer
  • When all the system testing and bugs correction has done, the software product will be delivered to the user for __________.
    15·1 answer
  • What can you do to make sure no one outside your company can gain access to its wireless network?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!