1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melisa1 [442]
3 years ago
12

1 Explain the process of how the memory works with theprocessor​

Computers and Technology
2 answers:
butalik [34]3 years ago
5 0

Answer:

As every processor works on same stages i.e. fetch , decode , execute.

Most of the computers executes ONE instruction at a time. But speed is very fast .

So let's move to memory

The fastest memory is cache (registers)

Then RAM , then hard disk.

Before an instruction can be executed, program instructions and data must be placed into memory from an input device or a secondary storage device .

Then

1)The control unit fetches (gets) the instruction from memory.

2)The control unit decodes the instruction (decides what it means) and directs that the necessary data be moved from memory to the arithmetic/logic unit. These first two steps together are called instruction time, or I-time.

3)The arithmetic/logic unit executes the arithmetic or logical instruction. That is, the ALU is given control and performs the actual operation on the data.

4)Thc arithmetic/logic unit stores the result of this operation in memory or in a register. Steps 3 and 4 together are called execution time, or E-time.

Explanation:

NISA [10]3 years ago
3 0
As every processor works on same stages i.e. fetch , decode , execute. The fastest memory is cache (registers)

Then RAM , then hard disk.

Before an instruction can be executed, program instructions and data must be placed into memory from an input device or a secondary storage device .
You might be interested in
An online retailer is looking to implement an enterprise platform. Which component of the enterprise platform will help the comp
adelina 88 [10]

Answer: Data and Insights

Explanation:

Data and Insights in an enterprise platform is very important as it helps users better understand their customers so that they may be able to offer them the best services.

Data allows the platform to capture the data of the customer and insights then curates and consumes the data for analysis. The result of this analysis will enable the company to better understand the customer so that they might be able to offer preferable products.

3 0
3 years ago
20 points
Keith_Richards [23]
If the four colors are well -balanced then nothing could be best scheme other than the "Square" as it is it's characteristic

In short, Your Answer would be Option C

Hope this helps!
7 0
3 years ago
Your corporation hosts a Web site at the static public IP address 92.110.30.123.
ivann1987 [24]

Answer:

Check the explanation

Explanation:

In line with the question, we can now derive that:

The router's outside interface IP address will be 92.110.30.65.

The router's inside interface IP address will be 192.168.11.254.

The Web site's IP public IP address will be 92.110.30.123.

The private IP address of the backup Web server will be 192.168.11.110.

and when we say IP address, it stands for Internet Protocol, it is a set of usual predefined rules which are utilized to administrate the manner to which data packets are sent over the internet. An IP address, which is typically just identified as an IP, is a sequence of figures used to uniquely recognize a computer/device on a particular network or on the internet space.

7 0
3 years ago
How can security professionals use software to recover stolen laptops ?
inna [77]

<u>Answer is:</u>

E). They monitor email traffic.

<u>Explanation:</u>


Track Your Device's IP Address with mail. If your laptop or smartphone was stolen, you can use a service like mail to find the IP address of your thief. When you log into those services from any computer, it logs the IP address used, and displays your last used IP in your account. So, these are source for finding the stolen laptop and smartphones.

I hope you got the idea. Thanks

3 0
3 years ago
When one method calls another, which of the following statements are true? The class methods and instance methods of one class m
Ivenika [448]

Answer:

All the 3 statements are true.

Explanation:

1. The class methods and instance methods of one class may call the public class methods of another class using dot notation and referencing the name of the other class.

2. The class methods and instance methods of one class may call the private instance methods of another class by using dot notation to invoke the method on an instance of the other class.

3. The instance methods of a class may call, without using dot notation, any class method of the same class.

All the above mentioned statements are true.

6 0
4 years ago
Other questions:
  • What did I do wrong? May you please correct it for me...I was also looking on how to delay when it prints. Like when it prints a
    9·1 answer
  • A benefit of flashcards is that they are
    7·2 answers
  • Why Embedded operating systems are also known as real-time operating systems (RTOS)?
    15·1 answer
  • What is the trickiest time of the day to drive? A. Early morning B. Late night C. After the sun sets
    8·2 answers
  • Does -8 = -21?<br>[this is NOT a trick question]<br>Yes....?<br>No!​
    12·2 answers
  • Discuss two business information systems that are used in two different sectors in a modern economy.
    11·1 answer
  • What is true about the dilation?
    6·2 answers
  • Select all correct statements below: Group of answer choices A redundant link's switch port will be blocked by STP until needed.
    6·1 answer
  • A web application with an SQL server database is found to be compromised by an attacker. On examination, the email IDs of the da
    5·1 answer
  • 1) What is Database? List its Uses.<br>​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!