1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
docker41 [41]
3 years ago
15

How many total bits are required for a direct-mapped cache with 128 blocks and a block size of 8 bytes, assuming a 4GB main memo

ry?
Computers and Technology
1 answer:
Marysya12 [62]3 years ago
7 0

Answer:

32

Explanation:

Total bits will be 32 only as address is of 32 bits

(meaning to ask the size of the cache)

You might be interested in
I need help pls help me
Naily [24]
What is that ????????
3 0
3 years ago
Which four of the following qualify as fair use?
lora16 [44]

Answer:

1 using the quote and citing it

Explanation:

6 0
3 years ago
Read 2 more answers
In terms of technology, wich of the four devices is the most recent?
dangina [55]
Joystick (1972)

They consider the typewriter a keyboard…late 1800’s
Scanner (1957)
Camera (late 1800)
6 0
3 years ago
To copy noncontiguous slides, open Slide Sorter view, click the first slide thumbnail, press and hold ____, click each additiona
Naddik [55]

Answer:

CTRL

Explanation:

Based on the information provided within the question, it can be said that you have to press and hold the CTRL key on the keyboard before clicking each additional slide. This would allow you to maintain the first slide as "selected" while also including various other slides as "selected", in order for you to be able to copy all of the "selected" slides when the copy button is pressed.

7 0
3 years ago
What is zenmap typically used for? how is it related to nmap? describe a scenario in which you would use this type of applicatio
slava [35]

Zenmap is the graphical User Interface representation for NMAP Security Scanner. It is an open-source program designed to make NMAP easy for starters to use. Typically, it is used to collect and identify a list of hosts, OS, as well what services are running on them by using a port scanning tool. It is used specifically for the scanning and vulnerability phase of ethical hacking.

A network administrator who wishes to audit all the devices on a specific IP scheme in a network can use NMAP. The admin can go ahead and scan the ports to know exactly which ports are closed and which are opened.






8 0
3 years ago
Other questions:
  • By applying styles formats are being applied ?
    14·2 answers
  • Hot five was the famous band of which musician?
    14·1 answer
  • An organization uses SAP financial management software to store accounting details and Microsoft CRM software to record customer
    12·1 answer
  • Select the correct answer.
    6·1 answer
  • What is the different between ethical and legal issues?​
    6·1 answer
  • Write a program that will read two floating point numbers (the first read into a variable called first and the second read into
    13·1 answer
  • Explain logic circuit​
    8·1 answer
  • What is the difference between the byte and short data types in Java?
    7·1 answer
  • Does any of yall play rob lox?
    5·2 answers
  • What are the main differences between openldap and microsoft's active directory (ad)? check all that apply
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!