1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lady_Fox [76]
3 years ago
12

HELPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP!!!

Computers and Technology
1 answer:
Bingel [31]3 years ago
3 0

Answer:

different or difference between Dot-matrix and Daisy-wheel printer

You might be interested in
Sometimes we write similar letters to different people. For example, you might write to your parents to tell them about your cla
OleMash [197]

?

?????????????????????

4 0
3 years ago
If there are 8 opcodes and 10 registers, a. What is the minimum number of bits required to represent the OPCODE? b. What is the
Nimfa-mama [501]

Answer:  

For 32 bits Instruction Format:

OPCODE   DR               SR1                   SR2      Unused bits

a) Minimum number of bits required to represent the OPCODE = 3 bits

There are 8 opcodes. Patterns required for these opcodes must be unique. For this purpose, take log base 2 of 8 and then ceil the result.

Ceil (log2 (8)) = 3

b) Minimum number of bits For Destination Register(DR) = 4 bits

There are 10 registers. For unique register values take log base 2 of 10 and then ceil the value.  4 bits are required for each register. Hence, DR, SR1 and SR2 all require 12 bits in all.  

Ceil (log2 (10)) = 4

c) Maximum number of UNUSED bits in Instruction encoding = 17 bits

Total number of bits used = bits used for registers + bits used for OPCODE  

     = 12 + 3 = 15  

Total  number of bits for instruction format = 32  

Maximum  No. of Unused bits = 32 – 15 = 17 bits  

OPCODE                DR              SR1             SR2              Unused bits

  3 bits              4 bits          4 bits           4 bits                17 bits

7 0
3 years ago
When disabling inherited permissions on an object, what happens if you select Remove all inherited permissions from this object?
Rasek [7]

Answer:

Answer explained below

Explanation:

When disabling inherited permissions on an object, if you select Remove all inherited permissions from this object then you lose every user or group assigned to the folder.

This will delete all existing permissions, including administrator accounts, leaving you a blank slate to apply your own permissions to the folder.

5 0
2 years ago
What are the main advantages of the d-step tuning of 2023 murano’s xtronic cvt®?.
DedPeter [7]

The main advantages of the d-step tuning of 2023 Murano's xtronic cvt is that:

  • It gives room for the transmission to quickly change ratios in regards to quick acceleration.
  • When at higher rpm, it help one to stepped acceleration via the use of linear acceleration feel.

<h3>What kind of transmission does a Nissan Murano have?</h3>

It is known to have a continuously variable automatic transmission (CVT) and it is one whose only engine is said to give about a 3.5-liter V-6 that helps to bring about a lot of power.

Note that the main advantages of the d-step tuning of 2023 Murano's xtronic cvt is that:

  • It gives room for the transmission to quickly change ratios in regards to quick acceleration.
  • When at higher rpm, it help one to stepped acceleration via the use of linear acceleration feel.

Learn more about cars from

brainly.com/question/25749514

#SPJ1

6 0
2 years ago
Summarize the five stages of cultural shock
Anton [14]
1. Honeymoon stage
2. Distress and anxiety
3. Adjustment
4. Adaption
5. Re-entry shock
8 0
3 years ago
Read 2 more answers
Other questions:
  • A company decides to create static design diagrams for an upcoming project. Which statement correctly describes the attribute of
    6·1 answer
  • This type of connection uses radio waves to connect devices on a network.
    9·2 answers
  • An administrator needs to set up an authentication server for users connecting to a network through a VPN. What kind of server c
    10·1 answer
  • Write a class called (d) Teacher that has just a main method. The main method should construct a GradeBook for a class with two
    7·1 answer
  • A _____ is a harmful program that resides in the active memory of a computer and duplicates itself. Select one: a. scareware b.
    7·1 answer
  • Which of the following is an example of an output device
    13·1 answer
  • Why do software managers have to be generalists with a range of skills, rather than simply technical specialists?
    14·1 answer
  • Edhesive 3.4 practice 1
    9·1 answer
  • Which of these would be the fastest transition duration?
    6·2 answers
  • What are 3 of the most important things about internet safety that you would recommend and why
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!