1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Semenov [28]
3 years ago
6

What is the datapath of add instruction?

Computers and Technology
1 answer:
alina1380 [7]3 years ago
6 0

i dont have enough information to awnser this

You might be interested in
In what year was the earliest documented use of the word computer?.
topjm [15]

Answer:

1946

First, to deal with the more recent and most familiar meaning of the word ‘computer’: the word first came to mean an electronic device used to store and communicate information (and all of its subsequent functions) only in the 1940s: the earliest citation in the Oxford English Dictionary is from 1946. This is fitting.

Explanation:

7 0
2 years ago
Determine the best access modifier for each of the following situations: a. A class Employee records the name, address, salary,
Lorico [155]

Answer:

a. Protected

b. Public

Explanation:

There are four acess modifier in Java.

Default: Acessible only within the same package.

Public: Can be acessed by any class.

Private: Acessible only within the class.

For example, you have a class employee and a private method. This method can only be accessed by an object that is an instance of an employee.

Protected: Used in classes that extend each other. For example, a class of employees would extend employee.

So:

a. A class Employee records the name, address, salary, and phone number.

The best acesses modifier is protected. A class may extended employee but have the same arguments(name, adress, salary, phone number), so it should also have acess to the method.

b. An adding method inside of a class BasicMath.

This method can be used in a variety of packages and projects and classes... and there is no important information regarding security. So the best method is public.

4 0
3 years ago
How do i choose a most brainlyist
GuDViN [60]

Answer:

They’ll have to be 2 answers first, when 2 answers are given, you can choose which is branlyis. If there are no 2 answers, you can’t choose.

8 0
3 years ago
Read 2 more answers
Does anyone know how to snip or like screenshot the screen?
Rashid [163]

Answer:

yes it is on pc shift command 3

Explanation:

thats how i do it

8 0
3 years ago
A raised dot (ú) shows where the ENTER key was pressed. <br> a. True<br> b. False
MatroZZZ [7]
Its false nothing comes up when u press that key
5 0
3 years ago
Other questions:
  • In the U.S. highway numbering system, north-south routes have
    9·2 answers
  • A result of the Gibbons v. Ogden (1824) decision was that states​
    11·1 answer
  • The function below takes one parameter: a string (date_string) containing a date in the mm/dd/year format. Complete the function
    11·1 answer
  • Exactly how thin is the air in outer space?
    10·1 answer
  • The statement ____ declares intList to be a vector and the component type to be int
    8·1 answer
  • When preparing a document flowchart, the names of organizational departments or job functions should appear in theA) column head
    6·1 answer
  • The roll out, roll in variant of swapping is used ____."
    8·1 answer
  • Please help!! thank you so much!! &lt;3
    14·2 answers
  • Consider the language defined by the following regular expression. (x*y | zy*)* Does zyyxz belong to the language? Yes, because
    11·1 answer
  • Help me
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!