1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mashcka [7]
3 years ago
15

Suppose the size of process is 10000 bytes and the relocation register is loaded with value 5000 which of the following memory a

ddress this process can access
Computers and Technology
1 answer:
natulia [17]3 years ago
3 0

Answer:

The page field is 8-bit wide, then the page size is 256 bytes.

Using the subdivision above, the first level page table points to 1024 2nd level page tables, each pointing to 256 3rd page tables, each containing 64 pages. The program's address space consists of 1024 pages, thus we need we need 16 third-level page tables. Therefore we need 16 entries in a 2nd level page table, and one entry in the first level page table. Therefore the size is: 1024 entries for the first table, 256 entries for the 2nd level page table, and 16 3rd level page table containing 64 entries each. Assuming 2 bytes per entry, the space required is 1024 * 2 + 256 * 2 (one second-level paget table) + 16 * 64 * 2 (16 third-level page tables) = 4608 bytes.

You might be interested in
How do you think computers have helped to improve documentation, support and services within the healthcare industry.
AfilCa [17]
Before the use of technology such as computers, information was documented through papers separated in folders. This was a very long and complicated process as people would have to find information by hand, sorting through countless documents. Now, it is much easier and neater to keep information. It can be as easy as digitally searching for someone's name and the computer will sort through countless documents, finding the one you need almost instantly. It is also much less wasteful and safe, as before computers, the use of paper was the only way to permanently keep information, also making documents vulnerable to being lost or stolen.
4 0
3 years ago
Colby has a presentation with steps demonstrating how to make his famous cheesecake. He would like to post this on his new websi
lesantik [10]
I think a video to post to your website would be very good 
3 0
4 years ago
How do I change the keyboard light colors on Alienware 17 R5?
aleksandrvk [35]

Answer:

5 Launch the Alienware Control Center Press FN + F4 Launches the Alienware Control Center and opens the Theme Manager tab. Keyboard- backlight adjustment Press FN + F5 Press FN + F6 FN + F5 decreases the keyboard-backlight intensity. FN + F6 increases the keyboard-backlight intensity.

Explanation:

Nice Durango

3 0
3 years ago
Employers hiring for entry-level positions in Hospitality and Tourism expect workers to learn the required skills after they sta
vovikov84 [41]
<h2>have basic skills required to do the job</h2>

Explanation:

expect workers to learn the required skills after they start:  

The must have basic skills then only they can employ to upgrade further skill

have the required skills before they start:  

We cannot expect all the skills. Skill will develop through experience too.

acquire the necessary skills through education: only if they have necessary education for performing the job, then only the company will short-list. So, this is an entry criterion.

have basic skills required to do the job: This is the right answer. This aspect is enough for an entry-level position.

8 0
3 years ago
Read 2 more answers
Differences between placeholders and textbook in PowerPoint ​
Igoryamba

Answer:

fifthly, if it is an empty box. it disappear completely. sixth the size of a text box changes depending on the length of a text that we type . this is in contrast with a place holder box where changes are made of the font of the text

Explanation:

mark me a brainlist

4 0
3 years ago
Other questions:
  • A step commonly used for Internet vulnerability assessment includes __________, which occurs when the penetration test engine is
    9·1 answer
  • Windows explorer has a pane located on the left side which can display the directory structure of one or more drives. what is th
    15·1 answer
  • State and derive the law of conservation of energy​?
    8·2 answers
  • Name a device, app or website then give features of the app that make it addictive and humane. (3 details for each)
    5·1 answer
  • During which part of geologic time did photosynthesis evolve?
    15·2 answers
  • The conversion of decimal 0.0625 into its binary equivalent. Explain.
    7·1 answer
  • What features do plain text editors support?
    12·1 answer
  • What is the function of the NOS? Select all that apply.
    5·2 answers
  • The EDI ____________layer describes the business application that i
    9·1 answer
  • Write at least and explain four types of escape sequences and create an example in an IDE which consist of the mentioned escape
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!