1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mr_godi [17]
3 years ago
7

Below is a sequence of 32-bit memory address references observed during the execution of an application, and given as word addre

sses.
3, 180, 43, 2, 191, 88, 190, 14, 181, 44, 186, 253

For each of these references, identify the binary address, the tag, and the index given a direct mapped cache with 16 one-word blocks. Also list if each reference is a hit or a miss, assuming the cache is initially empty

Computers and Technology
1 answer:
Naily [24]3 years ago
5 0

Answer:

a. 1 word

b. 2 words

Explanation:

We say that a computer has a 32-bit memory address when it allows 32-bit memory addresses. This entails that a byte-addressable 32-bit computer can address 232 = 4,294,967,296 bytes of memory, or 4 gibibytes (GiB). This allows one memory address to be efficiently stored in one word.

See attachment for the analysis on a table.

You might be interested in
Which of these is a Microsoft certification CCIE PMP PRINCE2 MCSE
Angelina_Jolie [31]

MCSE is a Microsoft Certified Solutions Expert.

6 0
4 years ago
Identify tags and attributes in HTML 5
Vaselesa [24]

Answer:

Tags can be identified as they are written as <tagname> Something </tagname>

<tagname> this tag is called start tag.

</tagname> this tag is called as end tag.

for ex:<p> This is a paragraph </p>

There are some elements with no end tag.for ex:- <br> tag.

Attributes are used to provide additional information to an HTML element.

Every element can have attributes.

for Ex:- <h1 style="background-color:red";>MY WEBSITE </h1>

So the background of h1 will become red.

7 0
3 years ago
Which is true about POP3 and IMAP for incoming email?
IceJOKER [234]
<h2>Answer:</h2>

Option A: Both POP3 and IMAP  keep email on an email server by default.

is the correct answer.

<h2>Explanation:</h2>

Following points will make the idea of POP3 and IMAP clear:

<h3>POP3:</h3>
  • POP3  is the acronym for Post Office Protocol 3.
  • POP3 is the method of receiving emails in which the emails received on the app can be downloaded on to the computer by having an internet connection.
  • These downloaded emails can be viewed offline whenever needed and managed as well.
  • POP3 makes it possible that the storage space of the default server do not run short as the downloaded emails are deleted from the server.
<h3>IMAP:</h3>
  • IMAP stands for Internet Message Access Protocol.
  • It is the method in which the mails are viewed and managed directly on the internet server instead of downloading them on the computer.
  • IMAP makes sure to manage the mails so carefully and timely so that unimportant mails are deleted to make sure that the storage space does not run short.
<h3>Conclusion:</h3>

So from these points we can make sure that both ways keep emails on email server but POP3 have option to download mails from server while IMAP dont have.

<h2>I hope it will help you!</h2>
8 0
3 years ago
Determine the best access modifier for each of the following situations: a. A class Employee records the name, address, salary,
Lorico [155]

Answer:

a. Protected

b. Public

Explanation:

There are four acess modifier in Java.

Default: Acessible only within the same package.

Public: Can be acessed by any class.

Private: Acessible only within the class.

For example, you have a class employee and a private method. This method can only be accessed by an object that is an instance of an employee.

Protected: Used in classes that extend each other. For example, a class of employees would extend employee.

So:

a. A class Employee records the name, address, salary, and phone number.

The best acesses modifier is protected. A class may extended employee but have the same arguments(name, adress, salary, phone number), so it should also have acess to the method.

b. An adding method inside of a class BasicMath.

This method can be used in a variety of packages and projects and classes... and there is no important information regarding security. So the best method is public.

4 0
3 years ago
Which type of database program is Microsoft Access 2016?
nadya68 [22]

Answer:

O relational

Explanation:

If I'm wrong I'm so so sorry! But form my research it keeps saying its relational.

If I'm right please give me brainliest I really need it to level up so please help me!

If you don't know how to give brainliest there should be a crown underneath my answer you just have to click it.

Thank you and have a wonderful night,morning,afternoon/day! :D

6 0
3 years ago
Read 2 more answers
Other questions:
  • "a terminal has two input queues." as a user types each character to the terminal, it is collected in the ____ queue.
    5·1 answer
  • The _____ icon looks like a clipboard with a page of paper attached. Cut Copy Paste Clipboard
    5·1 answer
  • How would you describe enterprise computing
    12·1 answer
  • . _______ are the components that allow a posi-traction differential to transfer power from one drive wheel to another.
    10·1 answer
  • Please help me with this question. I don’t get it
    11·2 answers
  • A(n) _____ access file is also known as a direct access file.
    13·1 answer
  • Implement RandMultipByVal function, which gets one integervariable as its argument
    12·1 answer
  • Which of the following is the Boolean logical operator for OR in C#?
    12·2 answers
  • Which of the following statements is true?A)Implicit data type conversion is performed when you mix values of different data typ
    5·1 answer
  • A debate about city schools are more better than village schools​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!