1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mekhanik [1.2K]
3 years ago
7

The memory capacity in bits for performing the operation y = f (x) using the table lookup method, where x is an 8-bit number and

y is a 16-bit number, is equal to:
a) 4096
b) 2048
c) 128
d) 8
e) 16
Computers and Technology
1 answer:
Flura [38]3 years ago
5 0

Answer:

The page field is 8-bit wide, then the page size is 256 bytes.

Using the subdivision above, the first level page table points to 1024 2nd  level page tables, each pointing to 256 3rd page tables, each containing 64 pages. The program's address space consists of 1024 pages, thus we need we need 16 third-level page tables. Therefore we need 16 entries in a 2nd level page table, and one entry in the first level page table. Therefore the size is: 1024 entries for the first table, 256 entries for the 2nd level page table, and 16 3rd level page table containing 64 entries each. Assuming 2 bytes per entry, the space required is 1024 * 2 + 256 * 2 (one second-level paget table) + 16 * 64 * 2 (16 third-level page tables) = 4608 bytes.

First, the stack, data and code segments are at addresses that require having 3 page tables entries active in the first level page table. For 64K, you need 256 pages, or 4 third-level page tables. For 600K, you need 2400 pages, or 38 third-level page tables and for 48K you need 192 pages or 3 third-level page tables. Assuming 2 bytes per entry, the space required is 1024 * 2 + 256 * 3 * 2 (3 second-level page tables) + 64 * (38+4+3)* 2 (38 third-level page tables for data segment, 4 for stack and 3 for code segment) = 9344 bytes.

Explanation:

16 E the answer

You might be interested in
Define the following term. data, database, DBMS, database system, data- base catalog, program-data independence, user wen', DBA,
wolverine [178]

Answer:

data - Any form of value in a column of a table in a relational database.

DBMS - Short for Database management system, which is a software that can be used to create, manipulate and view databases, e.g. MS SQL Server.

database system - Same as DBMS.

database catalog - Place where the metadata of a Database, its tables, users etc. exists e.g. date created, size, number of columns etc. Also known as Data Dictionary.

program-data independence - Program-data independence refers to the capability of leaving data intact and accessible regardless of modifications to the database that contains the data.

DBA - Short for Database Administrator, person responsible for maintaining the database. Its main responsibility is to keep the data clean and safe i.e. data doesn't contain wrong or invalid data, and is safe from viruses and is backed up.

end user - Anyone who is not directly interacting with a database, but through some software like website and mobile application.

persisten object - An object of a class in a program, that interacts with the underlying database and is responsible for manipulating the database connected to.

transaction-processing system - A transaction process system is part of a software, responsible for making sure critical business transactions, like crediting or debiting money, either goes through cleanly or doesn't at all.

CRUD are the four main types of operations one can do in a database environment. It stands for creating, reading, deleting and updating.

Explanation:

4 0
3 years ago
Carrie works on a help desk and is assigned a ticket that was automatically generated by a server because of an error. The error
OverLord2011 [107]

I would honestly say that there are a few available tools that Carrie can use, but the best tool is the inbuilt Windows Powershell. As Powershell continues to extend its purpose and usefulness, Microsoft, on the other hand, continues to use Powershell's capability to develop more cmdlets for products like Windows Servers. Everything that can be done in a GUI environment can be done in Powershell. Carrie should be able to use Powershell to run things more efficiently from the command line without stepping a foot on the physical server. She will only need to access the server from her desk remotely, run a few commands, and that is it. Powershell command line is so powerful; it carries with it every troubleshooting pack that you can think about.

5 0
3 years ago
1. Select two forms of case designed suitable for ATX power supply and
jekas [21]
The answer should be c
4 0
3 years ago
if you upgrade your memory but notice the RAM count does not reflect the additional memory, what should you do ?
alisha [4.7K]

Try looking at your motherboard manual to see which dimm slots should be used first since putting memory in any slot could break the dual channel. Not giving your motherboard access to that ram. Or you probably used wrong memory since your memory has to be the exact same size and speed and type. Because 8gb ddr3 will not work with 8gb ddr4. 8gb ddr4 2400 MHz will also not work with 8gb ddr4 3200 MHz. And 8gb 3200 Mhz would not work with 16Gb 3200 mhz. Your ram should have the exact same specs.

3 0
3 years ago
Brainstorming the pros and cons of upgrading versus replacing a set of ten desktop computers _________
fomenos
Plan to purchase
Deploy
Support/ upgrade
Retire
Support/ upgrade
Deploy
6 0
3 years ago
Other questions:
  • 8.17 Lab: Strings of a Frequency Write a program that reads whitespace delimited strings (words) and an integer (freq). Then, th
    15·1 answer
  • The article begins with the author mentioning the need to find something from “three years ago”. How long do you see yourself sa
    7·1 answer
  • When configuring a vpn server to automatically assign ​ip addresses to remote clients, how many ip addresses are in a single poo
    10·1 answer
  • What is labor and how does it relate to automobile!!!! NEED HELP PLEASEE
    13·1 answer
  • Write a function listLengthOfAllWords which takes in an array of words (strings), and returns an array of numbers representing t
    14·1 answer
  • Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer syste
    7·1 answer
  • How does segmenting your network increase network security?
    8·1 answer
  • What is the purpose of creating a primary key in a database
    14·1 answer
  • I will give Brainliest to whoever answers correctly :3
    14·1 answer
  • What is the task included in the information systems manager?​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!