1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mekhanik [1.2K]
3 years ago
7

The memory capacity in bits for performing the operation y = f (x) using the table lookup method, where x is an 8-bit number and

y is a 16-bit number, is equal to:
a) 4096
b) 2048
c) 128
d) 8
e) 16
Computers and Technology
1 answer:
Flura [38]3 years ago
5 0

Answer:

The page field is 8-bit wide, then the page size is 256 bytes.

Using the subdivision above, the first level page table points to 1024 2nd  level page tables, each pointing to 256 3rd page tables, each containing 64 pages. The program's address space consists of 1024 pages, thus we need we need 16 third-level page tables. Therefore we need 16 entries in a 2nd level page table, and one entry in the first level page table. Therefore the size is: 1024 entries for the first table, 256 entries for the 2nd level page table, and 16 3rd level page table containing 64 entries each. Assuming 2 bytes per entry, the space required is 1024 * 2 + 256 * 2 (one second-level paget table) + 16 * 64 * 2 (16 third-level page tables) = 4608 bytes.

First, the stack, data and code segments are at addresses that require having 3 page tables entries active in the first level page table. For 64K, you need 256 pages, or 4 third-level page tables. For 600K, you need 2400 pages, or 38 third-level page tables and for 48K you need 192 pages or 3 third-level page tables. Assuming 2 bytes per entry, the space required is 1024 * 2 + 256 * 3 * 2 (3 second-level page tables) + 64 * (38+4+3)* 2 (38 third-level page tables for data segment, 4 for stack and 3 for code segment) = 9344 bytes.

Explanation:

16 E the answer

You might be interested in
While conducting a vulnerability assessment, you're given a set of documents representing the network's intended security config
Sophie [7]

Answer:

The baseline review

Explanation:

Solution:

The baseline review: this can be defined as the gap analysis or the beginning environmental review (IER). it is an assess study to get information about an organisation's present activities and associated environmental impacts,  impacts and legal requirements.

This review issues an overview of the quality and weaknesses of an organisation’s environmental execution and opportunities for improvement.

6 0
3 years ago
The use of space bar​
Anna11 [10]
The question is unclear or unfinished please send again the question
5 0
2 years ago
Random-access memory (RAM) is able to quickly access data because it is arranged in which of the following configurations?
lianna [129]

Answer:

A two-dimensional grid consisting of rows and columns of memory cells

Explanation:

Radom access memory is made of bits of data or program code that are tactically arranged in a two-dimensional grid. DRAM will store bits of data in what's called a storage, or memory cell, consisting of a capacitor and a transistor. The storage cells are typically organized in a rectangular configuration.

7 0
3 years ago
Below, we’ve provided a for loop that sums all the elements of list1. Write code that accomplishes the same task, but instead us
Tanzania [10]

Answer:

Explanation:

The code that would best accomplish this task using a while loop would be the following:

list1 = [8, 3, 4, 5, 6, 7, 9]

accum = 0

n = 0

while n < 7:

        accum += list1[n]

        n += 1

This code will continue throughout the list1 array and add every value to the accum variable.

5 0
3 years ago
​the unified modeling language (uml) represents an object as a _____ with the object name at the top, followed by the object's a
Ghella [55]

An object in UML is drawn as a rectangle, typically creating two columns. The top column will contain the name and bottom column will contain attributes of the object.

6 0
4 years ago
Other questions:
  • My 2 in 1 laptop/tablet
    13·1 answer
  • On what basis can you categorize the generations of computers
    7·1 answer
  • User-system interaction is?
    11·1 answer
  • What additional features on your router would you implement if you were setting up a small wired and wireless network
    5·1 answer
  • How have productivity programs improved the professional lives of people? (check all that apply)
    8·2 answers
  • You are given a 6x8 (6 rows, 8 columns) array of integers, x, already initialized and three integer variables: max, i and j. Wri
    6·1 answer
  • I need le help, darn ijourneys
    10·2 answers
  • When both inputs of a J-K edge-triggered FF are high and the clock cycles, the output will ________.
    11·1 answer
  • The Monte Carlo method is commonly used to approximate areas or volumes of shapes. In this problem, we will use Monte Carlo to f
    12·1 answer
  • A group of two or more computer systems linked together via communication devices is called:.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!