A digital computer has a memory unit with 26 bits per word. The instruction set consists of 756 different operations. All instructions have an operation code part (opcode) and an address part (allowing for only one address). Each instruction is stored in one word of memory. a. How many bits are needed for the opcode? b. How many bits are left for the address part of the instruction? c. What is the maximum allowable size for memory? d. What is the largest unsigned binary number that can be accommodated in one word of memory?

Answers

Answer 1

Answer:

a. the number of bits needed for the opcode = 10

b. address part is = 16 bits

c. maximum allowable size of memory = 65536

d. Maximum memory size per word = 67108864

Explanation:

The memory size of the instruction set is 756 which is less than 2^10 (that is 1024).

Since the word size is 26 bits and the instruction takes 10, the remaining 16 is for the address part which is 65536 memory address. The maximum number of memory size for a word is 67108864.


Related Questions

Write a program in QBASIC to display the first 10 numbers of the fibonacci series:
0,1,1,2,3,5,... up to 10 terms.

(Hint- Take the first two numbers 0 and 1. Now obtain the next number by adding them. For example:0+1=1)

Answers

Answer:

#include<iostream>

using namespace std;

int main()

{

int a=0,b=1;

int i,c;

cout<<a<<" "<<b<<" ";

for(i=3;i<=10;i++)

{

 c=a+b;

 cout<<c<<" ";

 a=b;

 b=c;

}

return 0;

}

Explanation:

Is a MODEM required for Internet Connectivity ?
Yes
No

Answers

Answer:

you can connect to the wifi on your device it will say you are connected but the wifi will not be connected to the internet so you will be able to do nothing on it without the modem

Explanation:

Answer:

NEED modem between the cable and your computer. No modem, no Internet.

The Answer is NO

Question # 4
Multiple Choice
Which of the following led to the development of the computer?


Enigma machine

morse code

sonar

telephone

Answers

Answer:

Explanatio Morse code


Which device contains or manages shared resources in a network?
O the router
O the client
the switch
o the server

Answers

Answer:

The server

Explanation:

The router makes the network and the client access the files on the networks. This files are hosted on the server

The server contains or manages shared resources in a network. The correct option is D.

What is a server?

A computer program or apparatus that offers a service to another computer program and its user, also known as the client, is referred to as a server.

The actual computer that a server program runs on in a data centre is also frequently referred to as a server.

Data is sent, received, and stored by a server. It basically "serves" another purpose and is there to offer services.

One or more services may be offered via a server, which can be a computer, software application, or even a storage device. In a network, the server holds or oversees shared resources.

Thus, the correct option is D.

For more details regarding server, visit:

https://brainly.com/question/30168195

#SPJ6

4.8 code practice question 2

Answers

Answer:

Written in Python

for count in range(88, 42,-2):

    print(count,end=' ')

Explanation:

The programming language is not stated.

However, I used python to answer the question.

First, we need to loop from 88 to 44 with a difference of -2 in each term.

This is implemented as

for count in range(88, 42,-2):

Which means to start at 88 and ends at 42 - (-2) which is 44 with an increment of -2

Next, is to print the current iterating value;

This is implemented using print(count)

However, since all values are to be printed on a line, there's a need t modify the statement as: print(count,end=' ')

what are storage devices??
name them​

Answers

Answer:

those devices which store data and information are called storage device.

some of them are : hard drive ,compact disc,

floppy disc

I am coding a turtle race in python I have to Use a single call to forward for each turtle, using a random number as the distance to move

Answers

import turtle,random

s = turtle.getscreen()

t1 = turtle.Turtle()

t2 = turtle.Turtle()

t3 = turtle.Turtle()

t2.penup()

t2.goto(1,100)

t3.penup()

t3.goto(1,200)

while True:

   t1.forward(random.randint(1,10))

   t2.forward(random.randint(1,10))

   t3.forward(random.randint(1,10))

   if t1.xcor() >= 180:

       print("Turtle 1 won the race!")

       quit()

   elif t2.xcor()>= 180:

       print("Turtle 2 won the race!")

       quit()

   elif t3.xcor() >= 180:

       print("Turtle 3 won the race")

       quit()

I hope this helps!

Answer:

if you mean to set a speed. Im not sure. however, move turtle.forward(random number) i can do

import turtle

import random

random_int = random.randint(20, 1000)

win = turtle.Screen()

turtle_1 = turtle.Turtle()

turtle_1.forward(random_int)

win.mainloop()

Did anyone else remember that Unus Annus is gone? I started crying when I remembered.... Momento Mori my friends.... Momento Mori...

Answers

Answer:

???

Explanation:

Did I miss something?

Answer:

Yes I remember its gone.  

Explanation:  I was there when the final seconds struck zero.  The screen went black, and the people screaming for their final goodbyes seemed to look like acceptance at first.  I will never forget them, and hopefully they will remember about the time capsule.  Momento Mori, Unus Annus.  

what tells the hardware what to do and how to do it?
Software
Hard drive (Hdd)
hardware
Cpu

Answers

Answer:

I think its CPU

Explanation:

Using the drop-down menu, identify the common IDE components.
A
tests a program one step at a time to find and fix errors.
А
translates the program from high-level programming language into machine
language so it is ready to run whenever it is called.
The
v is the main programming tool used to create, modify, and save code.
The
tool helps programmers write directions for repetitive tasks as they construct a
program
An
v translates each line of code from high-level programming language to machine
language and executes it when it is called to run.

Answers

Answer:

test a program one step at to find and fix errors

Answer:

debuger

compiler

source code editor

build automation

interpreter

Explanation:

The profile picture that you plan to use to market your professional brand on social media networks should feature you only.

True

False

Answers

Answer:

false

Explanation:

A secure website has https instead of http in web address true or false

Answers

Answer:

True

Explanation:

https has SSL which http doesn't. SSL encrypts your information so your connections are secured. Therefore websites with https are more secure.

What music form states a musical theme and then changes it in the next sections?

Answers

Answer:

musical varations

Explanation:

where it goes from one sound to another

What is unique about a dual-axis chart

Answers

Answer:

B: Data is charted by two different types of data.

Explanation:

Got it correction edge.

Answer: B: Data is charted by two different types of data

Explanation:

i just answered it on edge

(JAVA PLS)

Your job in this assignment is to write a program that takes a message as a string and reduces the number of characters it uses in two different set ways. The first thing your program will do is ask the user to type a message which will be stored as a String. The String entered should be immediately converted to lowercase as this will make processing much easier. You will then apply two different algorithms to shorten the data contained within the String.

Algorithm 1

This algorithm creates a string from the message in which every vowel (a, e, i, o, and u) is removed unless the vowel is at the very start of a word (i.e., it is preceded by a space or is the first letter of the message). Every repeated non-vowel character is also removed from the new string (i.e., if a character appears several times in a row it should only appear once at that location). So for example the string "I will arrive in Mississippi really soon" becomes "i wl arv in mssp rly sn".

After applying this algorithm, your program should output the shortened message, the number of vowels removed, the number of repeated non-vowel characters removed, and how much shorter the shortened message is than the original message. The exact format in which the program should print this information is shown in the sample runs.

Algorithm 2

This algorithm creates a string by taking each unique character in the message in the order they first appear and putting that letter and the number of times it appears in the original message into the shortened string. Your algorithm should ignore any spaces in the message, and any characters which it has already put into the shortened string. For example, the string "I will arrive in Mississippi really soon" becomes "8i1w4l2a3r1v2e2n1m5s2p1y2o".

After applying this algorithm, your program should output the shortened message, the number of different characters appearing, and how much shorter the shortened message is than the original message. The exact format in which the program should print this information is shown in the sample runs.

Sample Run 1
Type the message to be shortened
This message could be a little shorter

Algorithm 1
Vowels removed: 11
Repeats removed: 2
Algorithm 1 message: ths msg cld b a ltl shrtr
Algorithm 1 characters saved: 13

Algorithm 2
Unique characters found: 15
Algorithm 2 message: 4t2h2i4s1m5e2a1g1c2o1u3l1d1b2r
Algorithm 2 characters saved: 8
Sample Run 2
Type the message to be shortened
I will arrive in Mississippi really soon

Algorithm 1
Vowels removed: 11
Repeats removed: 6
Algorithm 1 message: i wl arv in mssp rly sn
Algorithm 1 characters saved: 17

Algorithm 2
Unique characters found: 13
Algorithm 2 message: 8i1w4l2a3r1v2e2n1m5s2p1y2o
Algorithm 2 characters saved: 14

Answers

import java.util.Scanner;

public class JavaApplication54 {

   public static int appearance(String word, char letter){

       int count = 0;

       for (int i = 0; i < word.length(); i++){

           if (word.charAt(i) == letter){

               count++;

           }

       }

       return count;

   }

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       System.out.println("Type the message to be shortened");

       String message = scan.nextLine();

       message = message.toLowerCase();

       int volCount = 0, repCount = 0, num = 0;

       char prevC = ' ';

       String vowels = "aeiou";

       String newMessage = "";

       for (int i = 0; i < message.length(); i++){

           char c = message.charAt(i);

           

           if (vowels.indexOf(c) != -1 && prevC == ' '){

               newMessage += c;

           }

           else if (vowels.indexOf(c) == -1 && prevC != c){

               newMessage += c;

           }

           else if (vowels.indexOf(c) != -1){

               volCount ++;

           }

           else{

               repCount++;

           }

            prevC = c;

       }

       System.out.println("Algorithm 1");

       System.out.println("Vowels removed: "+volCount);

       System.out.println("Repeats removed: "+repCount);

       System.out.println("Algorithm 1 message: "+newMessage);

       System.out.println("Algorithm 1 characters saved: "+(message.length() - newMessage.length()));

       

       String uniqueMessage = "";

       

       for (int i = 0; i<message.length(); i++){

           char w = message.charAt(i);

           if (uniqueMessage.indexOf(w)== -1 && w!=' '){

               uniqueMessage += appearance(message,w)+""+w;

               num++;

           }

       }

       System.out.println("Algorithm 2");

       System.out.println("Unique characters found: "+num);

       System.out.println("Algorithm 2 message: "+uniqueMessage);

       System.out.println("Algorithm 2 characters saved: "+(message.length() - uniqueMessage.length()));

   }

   

}

I hope this helps!

explain logic circuit​

Answers

Computers often chain logic gates together, by taking the output from one gate and using it as the input to another gate. We call that a logic circuit. Circuits enables computers to do more complex operations than they could accomplish with just a single gate. The smallest circuit is a chain of 2 logic gates.

Logic circuits include such devices as multiplexers, registers, arithmetic logic units (ALUs), and computer memory, all the way up through complete microprocessors, which may contain more than 100 million gates. In modern practice, most gates are made from MOSFETs (metal–oxide–semiconductor field-effect transistors).

What program has unique drag and drop support functions?

Answers

Answer:

theres actually alot

Explanation:

apple has a drop file function where you drag and drop

ill name a few

dropbox, apple, windows, linux etc.

Choose all that apply.

Which statement below describes the use of lists in presentation programs?

Bullets can be turned off and on.
Lists don't have to use numbers or bullets.
Use bulleted lists but not numbered lists.
Use numbered and bulleted lists.
Use numbered lists but not bulleted lists.

Answers

Answer:

Bullets can be turned off and on.

Lists don't have to use numbers or bullets.

Explanation:

because L just wanted the light

The statement that describes the use of lists in presentation programs is that bullets can be turned off and on, and use numbered and bulleted lists. The correct options are A and D.

What are bullets?

A bullet point is a symbol used in writing to introduce a list item. A centered dot (•) is a common symbol for a bullet point, but many other symbols and characters can be used in bullet point lists. Bulleted lists may also include numbers and/or letters.

Each paragraph in a bulleted list begins with a bullet character. Each paragraph in a numbered list begins with an expression that includes a number or letter as well as a separator such as a period or parenthesis.

When you add or remove paragraphs from a numbered list, the numbers in the list are automatically updated.

Bullets can be turned off and on, and numbered and bulleted lists can be used.

Thus, the correct options are A and D.

For more details regarding presentations, visit:

https://brainly.com/question/14498361

#SPJ2

How do I keep my computer and data safe and secure while using the Internet?

Answers

Answer:

Don’t answer anything unless it’s someone who you know.

Explanation:

Some things that I use is a VPN...

Also make sure not to overshare information on social media...

Oh and don't use the same password for everything (I'm guilty of this one lol)

8.7 Code Practice Question 3
Use the following initializer list:
w = [“Algorithm”, “Logic”, “Filter”, “Software”, “Network”, “Parameters”, “Analyze”, “Algorithm”, “Functionality”, “Viruses”]

Create a second array named s. Then, using a loop, store the lengths of each word in the array above. In a separate for loop, print on separate lines the length of the word followed by the word

Answers

I included my code in the picture below.

The for loop that can be used to loop through the array s and get the length and the word is a follows:

s = ["Algorithm", "Logic", "Filter", "Software", "Network", "Parameters", "Analyze", "Algorithm", "Functionality", "Viruses"]

for i in s:

   print(len(i), ":", i)

The variable s is used to store the array of strings

The for loop is used to loop through the array .

The length of each string and the string is printed out.  

When the code is run, you will get exactly like the sample Run.  

learn more: https://brainly.com/question/23800781?referrer=searchResults

JAVA

Take two String inputs of the same length and merge these by taking one character from each String (starting with the first entered) and alternating. If the Strings are not the same length, the program should print "error".

Sample Run 1:

Enter Strings:
balloon
atrophy
baatlrloopohny
Sample Run 2:

Enter Strings:
terrible
mistake
error

Answers

import java.util.Scanner;

public class JavaApplication53 {

   

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       System.out.println("Enter Strings:");

       String txt1 = scan.nextLine();

       String txt2 = scan.nextLine();

       String newTxt = "";

       if (txt1.length() != txt2.length()){

           System.out.println("error");

       }

       else{

           for (int i = 0; i<txt1.length(); i++){

               newTxt += txt1.charAt(i)+""+txt2.charAt(i);

           }

       }

       System.out.println(newTxt);

   }

   

}

I hope this helps!

Why did my answer button disappear?

Answers

Answer:

Because 2 people are already answering it.

Explanation:

A scatter plot can be used with both numerical and non numerical values. True or False?

Answers

Answer:

true

Explanation:

Write an IF…ELSE program that computes the new salary for Ann, the Chief Information Officer of ABC Company. Ann’s current salary is $92,000 a year, and she has worked at ABC for four years. Please note the following: one-year employees get a 2 percent raise two-year employees get a 3 percent raise three-year employees get a 4 percent raise four-year employees get a 5 percent raise five-year employees get a 6 percent raise What is Ann’s new salary?


I’ll make you the brainless if you can help me plz

Answers

In python 3.8:

salary = 92000

years = 4

if years == 1:

   salary += (salary*0.02)

elif years == 2:

   salary += (salary * 0.03)

elif years == 3:

   salary += (salary *0.04)

elif years == 4:

   salary += (salary*0.05)

elif years >= 5:

   salary += (salary*0.06)

print(salary)

If we run this code, Ann's new salary will be 96600.

What is Hypertext Transfer Protocol?
A.
the language used to build web pages
B.
a set of rules that allows for exchange of information on the web
C.
the language used by computers to exchange information on the web
D.
a set of rules that defines what search engines can do

Answers

Answer:

B, rules which allows the exchange of information on the web

Explanation:

The HTTP is a protocol which is used to fetch information from a server/webpage, and is usually initiated by a user. This is not to be confused with HTML (Hypertext Markup Language), which is used to program webpages.

If you were going to construct a table that only included shapes name with number prefixes, which shape would you inlcude?
Asap

Answers

Answer: Triangle

Explanation: Triangle has Tri

PLS HURRY!!! Look at the image below!
The choices for the second part are number +1, number, number -1

Answers

1. <1

2. -1

Explanation:

A patient calls the insurance company's call center
to be directed to the on-call nurse. The patient
provides his Social Security number, date of birth,
and policy number to the call center employee so
his call can be transferred appropriately. The
employee makes sure not to say the patient's
Social Security number out loud

Answers

Answer:

Respect confidentiality of data

Explanation:

The employee makes sure not to say the patient's Social Security number out loud to Respecting the confidentiality of the data.

What is insurance?

Insurance is a strategy used to safeguard a person from impending financial losses and other projected losses. Additionally, you can get health, property, or auto insurance. A person typically purchases health insurance in order to protect their health or wellbeing. When a person needs medical attention, health care offers financial assistance.

As the person's data that has been taken from the person is treated as confidential and if leaked may affect the life of that person. In order to protect patient privacy, the staff is careful to keep the participant's Social Security information to themselves and their family.

Learn more about insurance, here:

https://brainly.com/question/1400638

#SPJ2

Can someone tell me what to do?

Answers

Answer:

are you coding ?

Explanation:

How can goal setting help with academic performance?
a) it helps you focus on what needs to be done.
b) it is an effective study skill.
c) writing goals down makes them happen
d) they help you understand content better

Answers

Im pretty sure the answer is b.
Other Questions
Sally is currently in a city that is 100 ft below sea level. She then drives to a new city 50 ft above sea level. What integer represents the total distance sally drove what is the best way to honor veterans on veterans day What si the equation in slope intercept form of the line that passes through the points (-4,2) and (12,6) On a coordinate plane, segment A B goes from (1, 1) to (4, 3) and segment A prime B prime goes from (1, negative 1) to (4, negative 3).Determine the line of reflection that maps the pre-image segment AB to the image segment AB.A: x=0B: y=0C: y=xD: It cannot be determined. Answer the following question in 3-4 complete sentences.A realistic painting of a woman wearing a blue dress with a white collar and a white and blue wide-brimmed hat.Name the artist who painted this painting. What medium did the artist choose for this painting? What advantages and disadvantages might the artist have considered before using this medium? Two children are removed from their parents home because of abuse. An unmarried, single friend of the family, who does not have her own children, decides to raise the children as her own. Which family type describes this new relationship? nuclear family family of choice same-sex parent family cross-generational family PLEASE HELP! 80 POINTSWhat were characteristics of Federalists in North Carolina? Check all that apply.They generally lived along the North Carolina coast.They mostly lived in the backcountry.They were former Patriots who wanted to retain their property. They were concerned that the Constitution could lead to tyranny. They believed that a stronger national government had many economic benefits. A fish tank contains 600 gallons of water when full. The tankcontains a permanent hole, which causes the tank to leak at aconstant rate of 12 gallons each week. Let w be the number ofweeks. Which of the following expressions describe the number ofgallons left in the tank after any given number of weeks.a. 600 + 12wb. 600 - 12wc. 12 -600wd. 12 + 600w Commonlit - Which statement best describes how Benedict Arnold's involvement in the American Revolutionary War is first introduced in the text? Which of these was not an eventual result of the Age of Exploration? The length of a rectangle was measured to be (6 + 0.01) cm and its width was measuredto be (4 0.01) cm, then the percentage of error in measuring the perimeter ofthe rectangle is(a) 0.2%(b) 0.4 %(c) 0.1 %(d) 2 % Women had expanded roles in the American West during the mid-1800s, andsome worked outside the home. Which job would a pioneer woman mostlikely have held?A. DoctorB. LawyerC. TeacherD. Miner Which of the following values of x make the following functions equal? y =4x+6 and y=5x+3 3241 I need this fast, please.True or False?Using a condom is a guaranteed way to prevent genital herpes. Pushing a door closed is an example of force. true or false There are 12 boys and 16 girls in a classroom. Which represents the simplified ratio of girls to students in theclassroom? What is the solution to the equation -4(2x + 3) = 2x + 6 - (8x + 2)?A. x = -10B. x = -8C. x = - 5/2D. x = -4/7 Place the Levels of organization in hierachical order from smallest to largest1. Cells2. Tissues3. Organs4. Atoms5. Molecules6. Organisms7 Organelles 1. In Model 1 a pathogen (virus, bacteria, foreign protein, parasite) has entered the bloodstream ofan individual. Describe the symbol that represents the pathogen.And if possible answer #3, I will mark brainiest Which statement about the cell membrane is true?It contains cellulose and sugars that are involved in communication.It is present in animal cells only.It is rigid and elastic for supporting the cells shape.It prevents harmful substances from entering a cell.