2^519. given 16-bit instructions, is it possible to use expanding opcodes to allow the following to be encoded assuming we have a total of 32 registers? if so, show the encoding. if not, explain why it is not possible. 20 points 60 instructions with 2 register operands 30 instructions with 1 register operand 3 instructions with one 10-bit address

Answers

Answer 1

Due to the limited number of bits in 16-bit instructions, it is not possible to directly encode the value of \(2^{519}\). However, by using expanding opcodes and multiple instructions, we can calculate and combine intermediate results to obtain the desired value.

In computing, the opcode is the part of a machine language instruction that specifies the operation to be performed and the operands (if any) on which to operate. The opcode is generally placed at the beginning of the instruction, with the remainder of the instruction being used to specify the operands.

Opcode encodings are used to minimize the number of bits used to encode an instruction, allowing more instructions to be encoded in a given amount of memory.

Now let's see if we can use expanding opcodes to encode \(2^{519}\) using 16-bit instructions, given 60 instructions with 2 register operands, 30 instructions with 1 register operand, and 3 instructions with one 10-bit address. \(2^{519}\) is a very large number that cannot be represented in 16 bits; in fact, it requires 173 bits to represent.

As a result, we cannot encode \(2^{519}\) using a single 16-bit instruction. To represent 2^519 using expanding opcodes, we can use multiple instructions to calculate the result.

For example, we can calculate \(2^{10}, 2^{20}, 2^{40}, 2^{80}, 2^{160}\), and \(2^{519}\) separately, then combine the results to get the final result. We can use the following instructions to calculate the required powers of 2:60 instructions with 2 register operands, we can use a register to store the intermediate results.

30 instructions with 1 register operand, we can use a register to store the intermediate results. 3 instructions with one 10-bit address, we can use an address to store the intermediate results.

Learn more about 16-bit instructions: brainly.com/question/29508311

#SPJ11


Related Questions

The following code should take a number as input, multiply it by 8, and print the result. In line 2 of the code below, the * symbol represents multiplication. Fix the errors so that the code works correctly: input ("Enter a number: ") print (num * 8) The code above is pre-populated in your code editor. Hint: Remember that to think about the data type that the user will input. How can you make sure that their input is entered as a number?

Answers

Let's check sample input and output

\(\tt num=int(input("Enter\:a\:number:"))\)

\(\tt print(num*8)\)

Sample run

\(\tt Enter\:a\: number:6\)

\(\tt 48\)

A. Capture Device B. Post Production C. Transition D. Compression and Codec E. Non Linear editing F. Editing G. Layering H.Encoding I. Linear




_______The process of rearranging, adding and/or removing sections of video clips.

_______ 2. Also known as tape to tape editing

_______ 3. Software or firmware use to compress and decompress digital video.

_______ 4. An editing method that use computer software to edit the footage.

_______ 5. A hardware or firmware device used to convert analogue video into digital video.

_______ 6. The way one shot changes to the next

________7. Adding multiple layers of superimposed video.

________8. The process of converting digital videos into a particular format.

________9. Everything that happens to the video and audio after production.

Answers

The terms are matched with their corresponding definitions. Each term is associated with a specific aspect of video production and editing, from the initial capture of footage to the final steps of post-production.

Editing is the process of rearranging, adding and/or removing sections of video clips. B. Linear editing is also known as tape to tape editing. C. Compression and Codec software or firmware is used to compress and decompress digital video. D. Non Linear editing is an editing method that uses computer software to edit the footage. E. A Capture Device is a hardware or firmware device used to convert analogue video into digital video. F. Transition is the way one shot changes to the next. G. Layering involves adding multiple layers of superimposed video. H. Encoding is the process of converting digital videos into a particular format. I. Post Production includes everything that happens to the video and audio after production.


Final steps of post-production.

1. Editing: The process of rearranging, adding and/or removing sections of video clips.
2. Linear: Also known as tape to tape editing.
3. Compression and Codec: Software or firmware used to compress and decompress digital video.
4. Non-Linear Editing: An editing method that uses computer software to edit the footage.
5. Capture Device: A hardware or firmware device used to convert analogue video into digital video.
6. Transition: The way one shot changes to the next.
7. Layering: Adding multiple layers of superimposed video.
8. Encoding: The process of converting digital videos into a particular format.
9. Post Production: Everything that happens to the video and audio after production.

To know more about footage visit:

https://brainly.com/question/2907556

#SPJ11

What is the purpose of a div?
Group of answer choices

all of the above

to add a background color or image to a web page section

to change the styling of multiple contained elements

to group elements

Answers

Answer:

I'd choose A, all of the above.

Reasoning Why:

I'll be taking you on a step to step process on why I inputted the answer.

The <div>, is basically like a container that you can group tougher, why this is great is because you can edit the div using a background-color effecting that group such as the following..

EXAMPLE OF BACKGROUND-COLOR DIV (background-color)

<!DOCTYPE html>

<html>

<head>

<title>Brainly Example | HTML Div</title>

<style>

#byexample{

background-color:red;

/*Example of the Background-color attrib*/

/*You can also use the background-image attrib, however I recommend you checkout W3Schools, on that topic.*/

}

</style>

</head>

<body>

<div id="byexample">

<p>Just some random text to demonstrate.</p>

</div>

</body>

</html>

END OF EXAMPLE

You can also, in the <div> change multiple styles of an element in the div. However, if do want to change the styles of a single element you would need to nest it.

<!DOCTYPE html>

<html>

<head>

<title>Brainly Example | HTML Div</title>

<style>

#byexample #text{

background-color:red;

color:yellow;

}

</style>

</head>

<body>

<div id="byexample">

<p id="text">Just some random text to demonstrate.</p>

</div>

</body>

END OF EXAMPLE

Lastly, you can group elements using divs, as stated in openclassroom (website).

Anyways, I hope this helped!

Happy coding!

which functions are performed by server-side code??​

Answers

Answer:

The answer is explained below

Explanation:

Server side code is a code built using the .NET framework so as to communicate with databases which are permanent. Server side code is used to store and retrieve data on databases, processing data and sending requested data to clients.

This type of code is used mostly for web applications inn which the code is being run on the server providing a customized interface for users.

An online supermarket wants to update its item rates during the sales season. They want to show the earlier rates too but with a strikethrough effect so that the customer knows that the new rates are cheaper.

The ____ element gives a strikethrough appearance to the text.

Answers

Cheaper elements gives a strike through appearence

Answer:

the <strike> element should do it

Explanation:

You have been hired to develop the website for a popular speaker. He has asked that you include the PowerPoint slides from his last major presentation on his website. However, you know that most users won’t download PowerPoint slides. What method would you suggest for including the slides on the website?

Answers

The method would you suggest for including the slides on the website are:

First one need to Download WOWSlider and then register for it.Then one can make your slider. You need to have some images ready to add to the slideshow that you want to make.Then Export your slider.You also need to add the slider to your own webpage.

What are the different ways of creating slides?

PowerPoint are known to be one that gives about different ways to create a presentation.

One can use Blank presentation, one can also used  other Design Template and also From AutoContent Wizard.

Note that in the case above, The method would you suggest for including the slides on the website are:

First one need to Download WOWSlider and then register for it.Then one can make your slider. You need to have some images ready to add to the slideshow that you want to make.Then Export your slider.You also need to add the slider to your own webpage.

Learn more about slides from

https://brainly.com/question/24653274

#SPJ1

7
Select the correct answer.
What is the main purpose of spreadsheet applications?

A.
store data in the form of records and fields
B.
create slideshow presentations
C.
manage and analyze data
D.
create and format documents

Answers

A. store data in the form of records and fields

Answer:

A. store data in the form of records and fields

Explanation:

The most common reason to use spreadsheets is to store and organize data, like revenue, payroll and accounting information. Spreadsheets allow the user to make calculations with this data and to produce graphs and charts.

Please help with task!!! Computer Science

Please help with task!!! Computer Science

Answers

Answer:

for (int i = 0; i < a[].length; i++) {

for (int j = 0; j < a[][].length; j++) {

if (a[i][j] > 7)

return a[i][j];

}

}

Explanation:

A nested for-loop can iterate through every row and column and then perform the comparison, returning it if the condition is met.

Which of the following Internet access methods involves connecting your phone to an Internet-ready laptop in order to gain access?
1.Mobile broadband
2.Wi-Fi hotspot
3.Tethering
4.Cybercafé

Answers

Answer:

C

Explanation:

Tethering is connecting a cellular phone to another device typically a laptop or tablet (in this case it would be a laptop).

1) Coding for Table in Html

1) Coding for Table in Html

Answers

See below for the code in HTML

How to code the table in HTML?

The given table has the following features:

TablesCell mergingList (ordered and unordered)

The HTML code that implements the table is as follows:

<table border="1" cellpadding="1" cellspacing="1" style="width:500px">

<tbody>

 <tr>

  <td colspan="1" rowspan="2"><strong>IMAGE</strong></td>

  <td colspan="1" rowspan="2"><strong>name</strong></td>

  <td colspan="2" rowspan="1"><strong>first name</strong></td>

 </tr>

 <tr>

  <td colspan="2" rowspan="1"><strong>last name</strong></td>

 </tr>

 <tr>

  <td>DOB</td>

  <td>yyyy</td>

  <td>mm</td>

  <td>dd</td>

 </tr>

 <tr>

  <td>Qualifications</td>

  <td colspan="3" rowspan="1">references</td>

 </tr>

 <tr>

  <td>

  <ol>

   <li>&nbsp;</li>

   <li>&nbsp;</li>

   <li>&nbsp;</li>

   <li>&nbsp;</li>

  </ol>

  </td>

  <td colspan="3" rowspan="1">

  <ol type = "a">

   <li>&nbsp;</li>

   <li>&nbsp;</li>

   <li>&nbsp;</li>

   <li>&nbsp;</li>

  </ol>

  </td>

 </tr>

</tbody>

</table>

<p>&nbsp;</p>

Read more about HTML at:

https://brainly.com/question/14311038

#SPJ1

Please help it would mean to world to me❤️ (WORD)

Please help it would mean to world to me (WORD)

Answers

Its Option A - Bullets
Thank you!

A data flow diagram (DFD) does not show the external entities that provide data to the system or receive output from the system.
False
True

Answers

The statement "A data flow diagram (DFD) does not show the external entities that provide data to the system or receive output from the system" is false because a data flow diagram (DFD) is a graphical representation of a system or business process that uses symbols such as arrows, circles, and rectangles to depict data flows and the entities that interact with them.

DFDs are utilized to define system requirements graphically, so stakeholders can comprehend the data movement within an application or system. The data flow diagram represents the external entities that interact with the system. External entities are entities that interact with the system, like clients, suppliers, or other systems. The external entities provide input data to the system and receive output data from the system.

A data flow diagram (DFD) is a modeling tool that helps depict the inputs, processes, and outputs of an information system. The external entities are depicted in a data flow diagram (DFD). In other words, external entities are those that are outside the system but play an important part in its operations.

You can learn more about data flow at: brainly.com/question/31765091

#SPJ11

To select nonadjacent items, select the first item as usual, press and hold down the ____ key, and then while holding down the key, select the additional items.

Answers

Answer:

CTRL key

Explanation:

To select nonadjacent items in a spreadsheet, hold down the control key.

Which one matches with Quick Launch?

displays open applications or files
shows the programs that are always running
list of items that can be opened by clicking their names
place where frequently used programs can be opened

Answers

Answer:

Press “Ctrl + Alt + Delete” and then choose “Task Manager”. Alternatively you can press “Ctrl + Shift + Esc” to directly open task manager. To see a list of processes that are running on your computer, click “processes”. Scroll down to view the list of hidden and visible programs.

Explanation:

What is the most complex part of a PC?

Answers

Answer:

From a hardware standpoint, the CPU is most likely the main component. From a software standpoint, macOS and Windows are complex software systems.

Explanation:

What is the main purpose of a graphic organizer

Answers

Answer:

A graphic organizer is a powerful, visual learning tool that teachers like to use to help students organize their ideas.

Explanation:

They can also be used to clarify or simplify complex concepts, help with problem solving or decision making, or be used to plan research or brainstorm ideas.

What are some ways you can make a good impression on a client, and how would you respond to a difficult client situation?

Cybersecurity~

Answers

Not that  you can make a good impression and win clients by being knowledgeable, professional, and responsive. Respond to difficult client situations by remaini ng calm, listening actively, and working to find a solution that addresses their concerns.

What is the rationale for the above response?

Making a good impression on a customer is critical in the realm of cybersecurity in order to develop trust and confidence in your skills. One method to do this is to be well-versed on the numerous cybersecurity dangers and solutions applicable to the client's business or company.

Also , being professional and receptive to their wants and concerns might aid in the development of trust. It is critical to remain calm and not become defensive in the face of a challenging client situation.

Instead, actively listen to their problems and collaborate to create a solution that meets their requirements.

Learn more about Winning Clients:
https://brainly.com/question/28769079
#SPJ1

as a cable company technician, you need to use a fiber optic sc connector to connect a device to the company's fiber optic network. the connector includes the following unique characteristics: it uses a ceramic ferrule to ensure proper core alignment and to prevent light ray deflection. it is half the size of other fiber optic connectors. which of the following is the sc connector? (select the correct connector type.)

Answers

As a cable company technician, you need to use a fiber optic sc connector to connect a device to the company's fiber optic network, the option that  is the sc connector is:  B - SC connector.

What is a SC connector?

Subscriber Connector, abbreviated SC, is also known as Square Connector or Standard Connector. Due to its low cost, dependability, and ease of installation for both point-to-point and passive optical networking, it is a widely used fiber-optic connector.

Hence, (Subscriber Connector, Standard Connector) a connector for fiber optic cables that operates on the same push-pull latching principle as standard audio and video connectors.

Learn more about fiber optic network from

https://brainly.com/question/26259562
#SPJ1

name of main component of fifth generation of computer​

Answers

Answer:In the fifth generation, VLSI technology became ULSI (Ultra Large Scale Integration) technology, resulting in the production of microprocessor chips having ten million electronic components. This generation is based on parallel processing hardware and AI (Artificial Intelligence) software.

Explanation: hope this helps ❤️

2. What is the difference
between a folder and sub
folder

Answers

Answer:

In a computer file system, a subdirectory is a directory that is contained another directory, called a parent directory. A parent directory may have multiple subdirectories. In operating systems with a GUI such as Microsoft Windows, a directory is called a folder, and a subdirectory is called a subfolder.

In cell B8, create a formula using external and internal worksheet references, that subtracts cell B14 on the operating expenses worksheet of the rockland expenses.xlsx file from cell B6 on the income statement worksheet of rockland expenses.xlsx file1. click cell B82. =(select B6)-3. view on ribbon4. under window click switch window5. click the second one6. click cell B147. click enter

Answers

To subtract cell B14 on the Operating Expenses worksheet of the Rockland Expenses.xlsx file from cell B6 on the Income Statement worksheet of Rockland Expenses.xlsx file, you can use an external and internal worksheet reference in cell B8.

The formula would look like this:

='[Rockland Expenses.xlsx]Income Statement'!B6 - '[Rockland Expenses.xlsx]Operating Expenses'!B14

To input this formula, you can follow these steps:

1. Click on cell B8.
2. Type the formula: ='[Rockland Expenses.xlsx]Income Statement'!B6 - '[Rockland Expenses.xlsx]Operating Expenses'!B14
3. Press Enter.

This formula will subtract the value in cell B14 on the Operating Expenses worksheet of the Rockland Expenses.xlsx file from the value in cell B6 on the Income Statement worksheet of Rockland Expenses.xlsx file, and

the result will be displayed in cell B8.

To know more about Operating Expenses, click here:

https://brainly.com/question/14995350

#SPJ11

The formula subtracts the value in cell B14 from the value in cell B6 and displays the result in cell B8.

Based on your question, you want to create a formula in cell B8 that subtracts cell B14 on the Operating Expenses worksheet from cell B6 on the Income Statement worksheet of the rockland_expenses.xlsx file. Here's a step-by-step explanation of how to achieve this:
1. Click cell B8.
2. Enter the following formula: `=Income

Statement!B6-OperatingExpenses!B14`.

This formula uses internal and external worksheet references to perform the subtraction.
3. Press Enter to complete the formula.
In this formula, "Income Statement!B6" is the reference to cell B6 on the Income Statement worksheet, and "Operating.

Expenses!B14" is the reference to cell B14 on the Operating Expenses worksheet.

For similar question on worksheet.

https://brainly.com/question/28737718

#SPJ11

in java: does checking the color of a pixel in a test case require separate assertions for its red, green, and blue values?

Answers

Yes, checking the color of a pixel in a test case usually requires separate assertions for its red, green, and blue values in Java. This is because the color of a pixel is represented as an integer value in Java, where the value is a combination of the red, green, and blue color components. Therefore, to check the color of a pixel, you need to separate out the individual color components and test them separately.

The color of a pixel in a test case in Java require separate assertions for its red, green, and blue values because a color pixel in Java consists of three colors: red, green, and blue. The RGB value of a color is represented by three numbers ranging from 0 to 255, indicating the amount of each color in the pixel. As a result, when you're examining the color of a pixel, you must check each of these three values separately.To accomplish this, you must employ the getRGB() function in Java. The following is an example of how to use it:

public void testPixelColor()

{

Color actualColor = new Color(image.getRGB(10, 10));

assertEquals(255, actualColor.getRed());

assertEquals(0, actualColor.getGreen());

assertEquals(0, actualColor.getBlue());

}

To check the pixel color, the code above creates a new Color object and uses the getRGB() function to retrieve the pixel's RGB value at (10, 10). Then, for each of the three colors, it employs the assertEquals() function to verify that the actual value matches the anticipated value.

To learn more about java; https://brainly.com/question/25458754

#SPJ11

according to the video case what is blockchain?, how can the use of blockchain significantly reduce the likelihood of financial fraud?

Answers

Blockchain is a distributed, secure digital transaction record that is stored on multiple computers.

By rendering the transaction data immutable, the use of blockchain can significantly reduce the likelihood of financial fraud. This indicates that the data on the blockchain cannot be altered or tampered with and is cryptographically secure. Additionally, the blockchain distributed nature ensures that all participants have access to the same data, making fraudulent activity more difficult.

How does Blockchain work?

Blockchain is a distributed, decentralized, and immutable digital ledger that records and stores data securely. It is a chain of blocks with transaction data, a timestamp, and a cryptographic hash of the block before it. By employing a consensus mechanism like Proof-of-Work or Proof-of-Stake, this technology facilitates transactions that are secure, transparent, and immutable. Finance, healthcare, supply chain, and other sectors all make use of this technology. Businesses can track and manage their transactions in a secure and effective manner thanks to blockchain technology.

Learn more about Blockchain:

brainly.com/question/30269838

#SPJ4

PLS HELP ASAP! WILL GIVE BRANLIEST TO THE FIRST PERSON TO ANSWER. 100 points!

Use the information under the Nutrients That the Human Body Needs title to create a multilevel list. Your list should meet these requirements.
a. The first level should be the name of the nutrient.
b. The second level should contain the subheadings “Uses” and “Sources.”
c. The third level should contain the specific information about the second level.

What I did so far:
1) Carbohydrates
a)

Answers

Answer:

Carbohydrates are found in a wide array of both healthy and unhealthy foods eg potatoes, cookies, etc.

Explanation:

Answer:

1) carbohydrates

what do you mean by a)?

T/F : the hard drives of devices to be disposed of should be destroyed before they are sold or recycled. _________________________

Answers

Answer: True

Explanation: If someone gets their hand's on the drive it can access personal data. Often this only happens in external hard drives however, it is better safe than sorry.

The hard drives of devices to be disposed of should be destroyed before they are sold or recycled. The reason behind this is that the hard drives contain sensitive information such as personal data, confidential business information, financial data, and more. If these hard drives end up in the wrong hands.


Simply deleting files or formatting the hard drive is not enough as the data can still be recovered using data recovery software. Therefore, the hard drives should be physically destroyed, making the data irretrievable. This can be done through methods such as degaussing, shredding, or melting. Many businesses and organizations have strict data protection policies that require the secure destruction of hard drives before disposal. Failure to follow these policies can result in data breaches, legal repercussions, and damage to the organization's reputation.

In conclusion, the hard drives of devices to be disposed of should be destroyed before they are sold or recycled to protect sensitive information from falling into the wrong hands. The explanation behind the need to destroy hard drives before disposal is to protect the sensitive information stored on them. Hard drives contain a vast amount of data that can include personal information, financial details, and confidential business data. If this information is accessed by unauthorized individuals, it can lead to identity theft, financial loss, and reputational damage. Deleting files or formatting the hard drive may give a false sense of security as the data can still be recovered using data recovery software. Physical destruction of the hard drive is the only way to ensure that the data is irretrievable. Methods such as degaussing, shredding, or melting are commonly used for this purpose. Businesses and organizations have data protection policies in place to ensure that sensitive data is securely disposed of before devices are sold or recycled. Failure to comply with these policies can result in legal and financial consequences, as well as damage to the organization's reputation. Overall, the need to destroy hard drives before disposal is essential for data protection and privacy. By following best practices and secure disposal methods, individuals and organizations can ensure that their sensitive information remains safe and secure.

To know more about devices visit :

https://brainly.com/question/11599959

#SPJ11

Sierra digitally copies "Rampage" and other recent films without the authorization of the owners and transfers those copies freely to others via file-sharing Web sites. This is

Answers

This is an example of digital piracy. Digital piracy is the unauthorized use or reproduction of copyrighted materials, including movies, music, and software. In this scenario, Sierra is making unauthorized copies of recent films and distributing them freely to others via file-sharing websites, which is a clear violation of copyright laws.

Digital piracy can have a significant impact on the entertainment industry, resulting in lost revenue for creators, studios, and distributors. It can also contribute to the spread of malware and other security threats, as well as reduce the quality and availability of legitimate content. Penalties for piracy can include fines, legal action, and imprisonment. It is important to respect intellectual property rights and to obtain proper authorization before reproducing or distributing copyrighted materials.

Learn more about  digital piracy here;

https://brainly.com/question/24073304

#SPJ11

Give 15 examples of copyright and trademarks that we come in contact with everyday. (Doesn't hve to be 15 could be 3 or 5) PLEASEEEE HELPPPP

Answers

Roads, trading, Government, water systems,

personal professionalism is only important when you have a full-time job.

true or false?

Answers

Answer: True

Explanation: just cuz

Larry does not want to save his internet browsing details on his computer. What files should Larry delete to clear his information from the computer?
A.
Trojan horses
B.
viruses
C.
cookies
D.
spam

Answers

C. cookies                      

cuz yeahhhhhhhhhhhh

       

C. COOKIES AND THERE YUMMY

can you help me here please​

can you help me here please

Answers

Explanation:

because Anna is a music lover she had download lots of songs.When downloading songs a virus should have gone from the websites to her computer.

to avoid this problems she should not have gone through the different websites

Other Questions
What is the simple interest on $2500 invested at an interest rate of 6% for 2 years? Someone please tell me about the Hong Kong protests + the relationship with China for my current event Which statement is always true when nuclear fusion occurs?. The Works Progress Administration (WPA) was responsible forreplacing striking workers.improving infrastructure and public facilities.helping with natural resource conservation.bringing electricity to rural areas. What was the impact of the Navigation Acts? * 1 point It was the 1st time England had interfered with American policy and economics None - the colonies were used to interfernce in policies & economics by England England stopped the Navigation Acts after a few years because they were impossible to enforce The American colonies were eager to comply with the Navigation Acts identify the items needed to run a spectrophotometry experiment. identify two catorgories of working conditions in the factory. how does it affect the workers ? lyddie provide two details from the text to support your answer use race Sarah set up a business as a sole trader running a nursery for small children too young to go to school. the business is successful and has opened a number of new nurseries. sarah took on a business partner in 2007. growth has continued and now the business has 10 nurseries in different towns and villages. sarah is planning to open another nursery and is looking for a suitable location. do you think its a good idea for sarah to continue to expand her business? justify your answer. If price is greater than average variable cost and less than average total cost at the profit-maximizing quantity of output in the short run, a perfectly competitive firm will: what is the solubility of pbf in a solution that contains 0.0450 m pb ions? (ksp of pbf is 3.60 10) What is the Electoral College simple definition? Juan buys a crystal sculpture priced at $753.00. If the sales tax is 4%, what will be thetotal cost including tax? When might an over-the-air radio or television station air material considered obscene or indecent? Most judges performed what type of work prior to becoming a judge? A uniform ladder of mass m and length l leans at an angle against a frictionless wallPart A If the coefficient of static friction between the ladder and the ground is , determine a formula for the minimum angle at which the ladder will not slip. Express your answer in terms of some or all of the variables m, l, and . find the length of the missing side pls help A student suggests the following algorithm for calculating 72 - 38. 72 Two minus eight equals negative six. -38 -6 Seventy minus thirty equals forty. Forty plus negative six equals thirty-four, 34 which therefore is the result. As a teacher, what is your response? Does this procedure always work? Explain. What are application area of micro-computers who said ,"speak slow if you speak love"? how do you find the IQR(interquartile range) of a dor plot?