1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AlexFokin [52]
1 year ago
7

You are given the following design parameters, fill in the table: All memory addresses are 32-bit long; A 64Kbyte (2^16 byte) ca

che is added between the processor and the memory. (64Kbytes do not include the amount of space used to store tags and status bits); There are two associativity choices for the cache: direct-mapped and 2-way set associative. There is a 20 percent increase in cache access time and a 40 percent miss rate reduction when moving from a direct-mapped cache to a 2-way set associative cache: There are two cache block size choices of 16bytes and 32bytes. It takes 20 ns to retrieve 1 Gbytes of data from the main memory and 25 ns to retrieve 32 bytes of data. The cache returns the value to the processor after the entire cache block is filled. However, the cache miss rate is reduced by 25 percent when the cache block size doubles; It takes 10ns to access a 64Kbyte direct-mapped cache; The cache nuss rate for a 64Kbyte direct-mapped cache is 10 percent
Computers and Technology
1 answer:
Zanzabum1 year ago
5 0

Time taken to access the average memory

When direct mapping is utilized, 1. when the block has a 16-byte size.

Given that the memory access time (m) is 20ns and the cache access time (Tc) is 10ns, the cache miss rate is 10%, or 0.1(1-H).

AMAT = HTc + (1-H)(Tc+m) Cache hit rate (H) = 0.9

=HTc + Tc + m -HTc - Hm = Tc + (1-H)m = 10 ns + 0.1 x 20 = 10 ns + 2 = 12 ns

2. direct mapped cache with a 32-byte block size.

Given that the access time to the cache and memory is equal to 10 nanoseconds,

Because of the 25% reduction in the question's cache miss rate, the cache miss rate (1-H) is 0.075. The new miss rate is 75% of 0.1, or 0.075.

Tc + (1-H)m' = 10+0.075 x 25 = 10 + 1.875 = 11.875 ns is what AMAT is.

when there is two-set associativity.

1. when a 16-byte block is in use.

The question indicates that the time it takes to access the new cache goes up by 20% of 10ns.

Access time to the new cache, T'c=12ns

The rate of misses went down by 40%, so the new miss rate is 60% of 0.1. which equals 0.006 (1-H').

AMAT = T'c + (1-H')m.

AMAT is equal to 13.2 ns for 12 ns plus 0.06 x 20.

2. when a cache block is 32 bytes in size.

Access time to memory (m') equals 25 nanoseconds.

By increasing the block size, the miss rate is reduced by 25%.

Therefore, the miss rate is 0.045 = (1-H')/75% of 0.06

AMAT is 12 + 0.45 * 25 = 12 + 1.125, or 13.125 ns.

To learn more about average memory here

brainly.com/question/26256045

#SPJ1

You might be interested in
________ is used to install and update software, backup, and restore mobile devices, wipe employer software and data from device
erastovalidia [21]

Answer: MDM softwares

Explanation:

Here MDM refers to mobile device management software which provides people with the facilities of updating, installing creating backup of various mobile devices within an organisation. Moreover these software's provides tools for proper monitoring and to report their usage across various independent mobile device users. MDM is often used or interconnected with the term BYOD(Bring your own device), whereby employees of an organisation bring their own mobile devices and they are being managed by a MDM software centrally.

8 0
4 years ago
Computer crimes are a big concern since the creation of innovative technological advances; which is/are examples of computer cri
Natali [406]

Answer:

The answer is E: All of the above

Explanation:

All of the above scenarios are examples of serious computer crimes. They are crimes that exist in the offline world but take place online. Sexual predators, for instance, mostly take advantage of the anonymity provided by the internet. They often target dating sites and find suitable victims. Cyber bullying and Cyber stalking are just as harmful as any other computer crime. Industrial Espionage may also somehow fall into this category. Less frequently, criminals may steal documents and computer files or more often, illegally gain access to company’s trade secrets on computers and servers.

3 0
3 years ago
Read 2 more answers
Lynn has created a quarterly sales report using a word processor. The document is confidential, and Lynn wants to secure it with
sweet-ann [11.9K]
Stop cheating



It’s b
3 0
3 years ago
True or false: you should reuse passwords on multiple websites because it will help you remember those passwords
Fudgin [204]

Answer: False

Explanation: Even though you can remember it is not really good because some hackers can track you passwords through those websites and could hack your account.

3 0
3 years ago
Read 2 more answers
A negative effect of computer technology's role in creating images is that:
otez555 [7]

Answer:

Personally would go with D.

Information being shared could be both good and bad but it all would be about the situation and if it was private information or not.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Write a program which simulate rolling dice. When the program runs, it will prompt the user to choose a number ranging from 1 to
    15·1 answer
  • When considering changing the content of a cell which button should you press to leave the cell as it originally was? 
    5·1 answer
  • The most widely used presentation software program is Microsoft PowerPoint. You can produce a professional and memorable present
    8·1 answer
  • Complete the implementation of the following methods:__init__hasNext()next()getFirstToken()getNextToken()nextChar()skipWhiteSpac
    11·1 answer
  • The objective of this task is to use Scapy to estimate the distance, in terms of number of routers, between your VM and a select
    10·1 answer
  • HELP ME PLEASE ASAP
    6·1 answer
  • Write a program that repeatedly reads in integers until a negative integer is read. The program keeps track of the largest integ
    9·1 answer
  • It's a holiday poop in my bitt
    10·2 answers
  • In a computer-controlled greenhouse, a temperature sensor and a window motor are connected to the computer.
    10·1 answer
  • How do you create a CA file? short answer
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!