1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlad [161]
3 years ago
11

You are trying to appreciate how important the principle of locality is in justifying the use of a cache memory, so you experime

nt with a computer having an L1 data cache and a main memory (you exclusively focus on data accesses). The latencies (in CPU cycles) of the different kinds of accesses are as follows: cache hit, 1 cycle; cache miss, 105 cycles; main memory access with cache disabled, 100 cycles.
a. [10] When you run a program with an overall miss rate of 5%, what will the average memory access time (in CPU cycles) be?
b. [10] Next, you run a program specifically designed to produce completely random data addresses with no locality. Toward that end, you use an array of size 256 MB (all of it fits in the main memory). Accesses to random elements of this array are continuously made (using a uniform random number generator to generate the elements indices). If your data cache size is 64 KB, what will the average memory access time be?
c. [10] If you compare the result obtained in part (b) with the main memory access time when the cache is disabled, what can you conclude about the role of the principle of locality in justifying the use of cache memory? d. [15] You observed that a cache hit produces a gain of 99 cycles (1 cycle vs. 100), but it produces a loss of 5 cycles in the case of a miss (105 cycles vs. 100). In the general case, we can express these two quantities as G (gain) and L (loss). Using these two quantities (G and L), identify the highest miss rate after which the cache use would be disadvantageous.

Computers and Technology
1 answer:
murzikaleks [220]3 years ago
3 0

Answer:

Explanation:

Attached is the solution

You might be interested in
What kind of printer is used with multipart forms such as those with point of sale machines?A) dot-matrixB) daisy-wheelC) inkjet
ivanzaharov [21]

Answer:

The answer is "Option A".

Explanation:

The Dot matrix printer is also known as an impact matrix printer. It is a multi-part form printer because it prints data on paper. This printer uses a hammer and a ribbon printer, that shapes pictures from dots. and other options are not correct, that can be described as follows:

  • In option B, daisy-wheel printer prints data on printer only one side that's it is not correct.
  • In option C, the Inkjet printer is capable to print data in multi-part forms, but this printer does not data in continuous forms.
  • In option D, the color printer allows you to print data in color format like images, graphs, and banner. It prints data only on one side, that's why it is not correct.  
6 0
3 years ago
It connects computers in different cities and different countries
svetoff [14.1K]

Answer:

I think VPN firewall devices can do that.

5 0
3 years ago
Read 2 more answers
Company A is setting up a network of mostly Windows machines. Which networking file system protocol would you recommend for maxi
maxonik [38]

Answer:

For maximum interoperability, NFSv4 is recommended.

Explanation:

When setting up a network of mostly windows machines, it is better to use NFSv4 because it includes performance improvements, mandates strong security, and a stateful protocol.

4 0
3 years ago
Instead of typing out each co-worker's email address individually, you can use the Office Online People application to create a
arsen [322]

The answer is D) group

7 0
3 years ago
Read 2 more answers
What is the purpose of an arraignment?
IgorC [24]

Answer:

At an arraignment, the court officially illuminates a litigant regarding charges contained in a prosecution or data, gives the respondent a duplicate of the charging instrument, and takes the litigant's response to those charges as a request.

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • An attribute whose value uniquely identifies an object is called a(n) _______.​
    15·1 answer
  • In internet terminology, what is the term, .com, called?
    12·2 answers
  • Fill in the blank. Do not abbreviate.
    6·1 answer
  • The standing toe touch is most likely to result in
    15·1 answer
  • How many bits are used to direct traffic to specific services running on a networked computer?
    6·1 answer
  • A static class method can be accessed without referring to any objects of the class. True False
    7·1 answer
  • Which of the following is another type of brake system used in trucks
    5·1 answer
  • When a person bullies someone using technology, it's called:
    9·2 answers
  • What do you think that the next version of IR (IR 5.0) will bring if it was discovered in near future? (hint:- advance IR 4.0 fe
    8·1 answer
  • What type of e-mail typically lures users to sites or asks for sensitive information?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!