1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlad [161]
3 years ago
11

You are trying to appreciate how important the principle of locality is in justifying the use of a cache memory, so you experime

nt with a computer having an L1 data cache and a main memory (you exclusively focus on data accesses). The latencies (in CPU cycles) of the different kinds of accesses are as follows: cache hit, 1 cycle; cache miss, 105 cycles; main memory access with cache disabled, 100 cycles.
a. [10] When you run a program with an overall miss rate of 5%, what will the average memory access time (in CPU cycles) be?
b. [10] Next, you run a program specifically designed to produce completely random data addresses with no locality. Toward that end, you use an array of size 256 MB (all of it fits in the main memory). Accesses to random elements of this array are continuously made (using a uniform random number generator to generate the elements indices). If your data cache size is 64 KB, what will the average memory access time be?
c. [10] If you compare the result obtained in part (b) with the main memory access time when the cache is disabled, what can you conclude about the role of the principle of locality in justifying the use of cache memory? d. [15] You observed that a cache hit produces a gain of 99 cycles (1 cycle vs. 100), but it produces a loss of 5 cycles in the case of a miss (105 cycles vs. 100). In the general case, we can express these two quantities as G (gain) and L (loss). Using these two quantities (G and L), identify the highest miss rate after which the cache use would be disadvantageous.

Computers and Technology
1 answer:
murzikaleks [220]3 years ago
3 0

Answer:

Explanation:

Attached is the solution

You might be interested in
What is the first step in creating a maintenance ?
tankabanditka [31]
The first step would be knowing the manufacturer s recommended schedule for maintenance
7 0
2 years ago
What correlation is obtained when the pearson correlation is computed for data that have been converted to ranks?
professor190 [17]

The correlation that is obtained when the pearson correlation is computed for data that have been converted to ranks is option A) The Spearman correlation.

<h3>What is Spearman correlation used for?</h3>

Spearman's correlation is known to be one that tends to look into or measures the strength and way of monotonic relationship between two variables.

It is one that is a nonparametric measure that is often known to be rank correlation and it tends to examine  how well the association between two variables can be said to using a monotonic function.

Hence, The correlation that is obtained when the pearson correlation is computed for data that have been converted to ranks is option A) The Spearman correlation.

Learn more about correlation from

brainly.com/question/12479370

#SPJ4

See full question below

) What correlation is obtained when the Pearson correlation is computed for data that have been converted to ranks?

A) The Spearman correlation

B) The point-biserial correlation

C) The phi coefficient

D) It is still called a Pearson correlation

8 0
1 year ago
You want some points? whoever answers first gets 48 points. no cap. better be quick.
LekaFEV [45]

Answer:

4

Explanation:

5 0
2 years ago
Read 2 more answers
Ten(10) examples of wearables or wearable technologies?​
Semmy [17]

Answer:read

Explanation:

airpods

headphones

earbuds

AirPods  pro

watch

fitbit (type of watch that counts your miles) &you can say workout watch&

VR set

technology bracelet

smart glasses

Smart ring

7 0
3 years ago
1.2.10 Snowflakes CodeHS<br> Does anyone have the code for this?<br> Thank you!
tresset_1 [31]

Answer:

idrk tbh

Explanation:mhmmmmmmmmmmmmmmmmmmmmm

8 0
2 years ago
Other questions:
  • What cable should i be using to connect my android tablet to the pc?
    13·2 answers
  • for what reason do some security professionals consider insiders more dangerous than outside intruders?
    8·1 answer
  • Pros and cons of access to a wide range of online services when it comes to an individual's safety?
    14·1 answer
  • Select all the correct answers. Which two statements are true about an OS? translates the user's instructions into binary to get
    10·1 answer
  • A group of interrelated resources acting together according to a plan to accomplish the goals of the records and information man
    5·1 answer
  • What kind of software consists of programs designed to make users more productive and/or assist them with personal tasks?
    10·1 answer
  • Given a String variable named line1 and given a Scanner reference variable stdin that has been assigned a reference to a Scanner
    11·1 answer
  • What is the main difference between a search engine and a web browser?
    6·2 answers
  • Two friends can share 100 songs from their Bluetooth enabled mobile devices
    13·1 answer
  • What does an arrow after a command indicate
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!