1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ilia_Sergeevich [38]
3 years ago
9

If a cache access requires one clock cycle and dealing with cache misses requires an additional five clock cycles, which of the

following cache hit rates results in an effective access time of 2 clock cycles?a) 70%.
b) 80%.
c) 85%.
d) 90%.
Computers and Technology
1 answer:
DedPeter [7]3 years ago
5 0

Answer:

B. 80%

Explanation:

To assertain:

1 hit takes 1 clock cycle while 1 miss takes 6 clock cycles

Assuming that:

  1. we have 100 accesses in total,
  2. p are hits,
  3. 100 - p are misses

So, p + (100 - p)*6 = 200\\ \\p+600-6p = 200\\\\-5p + 600 = 200\\\\5p = 600 -200\\\\p = \frac{400}{5} \\\\p= 80

Hence, option B. 80% will result in an effective access time of 2 clock cycles.

You might be interested in
What has impacted the world more: The initial creation of telephone or a smart cellphone? Explain your reasoning!
-BARSIC- [3]
If this is on personal opinion, I would say the initial creation of the telephone. Even though a smartphone practically kickstarted a whole era to technology that is still going on till this day, it was the telephone that started this all. If it wasn’t for the idea to create a phone that is more advanced than a box attached to the wall, none of these advancements would’ve happened at all. (Although that is uncertain, things do tend to have a way of working out in the end. If someone didn’t invent it, another person would’ve thought of it sooner or later.) But that is only if we’re talking long term, which I prefer because there was no limit to when the results of impact started in the prompt stated above, yet if we were to speak short term and the faster one, the credit would go to the smart cellphone. But we aren’t, because the question never specified ;)
5 0
3 years ago
Your older brother Max tells you about his secret plan to hack into his college’s computer network and change all of his grades.
viktelen [127]

Answer:

Tell him he could get kicked out of school and it can possibly show up on his record and lessen his chances of finding a job since no one will trust him. He should just focus and get his grades up instead of risking everything and "taking the easy way out".

Explanation:

6 0
2 years ago
What is the name for the type of flash memory that is used by mobile devices to store their apps and data?
tankabanditka [31]
D. Solid state is correct
5 0
3 years ago
if an open cut or wound is exposed to contamination washing it in hot water and hand soap is not sufficient to keep safe
Serggg [28]
True u need to cover the would so it does not get contaminated again it also depends how long it been exposed and if it’s already infected
3 0
3 years ago
Read 2 more answers
Fill in the code in the underlined location to display the mouse point location when the mouse is pressed in the pane.
olga nikolaevna [1]

Answer:

Point e = MouseInfo.getPointerInfo().getLocation();

Explanation:

Through the above we can find the point where the mouse is located. And you can check the further code, the details are given how this point is being used to find the x and y value of the location. You are also going to find that we can do almost anything at this location. Remember this code is in JAVA,

6 0
3 years ago
Other questions:
  • Encryption is the process of:
    12·1 answer
  • Which of these computers was marketed as a computer/game machine?
    15·2 answers
  • If you’re presenting in a darkened room, what text and background should you use to provide maximum readability?1) Light text on
    5·1 answer
  • An overall indication of the dependability of data may be obtained by examining the ________, credibility, reputation, and _____
    15·2 answers
  • Which of the following is NOT true about procedural abstraction?
    9·1 answer
  • Which of these Logic Statement's are correct for the following diagram? *
    5·1 answer
  • PLEASE I NEED HELP FAST
    8·1 answer
  • You have a host device with an assigned IP address of 192.168.15.100 and a subnet mask of 255.255.255.192. To what network does
    13·1 answer
  • I need help so bad it’s the entire test for EdHesive python coding Test 2
    5·1 answer
  • How has the internet improved business communication worldwide
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!