1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ilia_Sergeevich [38]
3 years ago
9

If a cache access requires one clock cycle and dealing with cache misses requires an additional five clock cycles, which of the

following cache hit rates results in an effective access time of 2 clock cycles?a) 70%.
b) 80%.
c) 85%.
d) 90%.
Computers and Technology
1 answer:
DedPeter [7]3 years ago
5 0

Answer:

B. 80%

Explanation:

To assertain:

1 hit takes 1 clock cycle while 1 miss takes 6 clock cycles

Assuming that:

  1. we have 100 accesses in total,
  2. p are hits,
  3. 100 - p are misses

So, p + (100 - p)*6 = 200\\ \\p+600-6p = 200\\\\-5p + 600 = 200\\\\5p = 600 -200\\\\p = \frac{400}{5} \\\\p= 80

Hence, option B. 80% will result in an effective access time of 2 clock cycles.

You might be interested in
Which of the following is NOT a factor that increases the health risks of construction workers?
Nadya [2.5K]

From all the available options, the one that would not increase the health risk for construction workers would be (D) stable, rarely changing job site environments and conditions.

High number of unskilled labors increase the likelihood that an accident might occur, while high turnover creates instability which in turn might increase the same likelihood due to increased workload while human resources seek a replacement. Multiple contractors and subcontractors mean confusions might arise and accident may likely happen if the risk is not properly managed.

8 0
3 years ago
Read 2 more answers
How is your approach to solving how to order your coins different from how a computer might have to approach it?
Finger [1]

Answer: Computer solves the order of coins the way its programmed to while you solve the order of coins the way you want.

8 0
3 years ago
Java uses ____ to implement method lookup.A) a jump tableB) an inheritance treeC) restricted accessD) polymorphism
sashaice [31]

Answer:

D) polymorphism

7 0
4 years ago
What does coding mean​
NeTakaya
The process or activity of writing computer programs.
3 0
3 years ago
Read 2 more answers
Is GLaDOS from portal 2 possible?
77julia77 [94]

Answer:

Explanation:Yes Glados 2 is posible.

8 0
4 years ago
Other questions:
  • While there are many types of sediments, those that make up sedimentary rocks must be transported by running water.
    9·1 answer
  • Typically, what form do most database designers consider a database structure to be normalized?
    15·1 answer
  • Dereck works for long hours on his computer. He frequently experiences physical strain by the end of the day because he does not
    8·2 answers
  • Fill in the code to complete the following function for computing a Fibonacci number. public static int fib(int index) { if (ind
    6·1 answer
  • What do you understand by Multiprotocol Label Switching, how it works and is helpful in today's network scenario.
    15·1 answer
  • Help me! I’ll mark you brainly
    13·1 answer
  • Software that allows users to use and adapt it for any purpose, often allowing the public to participate in further development
    7·2 answers
  • Nick is moving from Alabama to Texas. A friend of his remarked that Nick may have to pay higher taxes there. What is the cheapes
    7·1 answer
  • Ceteris paribus, if a student could either earn money tutoring or working as a server in a restaurant, then increases to the wag
    5·1 answer
  • "You have created a Word document named apple.docx using Microsoft Word. What type of a file is apple.docx ? Select all that app
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!