1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dimas [21]
3 years ago
10

Consider a 512 Mb DRAM with 8 banks, 256k subarrays, and 8 bit word. How are the address bits allocated? How many subarrays are

there and how are they arranged?
Computers and Technology
1 answer:
Softa [21]3 years ago
4 0

Answer:

26 address bits are needed to address 2∧26 locations.

There are 24 = 16 subarrays.

Explanation:

Considering a 512Mb DRAM, it means it can store 512*2∧20 bits = 2∧9X2∧20 = 2∧29. Since it is a 8 bit word, at a time, 8 bits are accessed. Therefore, the capacity can be re-written as 2∧26X 2∧3 = 2∧26X8

It simply means 26 address bits are needed to address 2∧26 locations, since there are 8 banks, 3 address bits are needed to select a bank ( 8 = 2∧3 )

Each subarray is 256K which means 19 bits are needed to select one address from this 256K subarray ( since 256K = 2∧19 )

22 addresses are used up out of a total of 26 addresses (19 for locating a location in 256K subarray and 3 for banks). The remaining addresses are 4 ( 26 - 22 ). These 4 addresses are used to locate a subarray. thus there are 2∧4 = 16 subarrays

There are a total of 8 banks  and within a bank, there are 32 subarrays.

Within each subarray there are 256K locations each of 8 bit size.

Note: " ∧" means raise to power

You might be interested in
The voluntary linkage of computer networks around the world is called the ______.
77julia77 [94]
The voluntary linkage of computer networks around the world is called the internet which began to be used in the 1990s. It initially began being used in the 1960s by scientists with the aim of exchanging information about research. Between the year 1995 and late 2002, the number of those connected to the internet rose from 26 million to more than 600 million. Currently, internet has now become a way of life.








3 0
3 years ago
Why do computers use binary code?
Anna71 [15]

Answer:

To make sense of complicated data, your computer has to encode it in binary. Binary is a base 2 number system. Base 2 means there are only two digits—1 and 0—which correspond to the on and off states your computer can understand

4 0
3 years ago
Read 2 more answers
Date
IRISSAK [1]

Answer:

computer is an electronic machine that accept raw data ,process and then give result. it's uses:

It is used for storing data and information.

5 0
2 years ago
Which of these is an example of a system?
lisov135 [29]

Answer:

force and a single particla of matter

4 0
3 years ago
Write a while loop that prints userNum divided by 2 (integer division) until reaching 1. Follow each number by a space.
Ksenya-84 [330]

Answer:

   while(userNum>=1){

       System.out.print(userNum/2+" ");

       userNum--;

        }

Explanation:

This is implemented in Java programming language. Below is a complete code which prompts a user for the number, receives and stores this number in the variable userNum.

<em>import java.util.Scanner;</em>

<em>public class TestClock {</em>

<em>    public static void main(String[] args) {</em>

<em>    Scanner in = new Scanner (System.in);</em>

<em>        System.out.println("Enter the number");</em>

<em>    int userNum = in.nextInt();</em>

<em>    while(userNum>=1){</em>

<em>        System.out.print(userNum/2+" ");</em>

<em>        userNum--;</em>

<em>         }</em>

<em>    }</em>

<em>}</em>

The condition for the while statement is userNum>=1 and after each iteration we subtract 1 from the value of   userNum until reaching 1 (Hence userNum>=1)

3 0
3 years ago
Other questions:
  • Universal Containers recently rolled out a Lightning Knowledge implementation; however, users are finding unreliable and unrelat
    6·1 answer
  • Which program can damage your computer
    13·2 answers
  • You can combine the algorithms for converting between infix to postfix and for evaluating postfix to evaluate an infix expressio
    13·1 answer
  • What is the problem with the code snippet below? public class Test { public static void main(String[] args) { System.out.println
    6·1 answer
  • All states that have altered judicial selection techniques in recent years have adopted some form of:
    5·1 answer
  • Two routers connect with a serial link, each using its S0/0/0 interface. The link is currently working using PPP. The network en
    6·1 answer
  • Write 3 functions in the starter code below such that: add_to_dict(): takes a dictionary, a key, a value and adds the key,value
    15·1 answer
  • User defined blocks of code can be created in
    13·1 answer
  • Task #3 Debugging a Java Program
    14·1 answer
  • Im a beginner programmer. what languages should i learn and how do i get better
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!