1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kvasek [131]
3 years ago
7

You are asked to optimize a cache design for the given references. Th ere are three direct-mapped cache designs possible, all wi

th a total of 8 words of data: C1 has 1-word blocks, C2 has 2-word blocks, and C3 has 4-word blocks. In terms of miss rate, which cache design is the best? If the miss stall time is 25 cycles, and C1 has an access time of 2 cycles, C2 takes 3 cycles, and C3 takes 5 cycles, which is the best cache design?
Computers and Technology
1 answer:
Alja [10]3 years ago
8 0

Answer:

Explanation:

From the given data, Direct-Mapped cache with 8words of data means 2^3 of data.

There are three caches C1, C2 and C3.

C1 has 1 word blocks

C2 has 2 word blocks

C3 has 4 word blocks

also, Miss stall = 25 cycles.

We have,

Miss rate = 3% for current block size

Thus, for cache C1, miss rate = 3%

cache C2, miss rate = 2%

cache C3, miss rate = 1.2%

So, the cache C3 design is the best. In terms of miss rate. The cache performance increases with decrease in miss penalty.

That means if miss penalty is less, then the performance of cache increases. And for cache C3, the miss penalty is less.

From given data

C1 acess time is 2 Cycles.

C2 acess time is 3 Cycles.

C3 acess time is 5 Cycles.

Then

C1 stall time is 25*11+ 2*12 = 299.

C2 stall time is 25*9+ 3*12 = 261.

C3 stall time is 25*10+ 5*12 = 310.

In this case, C2 is the best cache design.

And

C1 stall time is 25*11+ 2*12 = 299.

C2 stall time is 25*8+ 3*12 = 236.

C3 stall time is 25*8+ 5*12 = 260.

In this case also, C2 is the best cache design.

You might be interested in
Which role is delegated to personnel of the IT department and is responsible for maintaining the integrity and security of the d
enyata [817]

Correct question.

Which role is delegated to personnel of the IT department and how is responsible for maintaining the integrity and security of the data?

Answer:

<u>data custodian</u>

<u>Explanation:</u>

Remember, every organization generates data, and large organizations generate even larger data.

Hence, the role of a data custodian in an organization requires He implements measures to protect the organization's data, store and backup the data, as well as granting access to the data to authorized persons when needed.

3 0
3 years ago
A laptop computer has two internal signals: An unplugged signal, which is '1' if the laptop's power supply is connected, and '0'
Brums [2.3K]

Answer:

The correct usage is a NOR gate which is indicated in the explanation.

Explanation:

The truth table for the given two signals, namely

p=unplugged signal

q=low battery signal

can  form a truth table of following form

Here p has 2 states

1 if the power supply is connected

0 otherwise

Similarly q has 2 states

0 if the battery has reached almost zero state

1 otherwise

As the condition for the Hibernate Signal is given as to only activate when the battery is low and the power supply is not connected. This indicate that the value of Hibernate signal should be 1 when both p and q are 0.

Using this condition, the truth table is formed as

unplugged signal | low battery signal |  Hibernate Signal

            0               |                 0             |             1

            0               |                 1              |             0

            1                |                 0             |             0

            1                |                 1              |             0

Now the truth table of NOR is given as

a    |     b    |  a or b   |   ~(a or b)

0    |     0    |      0      |        1

0    |     1     |      1       |        0

1     |     0    |      1       |        0

1     |     1     |      1       |        0

This indicates that the both truth tables are same thus the NOR gate is to be used for this purpose.

6 0
3 years ago
Google’s adwords system provides a quality score as a measure of _____, which indicates the usefulness of an ad message to consu
Vanyuwa [196]
The term that best fit the blank is RELEVANCE. The Google Adwords system is a system that is created by Google for the purpose of advertising online. Therefore, relevance is very important in this aspect as this shows how useful the ad is to the consumers who are doing the google search.
3 0
3 years ago
What is the value of the variable phones after the execution of the following code? phones = {'John': '5555555', 'Julie' : '7777
uysha [10]

Answer:

phones = {'John': '1234567', 'Julie' : '7777777'}

Explanation:

In the code given in the question phones dictionary contains contains two keys John and Julie and have the values '5555555' and '7777777' respectively. Now in the code the key John in the dictionary phones is assigned the value '1234567' .So the value corresponding to the key John becomes '1234567'.

3 0
3 years ago
You are given a class named Clock that has one int instance variable called hours.
Vlad [161]

Answer:

public Clock(int hours) {

       this.hours = hours;

   }

Explanation:

In Java programming language, Constructors are special methods that are called to initialize the variables of a class when a new object of the class is created with the new keyword. Consider the complete code for the class below;

<em>public class Clock {</em>

<em>    private int hours;</em>

<em>    public Clock(int hours) {</em>

<em>        this.hours = hours;</em>

<em>    }</em>

<em>}</em>

In this example above,  an object of this class can created with this statement Clock myclock = new Clock(6); This is a call to the constructor and passes a parameter (6) for hours

7 0
3 years ago
Other questions:
  • Write an essay on online collaboration, how to do it, the challenges, resolving the challenges, and consider whether the risks a
    12·1 answer
  • What type of control structure is the default method of the computer reading code?
    9·1 answer
  • A pair of single quotes ' will prevent the shell from interpreting any special character. True or False
    15·1 answer
  • The greatest common divisor of integers x and y is the largest integer that evenly divides into both x and y. Write a recursive
    7·1 answer
  • In linear​ programming, what are restrictions that limit the degree to which a manager can pursue an​ objective?
    15·1 answer
  • Consider the security of a mobile device you use
    6·1 answer
  • Manfred wants to include the equation for the area of a circle in his presentation. Which option should he choose?
    11·2 answers
  • Which memory can be removed from motherboard? RAM OR ROM?​
    11·1 answer
  • How to design remote access policy using the appropriate access controls for systems,applications, and data access
    6·1 answer
  • Different search engines available on the internet​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!