1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kvasek [131]
4 years ago
7

You are asked to optimize a cache design for the given references. Th ere are three direct-mapped cache designs possible, all wi

th a total of 8 words of data: C1 has 1-word blocks, C2 has 2-word blocks, and C3 has 4-word blocks. In terms of miss rate, which cache design is the best? If the miss stall time is 25 cycles, and C1 has an access time of 2 cycles, C2 takes 3 cycles, and C3 takes 5 cycles, which is the best cache design?
Computers and Technology
1 answer:
Alja [10]4 years ago
8 0

Answer:

Explanation:

From the given data, Direct-Mapped cache with 8words of data means 2^3 of data.

There are three caches C1, C2 and C3.

C1 has 1 word blocks

C2 has 2 word blocks

C3 has 4 word blocks

also, Miss stall = 25 cycles.

We have,

Miss rate = 3% for current block size

Thus, for cache C1, miss rate = 3%

cache C2, miss rate = 2%

cache C3, miss rate = 1.2%

So, the cache C3 design is the best. In terms of miss rate. The cache performance increases with decrease in miss penalty.

That means if miss penalty is less, then the performance of cache increases. And for cache C3, the miss penalty is less.

From given data

C1 acess time is 2 Cycles.

C2 acess time is 3 Cycles.

C3 acess time is 5 Cycles.

Then

C1 stall time is 25*11+ 2*12 = 299.

C2 stall time is 25*9+ 3*12 = 261.

C3 stall time is 25*10+ 5*12 = 310.

In this case, C2 is the best cache design.

And

C1 stall time is 25*11+ 2*12 = 299.

C2 stall time is 25*8+ 3*12 = 236.

C3 stall time is 25*8+ 5*12 = 260.

In this case also, C2 is the best cache design.

You might be interested in
.What is a wildcard character? How would you use it to find a record?
7nadin3 [17]

Answer and Explanation:

A wildcard character is a character that can be substituted for either a single character or a string of characters. For instance, in certain operating systems, the asterisk character "*" can be used in lieu of a set of characters, while the character "?" can be used in lieu of a single character.

It is a special character that represents one or more other characters. The most commonly used wildcard characters are the asterisk (*), which typically represents zero or more characters in a string of characters, and the question mark (?), which typically represents any one character.

For example, in searching: run* would mean "any word that starts with 'run' and has any kind of ending." If you entered "run*" at a search engine that offered a wildcard character capability, you would get results for run, runs, running, runner, runners - in short, any possible word that might begin with the three letters.

Use of wildcard character:

Wildcard characters are utilized in customary articulations (a programming type wherein input information is adjusted depending on indicated designs) and in scanning through record catalogs for comparable document names (for instance, if all the work documents on an undertaking start with the characters "F7," you could undoubtedly find all the venture records by just looking for "F7*").  

It is a special case character and is a sort of Meta character .  

In different card games, a wildcard is an assigned card in the deck of cards.

8 0
3 years ago
If the transmitting device would like for the receiving device to push currently buffered data to the application on the receivi
Andreyy89

Answer:

The right approach will be "PSH".

Explanation:

  • The PSH flag seems to be an acceptable solution through TCP which always encourages the submit implementation to immediately transfer data but only whenever the buffer isn't complete.
  • The implementation helps to formulate this same flag towards true for something like the connection, as well as TCP will instantly begin transmitting the relevant information.
3 0
3 years ago
Which column and row references are updated when you copy the formula f$3/15
Tasya [4]

Answer: Column F

Explanation: In Microsoft excel, for the sake of robustness and to aid the effectiveness of updating formulas across cells. The reference of cells are treated as relative which means that when formulas are copied across columns or within rows, they get updated automatically. However, some numbers may be treated as constants such that we do not want them to change or be updated as we move acisss cells. Thus, such numbers are treated Given absolute references, which is made possible by adding a '$' prefix before the colum alphabet or row number or both. in the scenario given above, the row has the $ prefix, hence, it is absolute and will not change but the column alphabet does not and hence, treated as relative.

3 0
3 years ago
Write a Python program that can convert a Fahrenheit temperature to Celsius, or vice versa. The program should use two custom fu
Klio2033 [76]

A Python program that can convert a Fahrenheit temperature to Celsius, or vice versa. The program should use two custom functions, f_to_c and c_to_f, to perform the conversions.

Explanation:

  • Functions should be defined in a custom module named temps. Custom function c_to_f should be a void function defined to take a Celsius temperature as a parameter.
  • It should calculate and print the equivalent Fahrenheit temperature accurate to three decimal places.
  • Custom function f_to_c should be a value-returning function defined to take a Fahrenheit temperature as a parameter.
  • This function should calculate the equivalent Celsius temperature and return it.

The code is given below :

def c_to_f(tempCelsius):

  tempFahrenheit = ((9/5)*tempCelsius) + 32;

  print("\n %.3f Celsius is %.3f Fahrenheit \n" %(tempCelsius, tempFahrenheit));

def f_to_c(tempFahrenheit):

  tempCelsius = (tempFahrenheit - 32) * (5/9);

  return tempCelsius;

(Import modules)

import temps;  

def main():

  temperature = float(input("\n Enter a temperature: "));

  scale = input("\n Was that input Fahrenheit or Celsius c/f? ");

  if scale.lower() == 'c':

      temps.c_to_f(temperature);

  else:

 tempCel = temps.f_to_c(temperature);

      print("\n %.1f Fahrenheit equals %.3f Celsius \n" %(temperature, tempCel));

main();

4 0
3 years ago
If a filesystem has a block size of 4096 bytes, this means that a file comprised of only one byte will still use 4096 bytes of s
mars1129 [50]

Answer:

def calculate_storage(filesize):

   block_size = 4096

   full_blocks = filesize // block_size

   partial_block = filesize % block_size

   if partial_block > 0:

       return (full_blocks + 1) * block_size

   return filesize

print(calculate_storage(1))

print(calculate_storage(4096))

print(calculate_storage(4097))

Explanation:

The python program defines the function 'calculate_storage' that calculates the block storage used. It gets the number of blocks used to store the data by making a floor division to get the integer value, then it checks for remaining spaces in the block. If there are spaces left, it adds one to the full_blocks variable and returns the result of the multiplication of the full_blocks and block_size variables.

8 0
3 years ago
Other questions:
  • Play-e-ball, a company that creates games for gaming consoles, gathers data from the information systems of its partners, suppli
    14·1 answer
  • Why people needs soft skills in the era of high technology.
    13·1 answer
  • List five ways in which the type declaration system of a language such as Java or C differs from the data definition language us
    8·1 answer
  • An aircraft departs an airport in the mountain standard time zone at 1615 MST for a 2-hour 15-minute flight to an airport locate
    14·1 answer
  • What is the inflation rate if the price of a soda was $10 last year, but only $5 this year?
    5·1 answer
  • For as long as you can remember, you've never been able to get a taco on Tuesday at your local taco truck. The lines are always
    8·1 answer
  • Find true or false. A hacker is hacking software with access in sensitive information from your computer​
    9·1 answer
  • Catherine is designing the backup strategy for the new private cloud that her company is implementing. She specifies that a full
    13·1 answer
  • 25% of 60 min<br> 20% of 60 min<br> 33%% of 60 min
    14·1 answer
  • confidentiality ensures that only those with the rights and privileges to access information are able to do so.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!