1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
scoundrel [369]
3 years ago
8

. Here is a sequence of addresses during execution of some program: 4, 16, 0, 20, 52, 68, 172, 64 Assuming a fully associative c

ache with 8 bytes per blocks and 4 entries, initially empty: a. Provide the cache layout (as on Slide H47 excluding gates, multiplexers and comparators, assume 4-byte data) and address format (assume 16-bit address) b. Label each reference in the string as a hit or a miss. c. Show content of the cache at the end. If needed use LRU replacement policy.

Computers and Technology
1 answer:
k0ka [10]3 years ago
6 0

Answer:

See explaination for the illustrations on the question.

Explanation:

A program cache miss usually occurs at the instance of an instruction fetch failing to read an instruction from the program cache and the processor is required to access the instruction from the next level of memory. A request to L2 or external memory has a much higher latency than an access from the first level instruction cache.

A cache on its own can be defined as is a hardware cache used by the central processing unit (CPU) of a computer to reduce the average cost (time or energy) to access data from the main memory.

Please kindly check attachment for the step by step diagramming illustrations of the questions.

You might be interested in
2. Define a function squareArea that computes the area of a square given side length
Alenkasestr [34]

Code:

def squareArea(length):

 return length**2

Hope this helps :)

4 0
3 years ago
Which software development team memeber is responsible for the timeline and budget
Sliva [168]

Answer:

The Project Manager

Explanation:

This person's job is to manage the project budget and map out how much time would be spent on each phase. Also his/her job is to ensure that all deliverables and on time.

7 0
3 years ago
Which Internet security risk is associated with dumpster diving?
lora16 [44]

Which Internet security risk is associated with dumpster diving? Identity theft. Identity theft is associated with dumpster diving because it involves taking something from someone else. In this case, instead of looking through a dumpster to get items that were someone elses, they are taking their identity and using it for their own purposes. So identity theft and dumpster diving relate when used in this context.

3 0
4 years ago
Read 2 more answers
Where are some places that cyberbullying occurs? check all that apply
antiseptic1488 [7]

Answer:

social media like  snap chat twitter  and face book .it can even happen over email.or in school chats.

Explanation:

5 0
4 years ago
Read 2 more answers
In every programming language, when you access data stored in an array, you must use a ____ containing a value that accesses mem
Mariulka [41]
An array is an indexed collection of data elements. First you must declare an array, give its name and data. <span>Once your arrays are declared, you access the elements in an array with the array name, and the index number inside brackets [ ].
So, in every </span><span>programming language, when you access data stored in an array, you must use a command [] (brackets) containing a value that accesses memory occupied by the array.</span>
4 0
3 years ago
Other questions:
  • The English (or Shakespearean) sonnet form includes three quatrains and a couplet two quatrains and a couplet two quatrains and
    15·1 answer
  • Which spereadsheet type will determine<br> how well a bussiness has done over the past year
    11·1 answer
  • Using the slice operator, print your first, then last name.2. Print the length of your first name.3. Assume you have two variabl
    6·1 answer
  • Using the drop-down menus, correctly complete the sentences.
    5·2 answers
  • Five batch jobs. A through E, arrive at a computer center at almost the same time. They hav e estimated running times of 10, 6,
    14·1 answer
  • 40 is 20 % percent of what?​
    9·1 answer
  • If you are interested in working for a specific company, what type of job site should you look at for opening?
    15·2 answers
  • Network footprinting is used to ______________________. Group of answer choices test for vulnerabilities determine what services
    12·1 answer
  • Computer science - algorithms - flowcharts
    11·1 answer
  • Which of the four factors of production are hit the hardest when high unemployment occurs ?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!