1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gemiola [76]
3 years ago
11

For the following questions, consider a paged memory system that has a physical main memory size of 32KB (215) and a page frame

size of 8KB (213). Consider a process P whose logical address space is 64KB (216). Important Note: If an answer requires an exponent, use the ^ character. For example: 216 would be entered as 2^16.
Computers and Technology
1 answer:
dlinn [17]3 years ago
7 0

Complete Question

For the following questions, consider a paged memory system that has a physical main memory size of 32KB (215) and a page frame size of 8KB (213). Consider a process P whose logical address space is 64KB (216). Important Note: If an answer requires an exponent, use the ^ character. For example: 216 would be entered as 2^16.

Question 1: How many physical page frames are there in the above paged memory system? ________(Your answer should be in exponential form)

How many bits are needed to represent a physical page frame number in the system? ____________

Question 2: How many logical pages are there for P? _____________(Your answer should be in exponential form. )

How many bits are needed to represent a logical page number for P? _____________

Answer:

1a) The number of physical page frames in the  paged memory system = 2⁵

1b) The number of bits that can be used to represent the physical page frame = 5 bits

2a) Number of logical pages = 2³

2b) Number of logical frame bits = 3 bits

Explanation:

Size of physical main memory = 32 kB = 2¹⁵

Space for Logical address = 64 KB = 2¹⁶

Page frame size = 8 KB = 2¹³

1a) The number of physical page frames in the  paged memory system

Number of page frames = physical main memory size / page frame size

 Number of page frames  = 2¹⁵ / 2¹³

Number of page frames = 2⁵

1b)The number of bits that can be used to represent the physical page frame

physical memory size = log2(2²⁰) = 20 bits.

Offset bits = log2(2¹⁵)  = 15 bits

Frame bits = physical memory size – offset bits

Frame bits = 20 – 15

Frame bits = 5 bits

2a)  Number of logical pages = logical address space / page frame size

Number of logical pages = 2¹⁶/2¹³

Number of logical pages = 2³

2b) Logical address space = log2(2¹⁶) = 16 bits

Offset bits = log2(2¹³)

Offset bits = 13 bits

Frame bits = logical address space bits – offset bits

Frame bits   = 16 – 13

Frame bits  = 3 bits

You might be interested in
We are committed to creating and cultivating a graduate and postdoctoral community that values and respects individuals, regardl
kykrilka [37]

Answer:

I will contribute to enhance the academic, cultural, and intellectual environment for graduate students and postdoctoral at the University of Connecticut in the following ways:

  • Participating in events.
  • Establishing importance for cultural environment.
  • Informing people by conducting social seminars.
  • Picturing the benefits of academic environment.

Explanation:

Following is the explanation for each of the steps stated above.

      1. Participating in events:

                       All students must be guided to participate and perform in the events conducted. These guidelines should be made mandatory for each pupil to follow so that they may be aware of benefits of the events by being social.

      2. Establishing importance for cultural environment:

                   Cultural festivals should be arranged by the universities so that the importance of such events could be realized by the students. Rules and regulation must be followed by each student so that a cultural environment may be established.

      3. Informing people by conducting social seminars:

                  Introductory seminars play an important role in changing the minds and thoughts of the students and social members. So in order to make society a best place it is necessary to make people aware of morals of society. Therefore conducting seminars is a key to good moral awareness.

       4. Picturing the benefits of academic environment:

                      Each student must know about the benefits of keeping interests in academic. In order to built an academic environment among the universities it is better to picture the future aspects and benefits o such interests so that the pupils keep believe on the academic interests by heart.

<h3>I hope it will help you!</h3>

                       

3 0
4 years ago
When using NAND gate instead of NOR gate in SR flip-flop, Q and Q’ both become one when?
Anika [276]

Answer:

  S and R both are 0

Explanation:

A <em>0</em> at the input of a NAND gate causes its output to be <em>1</em>. There is no other logic between the output NAND gate and the S or R inputs, so both inputs 0 will make both outputs 1.

4 0
4 years ago
The purpose of the ________ element is used to configure the headings for a web page document or section of a web page document.
Vesnalui [34]
The answer would be "Inspect"
7 0
4 years ago
____________ is demonstrated by the processes and procedures that an organization uses to meet the law.A. An auditB. SecurityC.
Feliz [49]

Answer:

D

Explanation:

because it is a administrative procedure

3 0
3 years ago
Read 2 more answers
oe, a user, receives an email from a popular video streaming website. the email urges him to renew his membership. the message a
ale4655 [162]

Where Joe, a user, receives an email from a popular video-streaming website and the email urges him to renew his membership. If the message appears official, but Joe has never had a membership before, and if when Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL, note that the security threat that this describes is: "Phishing" (Option B)

<h3>What is Phishing?</h3>

Phishing is a sort of social engineering in which an attacker sends a fake communication in order to fool a person into disclosing sensitive data to the perpetrator or to install harmful software, such as ransomware, on the victim's infrastructure.

To avoid phishing attacks, make sure you:

  • understand what a phishing scheme looks like
  • Please do not click on that link.
  • Get anti-phishing add-ons for free.
  • Don't provide your information to an untrusted website.
  • Regularly change passwords.
  • Don't disregard those updates.
  • Set up firewalls.
  • Don't give in to those pop-ups.

Learn more about Phishing:
brainly.com/question/23021587
#SPJ1

Full Question:

Joe, a user, receives an email from a popular video streaming website. The email urges him to renew his membership. The message appears official, but Joe has never had a membership before. When Joe looks closer, he discovers that a hyperlink in the email points to a suspicious URL.

Which of the following security threats does this describe?

  • Trojan
  • Phishing
  • Man-in-the-middle
  • Zero-day attack
5 0
2 years ago
Other questions:
  • Which of the following statements is true?a. Old paper documents, which were previously only available offline, are increasingly
    10·1 answer
  • Forms are used to a provide a more user-friendly way to work with data in tables
    14·1 answer
  • The ____ of an identifier refers to where in the program an identifier is accessible (visible).
    10·1 answer
  • As text is typed in the _____ text box, a drop-down list displays options for completing the action, displaying information on t
    11·1 answer
  • Steve adds a second 1-GB 240-pin DIMM to his PC, which should bring the total RAM in the system up to 2 GB. The PC has an Intel
    14·1 answer
  • If you want to code a method that can only be called from the class that the method is in, you code ____________________ as the
    15·2 answers
  • Which changes should be made to establish and maintain formal writing conventions? Select two options.
    10·1 answer
  • A junior network administrator tells you that he can ping a DNS server successfully using its IP address, but he has not tested
    11·1 answer
  • In this lab, you open a file and read input from that file in a prewritten C program. The program should read and print the name
    5·1 answer
  • What relationship do MP3s and MP3 players have with video files?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!