1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nitella [24]
3 years ago
8

Given a Fully Associative cache with 4 lines using LRU replacement. The word size is one byte, there is one word per block, and

the main memory capacity is 16 bytes. Suppose the cache is initially empty and then the following addresses are accessed in the order listed: {3,4,3,7,7,12,4,8,3,12,7,9}.
Computers and Technology
1 answer:
uranmaximum [27]3 years ago
8 0

Answer:

3 bits

Explanation:

Capacity of main memory=16 Bytes=24

The number of address bits= 4 bits.

The size of the word= 1 Byte=20

The word bits=0.

Number of lines =4

Number of sets required=21

The sets bits is =1

The number of offset bits=20=0

Number of tag bits= total number of address bits - (word bits + offset bits + set bits)

= 4 - 0 -0- 1

= 3 bits

You might be interested in
If you copy and paste from someone else's document (such as a website, a friend's paper, an instructor's solutions manual, etc.)
zzz [600]

Answer:

Deliberate

Explanation:

Plagiarizing means when some one copy the content of any topic from the sources i.e website, solutions manual, friend manual. And if some one check the solutions and find it that it was copied from somewhere the same we termed as plagiarizing.

In the given situation, if someone copying the content from someone else document so it would be called as deliberate plagiarizing

And if someone did not have any idea about it so we called accidental plagiarizing

8 0
3 years ago
You are looking for a backup that copies only the files that have changes since the last full backup. Which of the following wil
adelina 88 [10]

Answer: d. incremental backup

Explanation:

In incremental backup it copies only the files that have changed since the last full backup. It does not backup all the files just like the full backup. it however backup those copies into the  system which has changed since the last backup.

In doing  so it just increases the efficiency and performance of the backup procedure. This process is basically preferred when the amount of file to be backup is huge and there is not enough time to do a full backup.

Increment backup also use less disk space.

Cloud backup uses most increment backup for its application.

6 0
3 years ago
Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key
HACTEHA [7]

Answer:

No. This is not more secure.

Explanation:

this is not more secure than having all of Carol, bob and Alice having the same key.

alice would be able to know Carol's key for her to be able to verify the answer Carol gave to a challenge by her. she would also have to know bob's key to do the same.

any of these 3 would have to know someone else's secret key to verify answers to any challenge.

the challenge is to know the secret keys if the other two and if done, decryption can easily be done and they can impersonate.

8 0
3 years ago
Coordinate with
Lunna [17]

Answer:

First blank: producer

Second blank: Hairdressers

5 0
3 years ago
the outline view allows you to control how much information you can see in a document, because you can expand or collapse sectio
pochemuha
I believe its true because you can expand or collapse sections of it
5 0
3 years ago
Other questions:
  • Which statement is true regarding the Quick Access toolbar?
    11·2 answers
  • How can you clean out the scales in an electric iron without taking the iron apart? A. By rinsing the tank and holes with a wate
    12·2 answers
  • Put the following five steps in the order in which you would perform them to use the Paste Special function. 1. Select and copy
    6·1 answer
  • A network technician is tasked with designing a firewall to improve security for an existing FTP server that is on the company n
    9·1 answer
  • Please help me. Adnan also wants to add a photograph of a bridge. It is on another PowerPoint presentation that is open in a dif
    11·1 answer
  • How to improve a poor game design puzzles
    11·1 answer
  • Describe in detail what each step would look like if you ran into a software error.
    7·1 answer
  • Um ok that makes sooo much sence
    11·2 answers
  • You want a cable that could be used as a bus segment for your office network. The cable should also be able to support up to 100
    5·1 answer
  • How to be gud at Friday night funk
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!