1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kicyunya [14]
3 years ago
7

A cache has been designed such that it has 512 lines, with each line or block containing 8 words. Identify the line number, tag,

and word position for the 20-bit address 94EA616 using the direct mapping method.
Computers and Technology
1 answer:
Reptile [31]3 years ago
8 0

Answer:

Given address = 94EA6_{16}

tag = 0 * 94  ( 10010100 )

line = 0 * 1 D 4 ( 111010100 )

word position = 0*6 ( 110 )

Explanation:

using the direct mapping method

Number of lines = 512

block size = 8 words

word offset = log ^{8} _{2}  = 3 bit

index bit = log^{512}_{2}  = 9 bit

Tag = 20 - ( index bit + word offset ) = 20 - ( 3+9) = 8 bit

Given address = 94EA6_{16}

tag = 0 * 94  ( 10010100 )

line = 0 * 1 D 4 ( 111010100 )

word position = 0*6 ( 110 )

You might be interested in
The file format is used for graphic files.
Vesna [10]

Answer:

.GIF

Explanation:

GIF or Graphics Interchange Format files are widely used for web graphics, because they are limited to only 256 colors, can allow for transparency, and can be animated. GIF files are typically small is size and are very portable.

8 0
2 years ago
An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this
jarptica [38.1K]

Answer:

privilege escalation.

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list (ACL) primarily is composed of a set of permissions and operations associated with a user account or new technology file system (NTFS) file such as full control, read only, write, read and execute and modify.

In this scenario, an attacker or hacker was able to obtain the logon credentials for a regular user on your network. Thus, the type of security threat which exists if this user account is used by the attacker or hacker to perform administrative functions is privilege escalation.

Privilege escalation can be defined as a network or security threat which involves the exploitation of a design flaw, bug or unsecured configuration settings in a software program (application), operating system (OS), computer system, etc., so as to have an unauthorized access and gain more permissions, elevated rights or privileges that are normally protected from a user account or software program.

Hence, when an attacker or malicious user such as a hacker gains an unauthorized access to the privileges of another user account beyond what is intended or entitled to a user, it is known as privilege escalation.

6 0
3 years ago
Generally, what is the term for storage locations in a processor?
oksano4ka [1.4K]

Answer: Registers

Explanation:

Registers are small storage locations identified by different types of registers. The function of the register is to provide data for immediate processing to the CPU. These registers hold data temporarily and provide easy access of data to the processor.

6 0
3 years ago
Give several reasons why Python is such a great programming language. Explain how Python is related to flowcharts. (students mak
Mekhanik [1.2K]

It is great but that's really it.

Don't get me wrong I adore Python, no complications, pure simplicity, wonderful community. But for any larger project that will be scaled I'd never use it. It's slow (mostly because of GIL) and gets pretty hard to organise once you have thousands of .py files but it's still a great language (my first one) when doing quick prototyping, personal projects, learning and it's also AI de facto programming language because of its readability works as a glue with AI.

It's related to flowchart in a way we write algorithms, for eg. in python we rarely use counter in for loop the inverse is thus C++ where most for loops are for loops not for each loops.

Hope this helps.

3 0
3 years ago
Please help me with these questions please
ki77a [65]

Answer:

The answer is 20, if this helps you please give the brainliest award.

4 0
2 years ago
Other questions:
  • Consider a set of mobile computing clients in a certain town who each
    13·1 answer
  • Of the two basic methods of data entry, keyboards use keystrokes to enter data and instructions; what is the nonkeyboard method
    7·1 answer
  • You type. The word "weather" when you ment "whether" when will the writer or word flag this as a misspelling or a grammar proble
    13·1 answer
  • Write a program that has the following String variables: firstName, middleName, and lastName. Initialize these with your first,
    7·1 answer
  • Complete method printPopcornTime(), with int parameter bagOunces, and void return type. If bagOunces is less than 2, print "Too
    5·1 answer
  • What's the drawback of using Screened Subnet (DMZ)?
    12·1 answer
  • What lets you do many things, like write book reports and stories?
    5·1 answer
  • Briefly explain what are JavaScript librairies​
    12·1 answer
  • 9. "मेरे तो गिरधर गोपाल, दूसरो ना कोई
    5·1 answer
  • Ok i dont wanna get bannddddddd so i have to ask a qustion<br> 2 plus 2
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!