1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kicyunya [14]
4 years ago
7

A cache has been designed such that it has 512 lines, with each line or block containing 8 words. Identify the line number, tag,

and word position for the 20-bit address 94EA616 using the direct mapping method.
Computers and Technology
1 answer:
Reptile [31]4 years ago
8 0

Answer:

Given address = 94EA6_{16}

tag = 0 * 94  ( 10010100 )

line = 0 * 1 D 4 ( 111010100 )

word position = 0*6 ( 110 )

Explanation:

using the direct mapping method

Number of lines = 512

block size = 8 words

word offset = log ^{8} _{2}  = 3 bit

index bit = log^{512}_{2}  = 9 bit

Tag = 20 - ( index bit + word offset ) = 20 - ( 3+9) = 8 bit

Given address = 94EA6_{16}

tag = 0 * 94  ( 10010100 )

line = 0 * 1 D 4 ( 111010100 )

word position = 0*6 ( 110 )

You might be interested in
MICR is an input or output devices
Nataly [62]

Explanation:

If a device is putting data into the computer in the form of text, sound, images, button presses etc. then it is an input device, if the device is outputting things from the computer such as sound, movement, printing, images etc., then it is an output device. ... Therefore it is an input device.

8 0
3 years ago
A chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the
nataly862011 [7]

Answer:

The correct answer is option (D) Identify the impact on safety of the property

Explanation:

Solution

In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.

Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take  away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is  doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.

Example of property can be software, equipment, facilities, company’s assets.

4 0
3 years ago
Jim maintains attendance records for his employees for the year. Row B includes the dates of attendance, and column A includes t
ahrayia [7]
To lock multiple rows (starting with row 1), select the row below the last row you want frozen, choose the View tab, and then click Freeze Panes. To lock multiple columns, select the column to the right of the last column you want frozen, choose the View tab, and then click Freeze Panes<span>.


I hope my answer has come to your help. Thank you for posting your question here in Brainly. We hope to answer more of your questions and inquiries soon. Have a nice day ahead!
</span>
4 0
4 years ago
Read 2 more answers
To increase security on your company's internal network, the administrator has disabled as many ports as possible. Now, however,
tia_tia [17]

Answer: 443

Explanation:

Port 443 will need to be enabled for secure transactions to go through because it is the default port for HTTPS which is the transfer protocol for secure communication.

This way your credit card transactions will be encrypted to ensure protection from those who would seek to steal your data and your money.  

8 0
3 years ago
You have repaired a broken LCD panel in a laptop computer. However, when you disassembled the laptop, you bent the hinge on the
Romashka-Z-Leto [24]

Answer:

Listen carefully to the customer and avoid getting defensive or even offensive.

Explanation:

The customer have every right to be angry since he might be ignorant of the work done and only act base on what he sees. In this scenario you need to listen carefully to his complain avoid been defensive and also avoid getting him/her more angry by been offensive. after he has laid out his complain you can then go ahead to explain why it is necessary to bend the hinge on the lid.

5 0
3 years ago
Other questions:
  • A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's p
    9·1 answer
  • What is the difference in adware and spyware
    11·2 answers
  • What is a characteristic of high-level computer programming languages?
    8·1 answer
  • A Windows user has been successfully saving documents to the file server all morning. However, the latest attempt resulted in th
    9·2 answers
  • If you want to go directly to a specific web page using a URL, where should you type the URL in Firefox?
    14·2 answers
  • In this lab, you will use all of the graphics commands you have learned to create an animated scene. Your program should have a
    10·1 answer
  • Zahra's softball team needs money for team T-shirts. The coach makes some fundraising suggestions, while team members brainstorm
    5·2 answers
  • You need to design online to form in which users have to type their name and password to log into an application. The password c
    6·1 answer
  • A user calls to complain that her computer is behaving erratically. Some days it functions correctly, and other days, it crashes
    15·1 answer
  • Moving images of real event​
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!