1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vladimir1956 [14]
3 years ago
14

A 64-bit word computer employs a 128KB cache. The address bus in this system is 32-bits. Determine the number of bits in each fi

eld of the memory address register (MAR) as seen by cache in the following organizations (show your calculations): A. Fully associative mapping with line size of 4 words. B. Direct mapping with the line size of 8 words. C. 2-way set associated mapping with the line size of 4 words. D. 8-way set associated mapping with the line size of 2 words.
Computers and Technology
1 answer:
defon3 years ago
5 0

Answer: provided in the explanation segment

Explanation:

taking a step by step process for this, we will analyze this problem,

we have that the Word size = 8 bytes

Cache size = 128 KB = 128×2¹⁰ bytes = 2¹⁷ bytes

(a). we are asked to cal for fully associative mapping with line size of  4 words.

  • fully associative mapping with line size of  4 words = 4 × 8 = 32 bytes
  • offset = log₂³² = 5 bit
  • tag = 32 - (5+0) = 27 bit
  • index bit = 0

(b). Direct mapping with the line size of 8 words:

  • here  the line size = 8×8 = 64 bytes
  • no of lines = 2¹⁷/2⁶ = 2¹¹ lines
  • offset = log ₂(2⁶) = 6 bit
  • index = log ₂(2¹¹) = 11 bit
  • tag = 32 - (5 +11) = 15 bit

(c). 2-way set associated mapping with the line size of 1 word:

  • no of lines = 2¹⁷/2³ = 2¹⁴ lines
  • offset = log₂(2³) = 3 bit
  • no of sets = 2¹⁴/2 = 2¹³ sets
  • index = log₂(2¹³) = 13 bit
  • tag = 32 - (3+13) = 16 bit

(d). 8-way set associated mapping with the line size of 2 words:

8-way set associated mapping with the line size of 2 = 2*8 = 16  bytes

  • no of lines = 2¹⁷/2⁴ = 2¹³ lines
  • no of sets = 2¹³/2³ = 2¹⁰ sets
  • offset = log₂¹⁶ = 4 bit
  • index = log ₂(2¹⁰) = 10 bit
  • tag = 32 - (4+10) = 18 bit

cheers i hope this helps!!!!

You might be interested in
Write an expression that evaluates to 1 more than the value in the location pointed to by the integer pointer variable ip. Thus,
kompoz [17]
*ip+1
ip is a pointer to int
*ip is that   int   so *ip+1 is the value at ip  plus 1
6 0
3 years ago
Nowadays, most online discussion boards are on Web-based forums that provide a variety of user-friendly tools to create and post
Katyanochek1 [597]

Answer:

The correct answer to the following question is option e.) Usenet.

Explanation:

Usenet - it  is a collection of the user-submitted messages or notes on the various subject that posted to the servers on the worldwide network. Each of the subject collection of notes is known as newsgroups. There are thousands of the newsgroups which is possible for us to form the new one.

It works like the decentralized computer network which allows us to download our required files. We can also download and access the binary files along with the text post.

5 0
3 years ago
What are some examples of environmental technology
Zarrin [17]
Some examples of environmental technology is recycling.
3 0
3 years ago
Imagine that you are a professional white hat hacker, testing a company’s system to make sure they are ready for attacks. What m
liberstina [14]

Answer:

A white hat hacker, or ethical hacker, uses penetration testing techniques to test an organization's information technology

Explanation:

3 0
2 years ago
Fungsi radio adalah..?
malfutka [58]

Answer:

lebih lanjut bahwa radio mempunyai fungsi sebagaimana media- media lain yaitu memberikan informasi/to inform, memberikan pendidikan/to educate, memberikan hiburan/to intertain, fungsi memengaruhi/to influence, dan fungsi pengawasan to control.

<h2>translate;</h2>

Furthermore, radio has a function like other media, namely to provide information/to inform, provide education/to educate, provide entertainment/to intertain, function to influence/to influence, and control function to contact.

Explanation:

8 0
2 years ago
Other questions:
  • How does the team know what to work upon during the iteration
    6·1 answer
  • Please help with this
    5·2 answers
  • Reggie has hired you to design a home network. The home network will share a printer but will mainly be used to stream movies to
    7·1 answer
  • In which phase of the software development process would probing questions be used to verify the problem definition?
    12·1 answer
  • In which of the following situations will a macro make your work more efficient?
    9·1 answer
  • What devices gives input​
    5·1 answer
  • User defined blocks of code can be created in
    13·1 answer
  • What is an advantage of storing data in a Data Lake, without applying a specific schema to it initially?
    10·1 answer
  • Which of the following is NOT one of the three main ways to control a program when writing code?
    6·2 answers
  • I need to send this in ASAP
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!