1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mashutka [201]
3 years ago
7

Suppose we have a byte-addressable computer with a cache that holds 8 blocks of 4 bytes each. Assuming that each memory address

has 8 bits, to which cache block would the hexadecimal address 0x09 map if the computer uses direct mapping?
Computers and Technology
1 answer:
larisa [96]3 years ago
4 0

Answer:

Block 2

Explanation:

Cache mapping is a technique by which the contents of main memory are brought into the cache memory. we have three different types of cache mapping these are; direct, fully associative and k-way set associative mappings. In direct mapping such as the scenario above, the cache has one block in each set, so it is organized into X = Y sets, as such a particular block of main memory can map to only one particular line of the cache and the formula for determining the line number of cache to which a particular block can map is given by (main memory block address) %(number of lines in cache)

You might be interested in
How to turn off microsoft teams message notifications
Andru [333]

Answer:

simply go to settings and turn it off.

Explanation:

i can help you

first tell you use pc or mobilephone

and secondly what type of notifications? message or call or meeting

5 0
3 years ago
The process of bringing data or a file from one program to another is called
lys-0071 [83]
One can transfer data from one database to the other and this is called importing and linking. When importing, one can select the object he or she wants to copy and can control tables being imported and specify the relationship of tables if it would also be transferred.
8 0
3 years ago
Read 2 more answers
Answer is B because portrait is define that they take only photographs of people and like to communicate with people they are we
quester [9]
Ty ive been looking for that answer
5 0
3 years ago
Although saying "Cylinder IS A Circle" doesn't make sense, it can be implemented in Java using inheritance in a legitimate way.
allochka39001 [22]

Answer:

I've included in the codes the area to circle and volume to cylinder. The Volume method that was used, area() to compute, the volume of cylinder which shows that cylinder is an expansion of circle with an extra dimension (height)

Explanation:

Temp is tester class

public class Temp {

   public static void main(String[] args) {

       Circle c = new Circle(7);

       System.out.println("Area of circle with radius 7 is "+c.area());

       Cylinder c1 = new Cylinder(7,10);

       System.out.println("Cylinder volume with radius 7 and height 10: "+c1.volume());

   }

}

----------------------------------------------------------------------------------------------------

class Circle{

   int radius;

   Circle(int r){

       radius=r;

   }

   double area(){  //area of circle

       return 3.14*radius*radius;

   }

   public int getRadius() {

       return radius;

   }

   public void setRadius(int radius) {

       this.radius = radius;

   }

}

class Cylinder extends Circle{

   int height;

   Cylinder(int r, int h){

       super(r);

       height=h;

   }

   double volume(){  //volume of cylinder

       return area()*height;

   }

   public int getHeight() {  //accessor

       return height;

   }

   public void setHeight(int height) {  //mutator

       this.height = height;

   }

}

8 0
4 years ago
What is the difference between internet and intranet​
Elenna [48]

Answer:

The Internet is a globally-connected network of computers that enables people to share information and communicate with each other. An intranet, is a local or restricted network that enables people to store, organize, and share information within an organization.

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • Colleen is creating a document with two minimal paragraphs of text comparing two business models for her company. She decides to
    14·2 answers
  • What practices will help you avoid sending out e-mail to the wrong person?
    15·1 answer
  • Employers will check you out on social media sites like Facebook, MySpace, and Twitter.
    6·2 answers
  • Given the following HTML form snippet of markup, which of the following user inputs would meet the regular expression rule writt
    7·1 answer
  • Which type of microphone uses two metal plates?
    7·1 answer
  • 2. Write a standalone function partyVolume() that takes accepts one argument, a string containing the name of a file. The object
    14·1 answer
  • Create an application named StudentsStanding.java that allows you to enter student data that consists of an ID number, first nam
    12·1 answer
  • A program execution is called ​
    15·1 answer
  • 2. What is software conflict?<br>​
    11·1 answer
  • Choosing a per_formatted presentation that already has a design and the slots is called choosing What​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!