1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kodGreya [7K]
3 years ago
12

Design a 128KB direct-mapped data cache that uses a 32-bit address and 16 bytes per block. The design consists of two components

: (1) The 32-bit memory address is subdivided into several sections in bits so that each address can map to its cache location (2) The cache itself including the cache storage and other necessary bits in each cache line. Explain your design.

Computers and Technology
1 answer:
Kitty [74]3 years ago
7 0

Answer:

See the attached pictures for detailed answer.

Explanation:

The cache contain 8K number of blocks.each block has 16 Byte worth of data. Each of these bytes are addressable by block offset. Now, each of these blocks are addressable and their address is provided by line offset or set offset. If block number is given in Decimal format then the block to which that block will be mapped is given by expression

mappedToBlock = (bNumber)mod2​​​13

TAG and valid but consititues something called cache controller. TAG holds the physical address information because the TAG in physical address get divided into TAG and line offset in cache address. Valid bit tells status of blocks. If it is 1 then data blocks are referred by CPI else not.

You might be interested in
Which line of code will use the overloaded division operation?
DerKrebs [107]

Answer:

B. result = numA/numB

Explanation:

__truediv__ overloads the / operator in Python. Since that has been defined in the class "num" and numA and numB are both objects of type "num" (numA / numB) will call num.__truediv__ using numA as "self" and numB as "b".

7 0
3 years ago
In cybersecurity, a threat actor is an individual or an entity responsible for cyber incidents against the technical equipment o
Neporo4naja [7]

Script kiddie use automated attack software created by other hackers for access while gray hat hackers create their own attack software to show vulnerabilities.

<h3>The types of threat actors.</h3>

In cybersecurity, there are different types of threat actors and these include the following:

  • Script kiddie
  • Gray hat hacker
  • Hacktivists

One of the ways to differentiate an attack orchestrated by a script kiddie from that of a gray hat hacker is that script kiddie use automated attack software created by other hackers for access while gray hat hackers create their own attack software to show vulnerabilities.

Read more on cybersecurity here: brainly.com/question/14286078

#SPJ1

4 0
2 years ago
Assume the number variable contains the number 1000.
Inga [223]

Answer:

Explanation:

We could get the four options for this particular example, but we must know what happens with the variable number the value 1000.

In this case, we are going to assume four scenarios:

1) n = n - n this is equal to 0

2) n = (n - n) + n = 1000

3) n = n * 2 = 2000

4) n = n * 3 = 3000

These are simple examples, we could get these options in different ways.

5 0
3 years ago
Design a program that will ask the user to enter the amount of a purchase. The program
LUCKY_DIMON [66]

The program is a sequential program, and they do not require loops and conditions

<h3>The program design in Python</h3>

The complete program written in Python is as follows:

purchaseAmount = float(input("Amount: "))

stateSalesTax = 0.05 * purchaseAmount

provincialSalesTax = 0.02 * purchaseAmount

print("Amount:",purchaseAmount)

print("State sales tax:",stateSalesTax)

print("Provincial sales tax:",provincialSalesTax)

print("Total sales tax:",(stateSalesTax + provincialSalesTax))

print("Total sales:",(purchaseAmount + stateSalesTax + provincialSalesTax))

Read more about Python programs at:

brainly.com/question/26497128

#SPJ1

4 0
3 years ago
How can the Internet help our country to be a leader in technology?
BigorU [14]

Answer:

it can help in the aspect of making technologies to be fastly operated with fast internet connection there by it top among all other countries

4 0
3 years ago
Other questions:
  • This one too its from computer engineering
    6·1 answer
  • Java uses ____ to implement method lookup.A) a jump tableB) an inheritance treeC) restricted accessD) polymorphism
    14·1 answer
  • What is the best game of 2020 in pc​
    12·2 answers
  • Which factor helps drive globalization?
    9·1 answer
  • Create the logic for a game that simulates rolling two dice by generating two random numbers between 1 and 6 inclusive. The play
    7·1 answer
  • Write a public static method named evens that takes in 1 argument int a, and returns a String containing all positive even numbe
    8·1 answer
  • Match the feature to its function.
    7·1 answer
  • Consider a computer that uses 5 bits to represent positive integers and uses all 5 bits to represent the value.
    9·1 answer
  • For her presentation on Italy, Matilda used a red background with light green text. When her friend critiqued her presentation,
    12·1 answer
  • Which arcade game, released in 1972, is considered to be the first to be commercially successful?.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!