1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dovator [93]
3 years ago
9

Here is a series of address references given as word addresses: 2, 3, 11, 16, 21, 13, 64, 48, 19, 11, 3, 22, 4, 27, 6, and 11. A

ssuming a direct-mapped cache with 16 one-word blocks that is initially empty, label each reference in the list as a hit or a miss and show the final contents of the cache. Cache Cl is direct mapped with 16 one-word blocks. Cache C2 is direct mapped with 4 four-word blocks. Assume that the miss penalty for Cl is 8 memory bus clock cycles and the miss penalty for C2 is 11 memory bus clock cycles. Assuming that the caches are initially empty, find a reference string for which C2 has a lower miss rate but spends more memory bus clock cycles on cache misses than Cl. Use word addresses.

Computers and Technology
1 answer:
Allisa [31]3 years ago
4 0

Answer:

Explanation:

kindly check the attachment for better explanation to the answer

You might be interested in
Software piracy can be described as
Klio2033 [76]
Yes
Because the picture is the answer

3 0
2 years ago
Create the logic for a game that simulates rolling two dice by generating two random numbers between 1 and 6 inclusive. The play
guajiro [1.7K]

Answer:

The solution code is written in Python 3.

  1. import random  
  2. count = 0
  3. flag = False
  4. guess = int(input("Input your guess (2-12): "))
  5. while(count <=3):
  6.    dice1 = random.randint(1, 7)
  7.    dice2 = random.randint(1, 7)
  8.    if((dice1 + dice2) == guess):
  9.        flag = True
  10.    count += 1
  11.    
  12. if(flag):
  13.    print("User wins!")
  14. else:
  15.    print("Computer wins!")

Explanation:

A Random generator is needed for this question and therefore we start by importing Python random class (Line 1)

Next, create one counter variable,<em> count</em>, to ensure there will be only three rolling of the dices (Line 3).  We need another variable, <em>flag</em>, to track the status if the two dices equal to the <em>guess</em> number chosen by user (Line 4).

Next, prompt use to input a guess number (Line 5).

Within the while loop, we can use random class method <em>randint() to </em>generate random integer. The arguments 1 and 7 will give one random number ranged from 1 to 6 for <em>dice1</em> and<em> dice2</em>, respectively (Line 8 - 9).

If the total of<em> dice1 + dice2</em> equal to user <em>guess</em>, we turn the<em> flag </em>to <em>True</em>. If not, the <em>flag </em>will remain <em>False</em> after completing entire while loop.

If the <em>flag </em>turned to <em>True</em>, print the message "User Wins!" else print the message ("Computer wins!")

8 0
4 years ago
I NEED HELP ASAP!!!!!! IM IN THE MIDDLE OF A QUIZ!!!! Why did the film industry agree to set standards for film production?
Pani-rosa [81]

Answer:

My guess is "It was cheaper to follow standards than having to guess what audiences wanted."

Explanation:

Not 100% but I tRiEd

5 0
3 years ago
Is nanotechnology is good or bad? and why?
LenKa [72]

Answer:

Nanoparticles do hold out much environmental promise. The same reactivity that makes them harmful in the body also means they can break down dangerous chemicals in toxic waste – or anywhere, for that matter. And their use in electronics drastically reduces power demand, which could cut greenhouse gases.

6 0
3 years ago
Read 2 more answers
On Study Island, What do I do when the numbers don't show up?
mafiozo [28]
Try restarting your laptop
8 0
3 years ago
Read 2 more answers
Other questions:
  • Analyze the following network traffic logs depicting communications between Computer1 and Computer2 on opposite sides of a route
    12·1 answer
  • A _____ network security application that Prevents access between a private and trusted network and other untrusted networks
    9·1 answer
  • What is unique about the TODAY and NOW functions?
    15·2 answers
  • Imagine you were trying to explain the Russian hacking incident to a child (around 10 years of age) and why it was unethical. Cr
    6·1 answer
  • Seneca has just applied conditional formatting and realizes that she has made a mistake. Which action should she take to fix the
    12·2 answers
  • …….. and ……...are called binary digits. (Computer Science)
    13·2 answers
  • there is a structure called employee that holds information like employee code, name, date of joining. Write a program to create
    13·1 answer
  • Revisa un manual o instructivo de las maquinas o aparatos tecnologicos que tengas en tu casa. Luego, trata de encontrar algunas
    9·1 answer
  • The CUBE extension enables you to get a subtotal for each column listed in the expression, in addition to a grand total for the
    11·1 answer
  • The firewall protects a computer or network from network-based attacks along with _____________ of data packets traversing the n
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!