1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nikitich [7]
3 years ago
14

A direct-mapped cache holds 64KB of useful data (not including tag or control bits). Assuming that the block size is 32-byte and

the address is 32-bit, find the number of bits needed for tag, index, and byte select fields of the address.
Computers and Technology
1 answer:
Cerrena [4.2K]3 years ago
5 0

Answer:

A) Number of bits for byte = 6 bits

B) number of bits for index = 17 bits

C) number of bits for tag = 15 bits

Explanation:

Given data :

cache size = 64 kB

block size = 32 -byte

block address = 32 -bit

number of blocks in cache memory  

cache size / block size = 64 kb / 32 b = 2^11 hence the number of blocks in cache memory = 11 bits = block offset

A) Number of bits for byte

log _{2} (6)^2 = 6  bits

B) number of bits for index

block offset + byte number

= 11 + 6 = 17 bits

c ) number of bits for tag

= 32 - number of bits for index

= 32 - 17 = 15 bits

You might be interested in
You are the network administrator for a small organization of 100 users. Users till now were freely browsing the Internet. You w
Schach [20]

Answer: Proxy server

Explanation: Proxy server is a type of server that is acts as interface between the network on huge scale and any local network. This server provides the feature of security, operations, privacy etc in the network system. They also help in improving the performance of the network.

It can work as the web filter to eliminate the unwanted websites.They acts as the gateway by  observing the website that is being browsed by the other user.Thus installation of proxy server should implemented on the organization.

8 0
3 years ago
Thiết kế biểu đồ thực thể liên kết và tập lược đồ cơ sở dữ liệu quan hệ cho các bài toán quản lý sau:
Paladinen [302]

Answer:

sorry please write in English than i help.you i don't understand your language

3 0
2 years ago
Whats the best strategy for avoiding ATM fees?
natulia [17]
You hack the atm that's how
3 0
3 years ago
Read 2 more answers
The responsibilities of the IT department and the needs of the user departments may cause conflicts over A. the color of the use
monitta

I'd say B: the amount and type of security placed on an application.

This is a common problem that exists between IT and other user departments. The IT department is well known for closing up certain sites and applications needed by other departments all in the name of security. As a result, it might slow down operations within different department and may cause inefficiency.

4 0
3 years ago
The ________ coordinates the flow of data and information through the computer system by coordinating the hardware, software, us
Irina-Kira [14]

Answer:

Operating System.

Explanation:

All the properties listed in the question are handled by the Operating system.

Operating system:-It is a software that manages the computer hardware,provides common services for the programs of the computer and software resources.

Some of the most popular operating systems are as following:-

  1. Microsoft Windows.
  2. Apple MACOS
  3. Linux.

There are also other operating systems present out there these are some of the mostly used OS's.

8 0
3 years ago
Other questions:
  • 1. Write the name of the tab, command group, and icon that is used to sort information in a Word document.
    12·2 answers
  • 1. Grouping Data in a Pivot Table can help you do what?
    5·1 answer
  • "2. what are the advantages and disadvantages of using the serial console connection compared to the usb console connection to a
    15·1 answer
  • You are the network administrator for Slimjim, a peripheral device company. The network uses Linux, and you need information on
    10·1 answer
  • Which of the following is a form of security protection that protects individual files by scrambling the contents in such a way
    14·1 answer
  • How to write a program to draw 1000 random points on a frame in python language for coding?
    13·1 answer
  • Woah my favorite character got arrested
    10·2 answers
  • Why would it be hard to find the ideal CO2 level if the light intensity were very low?
    9·1 answer
  • Write a function called has_duplicates that takes a string parameter and returns True if the string has any repeated characters.
    7·1 answer
  • When adding a component to a container with the ____ layout, specify the NORTH, EAST, SOUTH, WEST, or CENTER position.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!