1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rzqust [24]
4 years ago
12

Assume the system with 256B memory and 64B cache and the block size of 16 bytes. I.e., there are 4 blocks in the cache.

Computers and Technology
1 answer:
Arada [10]4 years ago
6 0

Answer:

a. 100%

b. 50%

c. 66.6%

Explanation:

a.

The memory references D6, 58, D8, 9A, DE and 5C all results in misses and the miss ratio is 100 (that is , 6 misses/ 6 references*100 = 100%)

b.

If fully associative cache is used, there will be a 3 cache misses with miss ratio of (3/6*100) = 50%.

c.

With a 2-way set-associative cache, 4 memory reference misses will occur, with a miss ratio of (4/6*100)= 66.6% misses.

You might be interested in
Which alignment aligns text to the left and right side margins?
FrozenT [24]

Answer:

I have the same question but a little different I’m sorry that this is useless to you question but it’s not letting me ask my question. Sorry again-

Explanation:

What is a software system designed to locate information on the World Wide Web? Search browser Search engine Search keyword Search results

5 0
3 years ago
In Java please.
Marizza181 [45]

Answer:

See explaination

Explanation:

public class YearToAnimal {

static void yearToAnimalZodiac(int year){

String[] animals = {"Rat", "Ox", "Tiger", "Rabbit", "Dragon", "Snake", "Horse", "Goat", "Monkey", "Rooster", "Dog", "Pig"};

int baseYear = 2020;

int index = (year - baseYear) % 12;

// in case of negative index, change it to positive

if(index < 0)

index = 12 + index;

System.out.println(year + ": " + animals[index]);

}

// some test cases

public static void main(String[] args) {

yearToAnimalZodiac(2020);

yearToAnimalZodiac(2021);

yearToAnimalZodiac(2019);

yearToAnimalZodiac(2009);

yearToAnimalZodiac(2008);

yearToAnimalZodiac(2007);

}

}

7 0
3 years ago
Timothy is a multimedia designer. He needs to create a prototype of a new product that his firm is launching. Which multimedia s
mestny [16]

Explanation:

The answer is D. 3-f modeling

5 0
4 years ago
Ehred is a network technician for a hotel chain and has been notified that one of the locations is having issues with the guests
Ray Of Light [21]

Option a is correct. Captive portal issues is might best describe the issue occuring in this hotel.

Before newly connected users of a Wi-Fi or wired network are given full access to network resources, they are first shown a captive portal, which is a web page that can be accessed via a web browser. Authentication, payment, acceptance of an end-user license agreement, adherence to an acceptable usage policy, completing a survey, or other valid credentials that the host and user agree to abide by may be required when presenting a landing or log-in page through a captive portal.

Cable, commercially available Wi-Fi, and home hotspots are just a few of the mobile and pedestrian broadband providers that utilise captive portals. Access to residential or corporate wired networks, such as those in apartment buildings, hotel rooms, and business centers, can also be provided by a captive gateway.

To know more about captive portal click here:

brainly.com/question/14280680

#SPJ4

5 0
1 year ago
Read 2 more answers
Rijndael, AES, CCMP are same as well as different. They are same in terms of how encryption is done and different in terms of wh
worty [1.4K]

Answer:

Option (b) is the correct answer to this question.

Explanation:

AES is based on Rijndael Algorithm.

The Rijndael algorithm enables a choice of block sizes and key sizes. The choices are for each of 128, 192, or 256 bits. Once NIST implemented Rijndael for AES, it only specified one block size,128 bits, but maintained three major lengths of selection. IEEE 802.11I go a step and further limits when both the main size and length of the block for 128 bits. It simplifies deployment and relieves users during development from having to make yet again another decision.

Other options are incorrect because they are not related to the given scenario.

8 0
3 years ago
Other questions:
  • Hackers often argue that hacking is for the good of all people because it points out flaws in computer systems. do you agree wit
    5·1 answer
  • what are the Technologies in regarding of communication technology? Please help me I'll rate you as brainliest!​
    13·1 answer
  • What may happen if a larger number of computer users are attempting to access a Web site at the same time that u r??? I think it
    5·1 answer
  • Read the section, "Junior Year." Why would someone chose to complete an apprenticeship after high school? How many occupations c
    14·2 answers
  • Karel challenges answers
    11·1 answer
  • BUURTAIS
    7·1 answer
  • FOR DIGITAL DESIGN/ PHOTOGRAPHY
    5·2 answers
  • An operating system is:
    14·1 answer
  • Please describe the role of games in modern society!
    5·2 answers
  • How to mark a discussion as read on canvas dashboard.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!