1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IceJOKER [234]
3 years ago
13

A 4-way set associative cache has 64 blocks of 16 words. How many bits are there in the ""tag"" field of the 15-bit address for

this architecture
Computers and Technology
1 answer:
Tanya [424]3 years ago
6 0

Answer:

3 bits

Explanation:

Given a 4- way set associative cache that has 64 blocks of 16 words.

Therefore, the number of sets cache has:

\frac{64}{4} = 16

Now,

Cache data size is 16kB

The number of cache blocks can be calculated as:

16kB/16 = 1024 bytes/16 byte\times 16 = 256 cache blocks

Now,

Total sets = \frac{cache blocks}{associative sets}

Total sets = \frac{256}{4} = 64

Now,

2^{n} = 64

n = 6

For 15 bit address for the architecture, the bits in tag field is given by:

15 - (6 + 6) = 3 bits

Thus the tag field will have 3 bits

You might be interested in
Impact of information technology in the society​
GarryVolchara [31]

Answer:

led to exposure of dangerous things

3 0
2 years ago
Which of the following methods is the easiest way to set up a VPN client on a computer for a user who is not technical?
Pie

Answer:

Option D.

Use CMAK to create an executable to install.

Explanation:

The CMAK is the Connection Manager Administration Kit it is a feature in Microsoft Windows that allows users to customize the remote connection experience for users on their network.

The CMAK can be simply used by the technical expert to remotely operate the client computer, and customize the VPN himself without the non-technical user having to do anything. This can be done for computers only on a network however.

3 0
3 years ago
write a C program the prints out the size of variables with the following C data types- int, long, unsigned, long long, double,
Anit [1.1K]

<u>C program for finding size of different data types</u>

#include <stdio.h>

//driver function

int main()

{

   int a;  //declaring a of type int

   float b; //declaring b of type float

   double c; //declaring c of type double

   char d; //declaring d of type char

   long e; //declaring e of type long

   long long f; //declaring f of type longlong

   unsigned g; //declaring g of type unsigned

   // Sizeof operator is used to evaluate the size of a variable

printf(" int data type contains: %lu bytes\n",sizeof(a));/*Finding size of int */

printf("float data type contains : %lu bytes\n",sizeof(b));/*Finding size of float */

printf("double data type contains: %lu bytes\n",sizeof(c));/*Finding size of double */

printf("char data type contains: %lu byte\n",sizeof(d));/*Finding size of char */

printf("long data type contains: %lu byte\n",sizeof(e));/*Finding size of long*/ printf("longlong data type contains: %lu byte\n",sizeof(f));/*Finding size of longlong */

printf("unsigned data type contains: %lu byte\n",sizeof(g)); /*Finding size of unsigned */

   return 0;

}

<u>Output</u>

int data type contains: 4 bytes

float data type contains : 4 bytes

double data type contains: 8 bytes

char data type contains: 1 byte

long data type contains: 8 byte

longlong data type contains: 8 byte

unsigned data type contains: 4 byte

4 0
3 years ago
Which one of the following is malicious software that denies you access to your files or your organization's files unless you pa
gladu [14]

Answer:

Ransomware

Explanation:

Just as its name implies, you have to pay a 'ransom' to get a locked file that  belongs to you

4 0
1 year ago
What may happen if a large number of computer users are trying to access a web site at the same time as you ?
Ber [7]
It Will Say " Too Many People At A Time Trying To Get In " And It Will Say Wait .
6 0
3 years ago
Other questions:
  • You just turned on a four port Ethernet switch (it hasn’t learned any addresses yet) and connected a host to each port. You send
    8·1 answer
  • A ________ is a system of hardware and software that stores user data in many different geographical locations and makes that da
    14·1 answer
  • Submit your 300-word essay describing the equipment usedI in a well-equipped studio’s audio department and the training and expe
    8·2 answers
  • Put the following five steps in the order in which you would perform them to use the Paste Special function. 1. Select and copy
    6·1 answer
  • Write a method called makeLine. The method receives an int parameter that is guaranteed not to be negative and a character. The
    11·1 answer
  • __________ is a protocol used by e-mail clients to download e-mails to your computer.
    14·1 answer
  • If a small monster collector:- Has 16 small monster containment devices and intends to use all of them.
    10·1 answer
  • Write a qbasic program to display integer numbers 1 to 100 using the for next loop<br>​
    9·1 answer
  • Select all of the reasons Windows 95 increased the popularity of Windows.
    12·1 answer
  • What do earthquakes and tsunamis have in common?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!