1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex787 [66]
3 years ago
12

What is the effect of block size in cache design?

Computers and Technology
1 answer:
Sedaia [141]3 years ago
5 0

Answer:

When designing a cache, you have to consider this things:

  • Delay.
  • Miss rate.
  • Area.

If the cache has a bigger block size may have a lower delay, but when miss the miss rate will be costly. If an application has high spatial locality a bigger block size will do well, but programs with poor spatial locality will not because a miss rate will be high and seek time will be expensive.

You might be interested in
What did Adam and Eve look like?
Nata [24]
No one could possibly know, unfortunately.
6 0
3 years ago
Read 2 more answers
Using e-mail has decreased the number of hand-written letters that people send to their friends and relatives. this is a ____ fu
k0ka [10]
Hello <span>Alexkalhor5415

</span>Answer: Using e-mail has made it easy, fast, and inexpensive for family members who live in different parts of the united states to keep in touch. this is a positive  function of e-mail.
Hope this helps-Chris
6 0
3 years ago
6. The following is a dump of a DATA chunk in hexadecimal format. 00000015 00000005 0003000A 00000000 48656C6C 6F000000 a. Is th
ryzh [129]

Answer:

Explanation:

a) taking 00000005, it is a 13th bit which is 0, and therefore, we'd call it an ordered chunk

b) taking 00000005 again, it is 14th (B) and 15th (E) bits are 0 and so we'd call it a middle fragment

c) 00000015 is equal to 21, it is not a multiple of 4, and as such, it needs 3 padding bytes

d) 00000005 is equal to 5 making it a TSN. So the TSN is 5

e) taking 0003, we can then say the SI is 3

f) taking 000A, the SSN is then 10

g) the message is 48656C6C

6 0
3 years ago
Which technology will a business use to identify unauthorized access to intranet sites or files by its employees?
monitta

Answer:

Computer Forensics

Explanation:

Your Welcome....

8 0
3 years ago
Question #6
Vitek1552 [10]

Answer:

ValueError

Explanation:

Required

Determine the error the program returned

The above will return a ValueError error and the reason is as follows.

The first line of the program initializes variable as 'live'.

The next line tries to convert answer to integer and this is where it returns the error'.

On the second line, variable amount expects that the answer variable to contain number e.g. '567' but because it doesn't contain a complete number (i.e. unexpected values), the program returns a ValueError.

7 0
3 years ago
Read 2 more answers
Other questions:
  • The _______ valve protects the air pump from reverse-exhaust pressure.
    11·1 answer
  • The CPU is referred to as the ______ of the computer.
    14·2 answers
  • Which search engine do you prefer? Why
    15·2 answers
  • When searching for an image on your computer, you should look for a file with which of the following extensions?
    8·1 answer
  • Fill in the blank: _________ is Google’s machine-learning artificial intelligence system that interprets people’s searches to fi
    9·1 answer
  • What is the first step to apply the line and page breaks options to groups of paragraphs in a Word document?
    10·2 answers
  • What do you think is the most fascinating aspect of the Internet
    5·2 answers
  • How do I make someone "Brainiest". <br> First person to reply will get "Brainiest"
    8·2 answers
  • HELP!!!
    15·2 answers
  • second question today 25 POINTS: What is the formula to balance a lever when both effort and resistance are present?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!