The question given is incomplete and by finding it on internet i found the complete question as follows:
Direct Mapped Cache.
Memory is byte addressable
Fill in the missing fields based upon the properties of a direct-mapped cache. Click on "Select" to access the list of possible answers Main Memory Size Cache Size Block Size Number of Tag Bits 3 1) 16 KiB 128 KiB 256 B 20 2) 32 GiB 32 KiB 1 KiB 3) 64 MiB 512 KiB 1 KiB Select] 4 KiB 4) 16 GiB 10 Select ] Select ] 5) 10 64 MiB [ Select ] 6) Select] 512 KiB 7
For convenience, the table form of the question is attached in the image below.
Answers of blanks:
1. 3 bits
2. 20 bits
3. 64 MB
4. 16 MB
5. 64 KB
6. 64 MB
Explanation:
Following is the solution for question step-by-step:
<u>Part 1:</u>
No. of Tag bits = No. of bits to represent
Tag bits = Main memory - cache size bits -------- (A)
Given:
Main memory = 128 KB = 
Cache Memory = 16 KB = 
Putting values in A:
Tag bits = 17 - 14 = 3 bits
<u>Part 2:</u>
Tag bits = Main memory - cache size bits -------- (A)
Given:
Main memory = 32 GB = 
Cache Memory = 16 KB = 
Putting values in A:
Tag bits = 35 - 15 = 20 bits
<u>Part 3:</u>
Given:
Tag bits = 7
Cache Memory = 512 KB = 
So from equation A
7 = Main Memory size - 19
Main Memory = 7 + 19
Main memory = 26
OR
Main Memory = 
<u>Part 4:</u>
Given that:
Main Memory Size = 
Tag bits = 10
Cache Memory Bits = 34 - 10 = 24
Cache Memory Size = 
<u>Part 5:</u>
Given that:
Main Memory Size = 64 MB = 
Tag bits = 10
Cache Memory Bits = 26 - 10 = 16
Cache Memory Size = 
<u>Part 6:</u>
Cache Memory = 512 KB = 
Tag Bits = 7
Main Memory Bits = 19 + 7 = 26
Main Memory size = 
i hope it will help you!
The wireless security technology contains significant flaws and should never be used is Wired Equivalent Privacy (WEP).
<h3>What is the primary weakness of Wired Equivalent Privacy WEP )?</h3>
Wired Equivalent Privacy (WEP) is known to be a kind of a security protocol, that is seen in the IEEE Wireless Fidelity (Wi-Fi) standard known to be 802.11b.
Note that the primary weakness of wired equivalent privacy (WEP) is that It functions only on some given brands of APs and as such, The wireless security technology contains significant flaws and should never be used is Wired Equivalent Privacy (WEP).
Learn more about wireless security from
brainly.com/question/25633298
#SPJ1
Answer:
LED is the correct answer for the following question.
Explanation:
LED is a display that is used in the Laptop screen which is a type of blacklight technology. Blacklight technology is a technology that is used to increase readability when the light is low.
An LED display is used in a modern laptop. It is a flat panel display. Its brightness is so high and allows a user to use it in the presence of the sunlight. It is designed in 1962 for the first time.
The above question asked about a blacklight technology that is used in a laptop device which is the LED display used in a modern laptop. Hence the answer is LED
Answer:
The answer is: c. Adding external CSS is a good practice for various reasons, including code organization.
Explanation:
External CSS improves maintainability in code.
Internal CSS has precedence over external CSS, it means that internal will overwrite external CSS, but abuse of internal CSS often makes hard to maintain HTML code on a large website.
Furthermore, it is much easier to modify one CSS(external) file that can impact multiple web pages than go into every HTML page and modify your styles per page. Many sites have hundred or more pages, go through each one wouldn't be productive.