1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
expeople1 [14]
2 years ago
6

Assume that the 100,000 element integer array that you allocated starts at address 0x50000000 in memory, the size of an integer

is 4 bytes and the D-cache is initially empty. As you read the integers in the array one-by-one, starting at index 0, how many D-cache misses will you see for reading the first 40 integers when the cache block size is (to be answered without running pin):a) 4 bytes:b) 32 bytes:c) 64 bytes:
Computers and Technology
1 answer:
Vanyuwa [196]2 years ago
6 0

Answer:

40, 5 and 3

See explaination for the details

Explanation:

A)

Consider the data.

Assume D-cache is empty

An integer size =4bytes

The cache block size =4bytes

Therefore, the number of D-cache misses for reading the first 40 integers is,

= (40×4)/4

= 160/4

= 40

b)

Consider the data.

Assume D-cache is empty

An integer size =4bytes

The cache block size =32bytes

Therefore, the number of D-cache misses for reading the first 40 integers is,

= (40×4)/32

= 160/32

= 5

c)

Consider the data.

Assume D-cache is empty

An integer size =4bytes

The cache block size =64bytes

Therefore, the number of D-cache misses for reading the first 40 integers is,

= (40×4)/64

= 160/64

= 3

You might be interested in
A __________ is the column of data in a database that is used as the basis for arranging data.
Llana [10]
The answer is sort key.  A Sort Key is the column of data in a database that is used as the basis for arranging data. Iy is also used for rearranging data in the column.  An Operational Database is used to collect, modify, and maintain data on a daily basis.
8 0
3 years ago
Read 2 more answers
Methods used to change variables are called ______. equals accessors toString void mutators
Sindrei [870]
Look this up on Quizlet. Besure to check the question and the answers carefully by using "define + the vocabulary word" you think answers the question.

Here is the exact site: just copy it and search and click...

<span>AP Comp Sci Chapter 5</span>
6 0
2 years ago
Which of the following translates packets so that the node can understand them once they enter through a port?
podryga [215]
Hi
D)A NICHappy to assist you!
8 0
3 years ago
Read 2 more answers
What are the four components of the Universal Systems Model?
kakasveta [241]

Answer:

output, process, input, and feedback

Explanation:

5 0
3 years ago
To deny a host from sending HTTP traffic destined to a specific server you will need to apply a __________ Access Control List.
DedPeter [7]

I would a Standard Access control List

There are two common access lists: The standard and extended access list.  With the standard access list, it creates filters only on source addresses and is commonly used for server-based filtering. They are not as powerful as extended access lists. Standard Access lists are typically used for restricting access to a router through HTTP and HTTPS.  


6 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following Internet protocols is used to request and send pages and files on the World Wide Web?
    15·1 answer
  • The architecture that the large paper company Mohawk adopted enables the company to scale technology services up and down instan
    14·1 answer
  • Find the mistakes in the following code. Not all lines contain mistakes. Each line depends on the lines preceding it. Watch out
    14·1 answer
  • What type of things can be marketed
    11·1 answer
  • )In a graph represented by adjacency matrix u can find all the neighbours of a given vertices in ____Operations
    6·1 answer
  • Identify traits of entrepreneurs. Check all of the boxes that apply.
    11·1 answer
  • Part 1: For this assignment, call it assign0 Implement the following library and driver program under assign0: Your library will
    5·1 answer
  • Create a Flowchart and write pseudocode for a program that allows the user to enter two integer values: a and b.
    8·1 answer
  • What is a thoughtware​
    7·1 answer
  • Question #8
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!