1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elan Coil [88]
3 years ago
10

Suppose a byte-addressable computer using set-associative cache has 2 16 bytes of main memory and a cache size of 32 blocks and

each cache block contains 8 bytes. a) If this cache is 2-way set associative, what is the format of a memory address as seen by the cache; that is, what are the size of the tag, set, and offset fields
Computers and Technology
1 answer:
melisa1 [442]3 years ago
3 0

Answer:

Following are the responses to these question:

Explanation:

The cache size is 2n words whenever the address bit number is n then So, because cache size is 216 words, its number of address bits required for that  cache is 16 because the recollection is relational 2, there is 2 type for each set. Its cache has 32 blocks, so overall sets are as follows:

\text{Total Number of sets raluired}= \frac{\text{Number of blocks}}{Associativity}

                                               =\frac{32}{2}\\\\ =16\\\\= 2^4 \ sets

The set bits required also are 4. Therefore.

Every other block has 8 words, 23 words, so the field of the word requires 3 bits.

For both the tag field, the remaining portion bits are essential. The bytes in the tag field are calculated as follows:

Bits number in the field tag =Address Bits Total number-Set bits number number-Number of bits of words

=16-4-3

= 9 bit

The number of bits inside the individual fields is therefore as follows:

Tag field: 8 bits Tag field

Fieldset: 4 bits

Field Word:3 bits

You might be interested in
What is sexual intercourse <br><br>​
n200080 [17]

Answer:

immmm ....

I know the answer but I won't tell..lolllll

7 0
2 years ago
Read 2 more answers
Wite 3 names of computers used in 1st generation of computers?
enyata [817]
Here are some of the computers used in the first generation of computers:
ENIAC
EDVAC
UNIVAC
IBM-701
IBM-650
These are some of the first computers ever that led to today's computers.
5 0
3 years ago
What is the size of the array shoeSize? double [] shoeSize = {8.5, 7, 12.5, 9.5, 9, 11.5, 6}
r-ruslan [8.4K]

The size of the array shoeSize? double [] shoeSize = {8.5, 7, 12.5, 9.5, 9, 11.5, 6} is 6

Explanation:

  • Arrays are zero-based : the seven elements of a 7-element array are numbered from 0 to 6. Hence, the size of the array is 6.
  • An array is collection of items stored at memory locations. The main aim of an array is to store multiple items of same type together.
  • An array is a collection of one or more values of the same type. Each value is called an element of the array.
  • The location of an item in an array is known as array indexing.
  • The first array index is 0 or 1 and indexes continue through the natural numbers.
  • The upper bound of an array is generally language and possibly system specific.
  • An array type is a data type that represents a collection of elements each selected by one or more identifying keys that can be computed at run time during program execution.

6 0
2 years ago
Create a flowchart to print numbers from 1 to 100
Mkey [24]

Answer:

brainliest plsss

Explanation:

I think so this is what you had asked!!!!!!

hope it helps

4 0
3 years ago
In an attack known as ____, valid protocol packets exploit poorly configured dns servers to inject false information to corrupt
ladessa [460]

This is known as DNS poisoning, so called because it 'poisons' the entries of the DNS with false information.

8 0
3 years ago
Other questions:
  • Which organization safeguards americans from health, safety, and security hazards and threats?
    14·2 answers
  • Which command is used to combine two or more cells together into one cell?
    14·2 answers
  • When was kale discovered?
    9·1 answer
  • When an entrepreneur has three employees at a busy and growing software company, what is the primary responsibility of the entre
    13·2 answers
  • Write a complete Java program called Stewie2 that prints the following output. Use at least one static method besides main. ////
    9·2 answers
  • Search engines enable you to
    12·1 answer
  • Why is local hosting not suitable for a public website?
    15·1 answer
  • Which list method allows elements in a sequence to be removed and added at either end of the structure?
    6·2 answers
  • 7.3 Code Practice edhesive
    12·2 answers
  • Which of the following terms refers to the cells that contain values and labels to be graphed in the chart?.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!