1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lunna [17]
3 years ago
5

You have a K-Way set associative cache with following parameters

Computers and Technology
1 answer:
MaRussiya [10]3 years ago
6 0

Answer:

Following are the solution to the given question:

Explanation:

The size of cache  memory = 2048 (2^{11})

The block size=16 (2^4)

Therefore, \frac{2048}{16}=128 (2^7)are blocks.

The collection consists of 4 blocks. Therefore,\frac{128}{4} =32

are sets. Because the size of its cache block is 16, the block offset comprises 4 bits. There would be 5 bits inset offset since there are 32 caches. An Address contains 32 bits, while the space of the tags contains 32- (4+5)=23 bits.

You might be interested in
What are computer virus ? Explain in detail.In your answer include symptoms and prevention (3each)
Elenna [48]

Answer:

Explanation:

A computer virus is a form of malicious software that piggybacks onto legitimate application code in order to spread and reproduce itself.

Like other types of malware, a virus is deployed by attackers to damage or take control of a computer. Its name comes from the method by which it infects its targets. A biological virus like HIV or the flu cannot reproduce on its own; it needs to hijack a cell to do that work for it, wreaking havoc on the infected organism in the process. Similarly, a computer virus isn't itself a standalone program. It's a code snippet that inserts itself into some other application. When that application runs, it executes the virus code, with results that range from the irritating to the disastrous.

Computer virus symptoms

How can you tell if a virus has slipped past your defenses? With some exceptions, like ransomware, viruses are not keen to alert you that they've compromised your computer. Just as a biological virus wants to keep its host alive so it can continue to use it as a vehicle to reproduce and spread, so too does a computer virus attempt to do its damage in the background while your computer still limps along. But there are ways to tell that you've been infected. Norton has a good list; symptoms include:

Unusually slow performance

Frequent crashes

Unknown or unfamiliar programs that start up when you turn on your computer

Mass emails being sent from your email account

Changes to your homepage or passwords

7 0
3 years ago
Why is computer called information processing machine....?​
mixer [17]

Answer:

Since the computer accepts raw data as input and converts into information by means of data processing

Explanation:

helping!!!

3 0
2 years ago
Read 2 more answers
An IT security threat is anything that might cause serious harm to a computer system.
Blababa [14]

Answer:

True

Explanation:

this is true because a threat can endanger the computer and its system

5 0
2 years ago
What method do phishing and spoofing scammers use
Leya [2.2K]

Answer:

please give me brainlist and follow

Explanation:

There are various phishing techniques used by attackers:

Installing a Trojan via a malicious email attachment or ad which will allow the intruder to exploit loopholes and obtain sensitive information. Spoofing the sender address in an email to appear as a reputable source and request sensitive information.

8 0
2 years ago
The size of an array (how many elements it contains), which is accessed by .Lenth() returns (Choose the best answer)
Wewaii [24]

Answer:that creates the array, puts some values in it, and displays the values. ... assign a value to each array element and print for (int i = 0; i < anArray.length; i++) ... Array; Array Initializers; Accessing an Array Element; Getting the Size of an Array ... not create an array and does not allocate any memory to contain array elements.

Explanation:

5 0
3 years ago
Other questions:
  • What are the basic characteristics of object-oriented analysis and design (OOAD)? How does OOAD compare to structured analysis a
    12·1 answer
  • Provide a few examples of how cryptography actually secures data.
    8·1 answer
  • (01.05 LC)
    7·2 answers
  • Which does plug-and-play refer to?
    14·1 answer
  • A line beginning with a # will be transmitted to the programmer’s social media feed.
    11·2 answers
  • Create a variable in php to store your university information and parse using jQuery Ajax and print your name. The variable must
    12·1 answer
  • Please sign this!! https://www.change.org/ban-charli-damelio
    12·2 answers
  • Write a program that declares three one-dimensional arraysnamed miles, gallons, and mpg. Each array should be declared in main()
    10·1 answer
  • Group of programs are software <br>​
    11·1 answer
  • The owner creator of a folder/file object has complete access to the object even when no user or group is assigned any access to
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!