1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fredd [130]
3 years ago
7

For a direct-mapped cache design with a 64-bit address, the following bits of the address are used to access the cache

Computers and Technology
1 answer:
Sladkaya [172]3 years ago
6 0

Answer:

a) 32 words

b) 32 blocks

c)   374 / 10240

Explanation:

A) Cache block size

The offset bits from given data ; = 5 bits

therefore the cache block size = 2^5 = 32 words

B) determine the number of blocks the cache have

index bits = 5 bits

therefore the number of blocks the cache have = 2^5 = 32 blocks are mapped in the cache

C ) Determine the ratio between Total bits required for such a cache implementation over the data storage  bits

 lets assume

size of each word = w

size of each word ( w ) = 32 * 10 = 320

then we have to determine the total bits = 54 + 320 = 374

also total data bits = 32 * w  = 10240

finally ratio of Total bits over data storage bits

= Total bits / total data bits

=  374 / 10240

You might be interested in
An individual who hacks the public telephone network to make free calls or disrupt services is called a ____.
Slav-nsk [51]

Answer:

The answer is "Phreaker".

Explanation:

A "Phreak" is one who secretly hacks into another telephone network, it is usually to make individual long-distance calling or to access the telephone lines.  

  • Sometimes, it involves anyone, who breaches or wants to break any information security.
  • It is used to receive unlimited calls and texts or high-cost contact details, that's why the Phreaker is the correct answer.
3 0
4 years ago
Lactic acid (ch3ch(oh)cooh) has one acidic hydrogen. a 0.10 m solution of lactic acid has a ph of 2.44. calculate ka.
sammy [17]

The answer is : Ka=0.000137

HA -> H+ + A-

0.10 x x

0.10-x +x +x

[H+]= 10^-2.44 = 0.00363

x= 0.00363

(0.00363)(0.00363)/(0.10-0.00363) = 0.000137

Ka=0.000137

5 0
3 years ago
Select the items from this list that are examples of good financial habits.
Lelu [443]
Where is the list? If you don't show the list I don't know what you mean

6 0
4 years ago
Assign a variable madLib to a function expression that has five parameters in the order: an adverb, two nouns, an adjective and
hoa [83]

Answer:

<em>The function is written in C++:</em>

void madLib(string adjective,string noun1,string adverb,string verb,string noun2){

   cout<<"The "+verb+" "+noun1+" "+adjective+" "+noun2+" the "+adverb;

}

Explanation:

This line defines the function

void madLib(string adjective,string noun1,string adverb,string verb,string noun2){

This line generates and returns the output string

   cout<<"The "+verb+" "+noun1+" "+adjective+" "+noun2+" the "+adverb;

<em>NB: I've added the full source code as an attachment where you can test various input strings</em>

Download cpp
6 0
4 years ago
What is a defult? pls help if you wouldn't mind
Sunny_sXe [5.5K]

Answer:

a beginner or a novice

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • A partially filled array is normally used with __________.
    14·1 answer
  • Whereas lines of competition are clearly defined in the more established industries, in the Internet industry they are blurred a
    9·1 answer
  • What can a dimm use to hold data and amplify a signal just before the data is written to the module?
    12·1 answer
  • What port does the DarkComet malware listen on?
    15·1 answer
  • Alcatel-Lucent’s High Leverage Network (HLN) increases bandwidth and network capabilities while reducing the negative impact on
    6·1 answer
  • Main characteristic of open source software<br> ?
    7·1 answer
  • What is the 10/20/30 rule?
    11·1 answer
  • Spelling and grammar checking options can be controlled at the word options dialog box. To display this dialog box, begin by cli
    15·1 answer
  • PLZZZ HELLPP... PhotoShop
    7·1 answer
  • 6. assume there are three small caches, each consisting of four one-word blocks. one cache is fully associative, a second is two
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!