1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fredd [130]
3 years ago
7

For a direct-mapped cache design with a 64-bit address, the following bits of the address are used to access the cache

Computers and Technology
1 answer:
Sladkaya [172]3 years ago
6 0

Answer:

a) 32 words

b) 32 blocks

c)   374 / 10240

Explanation:

A) Cache block size

The offset bits from given data ; = 5 bits

therefore the cache block size = 2^5 = 32 words

B) determine the number of blocks the cache have

index bits = 5 bits

therefore the number of blocks the cache have = 2^5 = 32 blocks are mapped in the cache

C ) Determine the ratio between Total bits required for such a cache implementation over the data storage  bits

 lets assume

size of each word = w

size of each word ( w ) = 32 * 10 = 320

then we have to determine the total bits = 54 + 320 = 374

also total data bits = 32 * w  = 10240

finally ratio of Total bits over data storage bits

= Total bits / total data bits

=  374 / 10240

You might be interested in
Select all that apply.
Valentin [98]

Answer:

1, 3, & 4.

Is the way to do so. Good luck.

6 0
3 years ago
Consider the following methods.public void modParams(int[] x, int[] y, String[] s){x[1] = 5;y = x;s[1] = new String("five");s =
skad [1K]
I am not too happy to be a good man in my world but he is made me very very much and he is made me very very much and he is very much very good to him very much and he is very much very good to you very good and very much to be able for my kids with a little more money will not go back and you can do the greatest if he can be very much and you have no problem and then we do all the way that we are not the right answer but you have a question to do and you don’t have the right right answer the answer right back and he will not be very good I am very good and he is very very bad
5 0
3 years ago
Complete the sentence. <br><br> ____ Is the study and use of very small technology units
kondor19780726 [428]

Answer:

nanotechnology

Explanation:

I just took the test

3 0
4 years ago
In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?
mars1129 [50]

Answer:

B. Symmetric key encryption

Explanation:

Symmetric key encryption is one in which a single encryption key is sent to the receiver so both sender and receiver share the same key. In this type of encryption, the sender uses a particular key to encrypt the data and sends the encrypted data (cipher data) to the receiver and then the receiver uses the same key to decrypt the data.

Public key encryption, or asymmetric encryption uses two keys - a private key and a public key. The public key is know to everyone while the private key is known only to those for whom the message is intended. An application of this type of encryption is in SSL (Secure Sockets Layer) -  a protocol for transmitting data privately on the internet.

Private key encryption is not exactly one of the encryption methods but rather, a private key and a public key are used in encryption.

The best option is therefore <em>symmetric key encryption</em>.

<em>Hope this helps!</em>

7 0
3 years ago
Main function of Ubuntu
Lynna [10]

Answer:

Ubuntu includes thousands of pieces of software, starting with the Linux kernel version 5.4 and GNOME 3.28, and covering every standard desktop application from word processing and spreadsheet applications to internet access applications, web server software, email software, programming languages and tools

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • The icons to insert footnotes and endnotes in a document are located in the _____ tab.
    8·1 answer
  • Why is it important to be a good digital citizen??
    11·1 answer
  • 2. Integer plot function (find a smart way to code big integers) Write a program BigInt(n) that displays an arbitrary positive i
    8·1 answer
  • In no less than two paragraphs, explain the risks and compliance requirements of moving data and services into the cloud.
    11·1 answer
  • A network administrator is configuring the triggering mechanism for the network-based IPS by defining a pattern of web surfing a
    10·2 answers
  • Zoom meeting ID:987 6858 5587 Password:196133
    10·2 answers
  • Assignment 4: Evens and Odds<br><br><br> How do I fix this?
    13·1 answer
  • File-sharing utilities and client-to-client communication applications can provide the capability to share files with other user
    14·1 answer
  • What is a computer and what is the work of it​
    5·2 answers
  • In which of the following phases of filmmaking would a production team be focused on the process of casting?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!