1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fredd [130]
3 years ago
7

For a direct-mapped cache design with a 64-bit address, the following bits of the address are used to access the cache

Computers and Technology
1 answer:
Sladkaya [172]3 years ago
6 0

Answer:

a) 32 words

b) 32 blocks

c)   374 / 10240

Explanation:

A) Cache block size

The offset bits from given data ; = 5 bits

therefore the cache block size = 2^5 = 32 words

B) determine the number of blocks the cache have

index bits = 5 bits

therefore the number of blocks the cache have = 2^5 = 32 blocks are mapped in the cache

C ) Determine the ratio between Total bits required for such a cache implementation over the data storage  bits

 lets assume

size of each word = w

size of each word ( w ) = 32 * 10 = 320

then we have to determine the total bits = 54 + 320 = 374

also total data bits = 32 * w  = 10240

finally ratio of Total bits over data storage bits

= Total bits / total data bits

=  374 / 10240

You might be interested in
You find information that you know to be classified on the internet. What should you do.
melomori [17]

A person is to find the information to be classified on the internet  are the best in the screenshot.

What is internet?

The word “internet” is also referred to as “net.” The global system of networks known as the Internet. Online services offered via the Internet include social media, email, and others. The without internet  are the not possible to share the information at the time.

A person is to find the information through which the internet is the best to justify. There used of the internet are the search the information with the help of the internet are the mic, keyboard. The information are the save and the screenshot was the used.

As a result, the person is to find the information to be classified on the internet  are the best in the screenshot.

Learn more about on internet, here:

brainly.com/question/13308791

#SPJ2

5 0
1 year ago
Read 2 more answers
Often technical personnel who are not familiar with security techniques think that restricting access to ports on a router or fi
zavuch27 [327]

Answer:

This is not a good solution

Explanation:

Your web browser uses port 80 outgoing to make web requests, so if you’re blocking incoming port 80, all you’re blocking is users of the organization from connecting to the internet. You have indeed close a vulnerable port to access from hackers, but this also can reduce the productivity of the organization.

3 0
3 years ago
An international magazine publisher has commissioned you to do a series of images in black and white. The publisher distributes
CaHeK987 [17]

Answer:

I need to send black-and-white images in a print-ready format. Therefore, here are the steps I’d follow:

First, I’d shoot my images.

I’d use Photoshop to modify or correct the color of the images.

I’d convert the images into black-and-white versions.

I’d save the selected files in the TIFF format. This method will ensure that the images retain their quality and are print-ready.

I’d also convert these files into the JPEG format to get good-quality, low-resolution images for the client’s web publishing.

The Art Director requires images that they can modify, if required. Therefore, I’ll include files in the TIFF and PSD formats. These are open files and anyone can modify them.

I’d send all these saved copies to the magazine for their work.

Explanation:

just did it and it gave me this answer:)

5 0
3 years ago
How can rows be added to a table? Check all that apply.
Lubov Fominskaja [6]

Tables are used to display information in a more arranged and organized manner.  

Various ways of adding a row in an already existing table are:

1) By drawing a row in the table using the draw option.

2) By using the insert option under the Table Tools tab.

3) By designing the table with an added row using the Design tab.

<u>Explanation:</u>

In the insert option, go to the extreme right corner. There appears an option of Draw Table. Draw another row and it gets added.  

This tab contains two tabs, Design and Layout that enable you to rapidly arrange your table, embed or erase lines and sections, set the arrangement for cells, and organization the typography of the content in your table.

Thus, a table and its capacity are built up from here on and open for designing.

8 0
3 years ago
Read 2 more answers
Importing data is sending data to a new file.Is this true or false
Kipish [7]

false homie I gotcho


3 0
3 years ago
Read 2 more answers
Other questions:
  • Explaim Why the shape of a cell is hexagonal
    15·1 answer
  • Which computer port transmits audio and video without the need for compression?
    6·1 answer
  • when you create workplace documents, it is most important to ensure that they are clear, professional, and a. short. b. informal
    7·1 answer
  • What is required for real-time surveillance of a suspects computer activity?/p Group of answer choices a. Blocking data transmis
    12·1 answer
  • A hotel salesperson enters sales in a text file. Each line contains the following, separated by semicolons: The name of the clie
    11·1 answer
  • When you're working with a word processing document and you press the Del key, what happens? A. The paragraph you're working on
    12·1 answer
  • Ryo currently earns a monthly salary of $2200. She has been offered a raise of $250 per month. How much more will she earn per y
    14·1 answer
  • Choose all that apply.
    5·2 answers
  • When Mark completed his research paper, he decided that he wanted to have all headings to be in bold, underlined, and 14 points.
    11·1 answer
  • What is e banking effects
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!