1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fredd [130]
3 years ago
7

For a direct-mapped cache design with a 64-bit address, the following bits of the address are used to access the cache

Computers and Technology
1 answer:
Sladkaya [172]3 years ago
6 0

Answer:

a) 32 words

b) 32 blocks

c)   374 / 10240

Explanation:

A) Cache block size

The offset bits from given data ; = 5 bits

therefore the cache block size = 2^5 = 32 words

B) determine the number of blocks the cache have

index bits = 5 bits

therefore the number of blocks the cache have = 2^5 = 32 blocks are mapped in the cache

C ) Determine the ratio between Total bits required for such a cache implementation over the data storage  bits

 lets assume

size of each word = w

size of each word ( w ) = 32 * 10 = 320

then we have to determine the total bits = 54 + 320 = 374

also total data bits = 32 * w  = 10240

finally ratio of Total bits over data storage bits

= Total bits / total data bits

=  374 / 10240

You might be interested in
Identity theft, where people steal personal information, continues to be a problem for consumers and businesses. Assume that you
svetlana [45]

Answer:

Secure the personal information with complex multi-factor authentication and configure intrusion detection and prevention and a firewall.

Explanation:

Multi-factor authentication is a method of securing a client's personal information from the client's side to the data centre. It uses more than one security processes not policies. There key be three authentications process like a password, security token and biometrics or two authentications like password and biometrics or token.

The firewall and intrusion detection and prevention are vulnerability preventive method to detect and stop cyber attacks.

5 0
3 years ago
Change the shape fill color to Dark Red. It is the first option in the Standard Colors section of the color palette.
maxonik [38]
Is this a question ?
3 0
3 years ago
A main reason careers in Information Technology are growing faster than average is
Scorpion4ik [409]
Technology has become such a major part of everyday life
8 0
3 years ago
During the name resolution process, which technique is used to avoid congestion when querying a server
vekshin1

Answer:

"NOT lookup " is the correct approach.

Explanation:

  • This methodology significantly reduces the quantity of congestion of DNS messages on a certain file. The application establishes that whenever a question reaches if it is processed. Unless the file is loaded, then perhaps the response is returned with the cached cache.
  • Typically the name resolution occurs in something like a DNS File. The conversion usually occurs throughout this cycle from Username to IP, including IP via Username.
8 0
3 years ago
When using bits to represent fractions of a number, can you create all possible fractions? Why or why not?
seropon [69]

Explanation:

Using this technique a number is represented in bits by three parts: sign, exponent, and fraction. This is similar to scientific notation used to represent large or small numbers (e.g. ). The sign is negative, the exponent is 8 and the fraction is 0.35.

8 0
3 years ago
Other questions:
  • Is backing up computer files done on the hard drive?
    5·1 answer
  • A Narrative Statement illustrates how your life will look when you reach a goal.
    15·2 answers
  • When performing conflict management, it is important to identify your;
    6·1 answer
  • Pressing the e key while in edit mode will exit the interaction mode<br><br> true<br><br> false
    7·1 answer
  • Write a program that first reads in the name of an input file, followed by two strings representing the lower and upper bounds o
    8·1 answer
  • A unique ability of people which sets them far apart from animals is:
    8·1 answer
  • When you expect a reader of your message to be uninterested, unwilling, displeased, or hostile, you should Group of answer choic
    15·1 answer
  • Generalized goals are more likely to be achieved than specific goals. True or False
    7·1 answer
  • When you create a new database using --------- , the database includes prebuilt tables and forms which you can populate with dat
    15·1 answer
  • Which arcade game, released in 1972, is considered to be the first to be commercially successful?.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!