1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex777 [14]
2 years ago
6

consider a memory system with a memory access time of 150 ns and a cache access time of 20ns. If the effective access time is 20

% greater than the cache access time, what is the hit ratio H g
Computers and Technology
1 answer:
Gemiola [76]2 years ago
7 0

Answer:

H = 0.7333333

Explanation:

Given that:

The memory access time (T_m) = 150 ns

The cache access time (T_c) = 20 ns

Effective access time (T_e)  = 20% > (T_c)

Then, it implies that:

= (T_c) + 20% of

=(T_c)(1+20%)

=(T_c)(1+ 0.2)

= 20ns × 1.2

= 24ns

To determine the hit ratio H;

Using the formula:

T_e = T_c \times H+(1-H) \times (T_c + T_m) \\ \\  T_e = HT_c   + T_c + T_m  -HT_c -HT_m \\ \\  T_e = T_c +T_m - HT_m \\ \\ T_c -T_e = T_m (H-1)  \\ \\ H-1 = \dfrac{T_c -T_e}{T_m} \\ \\  H = 1+ (\dfrac{T_c -T_e}{T_m})--- (1)

Replacing the values; we have:

T_c - T_e = 20ns - 24 ns \\ \\  T_c - T_e = -4 ns \\ \\ \dfrac{T_c - T_e }{T_m} = \dfrac{-4 ns}{150} \\ \\ \dfrac{T_c - T_e }{T_m} = -0.02666667

From (1)

H = 1+ (-0.2666667)  \\ \\  H = 1 - 0.2666667 \\ \\  \mathbf{H = 0.7333333}

You might be interested in
Why isn't my brainly camera working? I got Brainly Plus and can't even scan questions. I've logged out, I've uninstalled and rei
N76 [4]

Answer:

Try resetting your device.

Explanation:

In order to send and receive iMessages to your iPhone, iMessage must be enabled. By doing this, you will associate your phone number with the email address used for your Apple ID or iCloud account.

8 0
2 years ago
Ava calls tech support because she is unable to send information that a customer has requested. The tech support person tells he
Blizzard [7]

Answer:

Outlook as it is a common email aplication which may experience some issues

Explanation:

7 0
3 years ago
Big data are used to _____. Select 3 options.
jeka57 [31]

Answer:

AI, Interests, and marketing

Explanation:

Processing privacy policies is not a real function of a large data set.

8 0
2 years ago
These factors limit the ability to attach files to e-mail messages. location of sender recipient's ability to open file size of
NeX [460]

The answer is

Recipient's ability to open file

Size of file

Sometimes, it might occur that the email message attachment you’ve sent to someone has an error or is corrupt and thus, limits the recipient ability to open the file. Another factor is the size of the file. All email servers limit the size of the file attached in an email that a recipient can receive mainly because of security reasons. Google Mail, for instance, only allows you to send 25MB only. This might limit the ability to attach files to e-mail messages as well.

3 0
2 years ago
Read 2 more answers
Which new jobs will be in demand in the next 20 years
s2008m [1.1K]
The answer is Data Jobs, Data Analysis, Solution Architecture, Software Engineering and Product Managers, there is many more but there's just a few. Hope I helped! :)
3 0
3 years ago
Other questions:
  • In a flow chart, both the decision structure and the repetition structure use the diamond symbol to represent the condition that
    9·1 answer
  • Which collaboration website is best suited for social collaboration? www.media.iearn.org/projects www.meetup.com www.quest.nasa.
    9·1 answer
  • All linear programming problems have all of the following properties EXCEPT
    9·2 answers
  • What is a directed graph?
    5·1 answer
  • How many bits does it take to store a 3-minute song using an audio encoding method that samples at the rate of 40,000 bits/secon
    12·1 answer
  • What feature allows you to access previous copies of a document on OneDrive?
    15·2 answers
  • This method adds newValue to the list at the specified index. If the index is invalid for the list, throw an IndexOutOfBoundsExc
    13·1 answer
  • Describe how computer are used in ticket counter?​
    10·1 answer
  • Using a computer application is known as​
    11·1 answer
  • What is the decimal value for the jump control?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!