1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
WARRIOR [948]
3 years ago
12

A computer has a cache and main memory. 20 ns are required to reference a word that is in the cache. If the word is in main memo

ry but not in the cache, 60 ns are needed to load it into the cache (this includes the time to originally check the cache), and then the reference is started again. If the word is not in main memory, 10 ms are required to fetch the word from disk, followed by 60 ns to copy it to the cache, and then the reference is started again. The cache hit ratio is 0.9 and the main memory hit ratio is 0.99. What is the average time in ns required to access a referenced word on this system?
Computers and Technology
1 answer:
Alecsey [184]3 years ago
5 0

Answer:

T_{average} =12026ns

Explanation:

Given Information:

T_{cache}=20 ns

T_{main}=60ns

T_{disk} =12ms=12,000,000ns

hit_{cache} =0.9

miss_{cache} =1-0.9=0.10

hit_{main} =0.99

miss_{main} =1-0.99=0.01

There are 3 possible cases

1. Location of reference word is in cache

T_{cache}*hit_{cache} =20*0.9=18ns

2. Location of reference word is not in cache but in main memory

(T_{cache}+T_{main})*(miss_{cache}*hit_{main}) =(20+60)*(0.10*0.99)=7.92ns

3. Location of reference word is neither in cache nor in main memory

(T_{cache}+T_{main}+T_{disk})*(miss_{cache}*miss_{main})

(20+60+12,000,000)*(0.10*0.01)=12000.08 ns

The average time required to access a referenced word on this system is simply the sum of above 3 cases

T_{average} =18+7.92+12000.08=12026ns

You might be interested in
MegaCorp MegaCorp is large manufacturing firm that operates 5 factories in Dallas, 4 factories in Los Angeles, and 5 factories i
Ivenika [448]

Answer:

Recommended is frame relay architecture with a local loop at each factory supporting the frame relay service connection to the network provider's POP

Explanation:

Frame Relay can be seen as WAN protocol that is said to often operate at both the physical and data layers link of the OSI reference model due to it high-performance and due to the fact that FRAME RELAY are as well use across Integrated Services Digital Network (ISDN) interfaces in which they are designed for cost-efficient data transmission in order to enable effective intermittent traffic between local area networks (LANs) and endpoints in wide area networks (WANs) which is why frame contains all the information necessary to route it to the correct destination.

Therefore type of BN and WAN architecture and WAN service i would recommend based on the above information is FRAME RELAY ARCHITECTURE with a local loop at each factory supporting the frame relay service connection to the network provider's POP.

8 0
3 years ago
What is the purpose behind the Three Phase Commit? It improves upon the two phased commit by requiring that locks be acquired at
Ray Of Light [21]
The answer is a) It improves upon the two-phased commit by requiring that locks be acquired at the start of a transaction.

Reason: The 3PC is an extension or you can say developed from 2PC that avoids blocking of an operation. It just ensures that first n sites have intended to commit a transaction that means it acquires commits or locks before the start of any transaction to avoid any blocking.

Option b) is wrong as it does not allow coordination, it just let all the other sites do their transaction if any other site is blocked, so no coordination is there between sites that they will wait till their coordinator is corrected.

Option c) is wrong as lock operations are shared between other connections as when their coordinator fails, the new coordinator agrees to the old coordinator that they had shared locks before and they can start their transaction.

Option d) is wrong as option a) is correct.

If you like the answer, please upvote.
4 0
2 years ago
Public-key cryptography (a form of asymmetric cryptography) is an encryption method that's widely used because: 1) it is computa
rosijanka [135]

Answer:

C.

Explanation:

7 0
3 years ago
CODING TIME
Fynjy0 [20]

Answer:

food_list = ['rice', 'beans','yam', 'bread', 'pasta', 'cocoa','tea']

one_more = ['meat']

extend_list = food_list + one_more

print(extend_list)

Output : ['rice', 'beans','yam', 'bread', 'pasta', 'cocoa','tea', 'meat']

food_list.append('milk')

print(food_list)

Output : ['rice', 'beans','yam', 'bread', 'pasta', 'cocoa','tea', 'milk']

food_list.insert(0, 'cake')

print(food_list)

Output : ['cake', 'rice', 'beans','yam', 'bread', 'pasta', 'cocoa','tea']

flowers = ['rose', 'hibiscus', 'lily']

flowers.remove('rose')

print(flowers)

Output : ['hibiscus', 'lily']

To remove rose using pop()

flowers.pop(0)

Explanation:

The + operator and append method adds elements to the end of an existing list item.

The insert method adds element at the specified index

Remove method deletes element by stating the name of the element to be deleted while pop deletes element using the index value of the element.

7 0
2 years ago
"what command can be used on most linux distributions to find the directories where the man pages are kept"
BartSMP [9]

Answer:

Base name or -b command is used to locate only match directory in Linux.

Explanation:

base name can   primarily be used in shell script.

As we know that base name can be described  as a standard UNIX computer program. When we give a path name to any base then it  deletes each and every  prefix up to the last slash character and give back the result. base name can be defined in the Single UNIX Specification


6 0
3 years ago
Other questions:
  • Which of the following are examples of algorithms? (Select all that apply, if any do.)
    15·2 answers
  • James has been asked to build a low-profile computer for his friend to use as a home theater system. James needs to choose parts
    15·1 answer
  • on average, someone with a bachelor’s degree is estimated to earn _______ times more than someone with a high school diploma
    13·1 answer
  • Your neighbor has moved to another country. He informs you about his new job. You wantto congratulate him by sending an e-mail m
    13·1 answer
  • 3.A ball is thrown into the air with an initial velocity of 15 m/s. a.How long does it take the ball to reach maximum height?b.W
    12·1 answer
  • Write a java program which uses methods for calculating the sum of any 5 non-zero integer digits that are input. The program mus
    8·1 answer
  • In the history of Social Media what are two points that stood out?
    12·1 answer
  • The term packet is used fairly generically to refer to protocol data unit (PDU). There are PDU equivalent names in the different
    15·1 answer
  • You manage a network that uses switches. In the lobby of your building, there are three RJ45 ports connected to a switch. You wa
    5·1 answer
  • What is the difference between turn-based game mode and point-based game mode?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!