Determine many blocks of main memory in direct-mapped cache

Assignment Help Basic Computer Science
Reference no: EM1372287

Suppose that a computer using direct-mapped cache has 2^24 words of main memory and a cache of 64 blocks, where each cache block contains 16 words.

A. How many blocks of main memory are there?

B. What is the format of a memory address as seen by the cache? That is, what are the sizes of the tag, block and word fields?

C. To which cache block will the memory reference (20DB63)base16 map?

Reference no: EM1372287

Questions Cloud

Implement cipher-combining ascii representation of plaintext : Particular cipher is implemented by combining ASCII representation of plaintext characters with pseudorandom bytes (eight-bit binary strings of 1s and 0s) using XOR function.
Explain the price and output agreements : Over the last thirty years the company of Petroleum Exporting Countries has had varied success in forming and maintaining its cartel agreements.
What are flows in circular flow model : Distinguish between resource market and product market in circular flow model. In what way are businesses and households both sellers and buyers in this model. What are flows in circular flow model.
Challenges and strengths to postpositivism : Measure the challenges and strengths to postpositivism and postmodernism in shaping practice and research.
Determine many blocks of main memory in direct-mapped cache : Asumme that computer using direct-mapped cache has 2^24 words of main memory and cache of 64 blocks, where each cache block contains 16 words. How many blocks of main memory are there?
Impact on equilibrium ndp of an investment : Assume that the current marginal propensity to consume equal .75. Determine what will be the impact on equilibrium NDP of an investment of $1 billion?
Postmodern-philosophical assumptions : You're a member of the research team that relies on postmodernist lens. The research team is interested in submitting the research proposal to study depression among adolescents. In its first meeting, the team is discussing following topics:
Question about productivity problem : Charles Lackey operates a bakery in Idaho Falls, Idaho. Because of its excellent product and excellent location, demand has increased by 25 percent in last year.
Describe what is meant by a dominant strategy : Describe what is meant by a dominant strategy. Given payoff matrix above, does each firm have a dominant strategy. Under what circumstances would re be no dominant strategy for one or both firms.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Use of visitor pattern to supply additional functionality

Rather than use the Visitor pattern to supply additional functionality. Give the details and compare the advantages and disadvantages of this approach when compared to the Visitor pattern.

  Compute the pipeline speed-up ratio

Given the datapath shown in, and the latencies above for the individual elements of the datapath, compare clock cycle time of the single-cycle.

  Strategic advantages voip brings to businesses

Write down some of the strategic advantages the VoIP brings to businesses that adopt it? Prior, voice and data networks were separate and typically maintained by separate groups.

  Generate profits often referred to as creating

When the output of some units can be used as inputs to othe units, or if two organizations pools markets and expertise that results in lower costs and generate profits it is often referred to as creating?

  Prove that machine precision as bound for relative round off

Prove that machine precision (epsilon) calculated by mathlab's eps function can be utilized as a bound for relative round off.

  Determine subgame-perfect equilibrium

Targeting again one of the surviving gangsters. Survivors split money equally. Determine subgame-perfect equilibrium.

  Finding content of top of stack-call instruction is executed

Specify the content of PC, SP, and the top of the stack in the following situations: After the call instruction is executed.

  Computing conditional probability

Pprocessor failed sometime in the interval [4; 8] years. Given this information, what is the conditional probability that it failed before it was 5 years old?

  Action of violation of principle of least common mechanism

Discuss how this technique might prevent legitimate users from accessing the system. Why is this action a violation of the principle of least common mechanism?

  Compare iso-iec outline with nist documents

Compare the ISO/IEC 27001 outline with the NIST documents outlined in 'Management of Information Security' (by Michael E. Whitman, Herbert J. Mattord).

  Determine present worth-future worth of soldering machine

The initial cost is in week 0 and the payments are in years 1-4. Determine the present worth, future worth, and annual worth for.

  Draw comparisons with software architecture

Draw comparisons with software architecture. How are the disciplines of classical architecture and the software architecture similar? How do they differ?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd