Explaining initial values of cache tags and cache lines

Assignment Help Basic Computer Science
Reference no: EM1351868

Q1) Consider a system with a direct-mapped cache of size 128 (= 27) bytes, and a main memory of size of 1 KB (i.e. 1024 or 210 bytes). Each cache line contains 8 bytes. A program running on the system accesses the following locations in the first ten steps:

1 10 1010 0100,
2 10 1010 1000,
3 10 1010 0100,
4 01 0000 0000,
5 00 1010 0000,
6 00 1010 1100,
7 00 1010 0100,
8 01 0000 0000,
9 10 1010 0000,
10 01 0000 0000

Assuming that the initial values of the cache tags and the cache lines are completely arbitrary, show which accesses will lead to a hit, and which will cause to a miss. Also, show how the cache tags will change for each of the above steps. You should justify your answer.

Reference no: EM1351868

Questions Cloud

Explain how many years would it take for it to double : If the average employee compensation grew at the rate of 3.5% per year, explain how many years would it take for it to double.
Intellectual capital : Would you consider Google's organizational structure an intellectual capital asset? Why or why not? Support your position.
Importance of nutrition-infancy and toddler-hood period : Briefly describe the importance of nutrition during the Infancy and Toddler-hood period. Summarize pediatric recommendations regarding early feeding and the introduction to cow's milk and sold foods
Explain the two systems cannot communicate with each other : Explain the two systems cannot communicate with each other where David Warmdigit a production manager at HandZone
Explaining initial values of cache tags and cache lines : Assuming that the initial values of the cache tags and the cache lines are completely arbitrary, Also, show how the cache tags will change for each of the above steps. You should justify your answer.
What will happen to output assume that consumer confidence : Suppose that consumers decide to consume less (and therefore to save more) for any given amount of disposable income. Specifically, assume that consumer confidence (c0) falls. What will happen to output.
Customer satisfaction survey : Questions is primarily used for demographical purposes in order to pinpoint specific ages, gender and marital statistics that our product or services are targeting.
Determine the amount of post-retirement expenses : The following information is related to the Hedge Corporation post-retirement benefits plan for 2011. Determine the amount of post-retirement expenses for 2011.
Early and middle adulthood roles : Discuss two roles that can be acquired during early and middle adulthood, such as through parenthood, romantic relationships, and career. How have these roles changed through past generation?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Application development and programming languages

Compare and contrast object-oriented languages (Java, C++, C#, etc.) to imperative languages (C, Pascal, etc.) in terms of: Programmability, Maintainability, Performance, Development tools

  Decreasing risk of malicious attacks in personal systems

Security budgets is devoted to decreasing risk of malicious attacks. What threats are you aware of when it comes to the personal systems and systems at job

  Storing and compiling a large amount of data

Because information systems are able to store and compile a large amount of data, many people worry that, their private data will end up in the wrong hands. Explain your position.

  Problem of traveling from one city to another

Describe how the problem of traveling from one city to another could be framed as a production system. What are the states? What are the productions?

  Creating project organization in enterprise business

Organization structures generally used to create a project organization in an enterprise business environment.

  Different methods that freedom of expression is limited

Describe three different methods that freedom of expression is limited in spite of unequivocal language of First Amendment.

  Button subprocedure to store user-s name in cell

If you wish to take in and store user's name in cell A1 by having them type their name following prompt declaring "Give me your name, Earthling!" that code excerpt must you use within button subprocedure?

  Creating report by city and by product to record sales

Create a report by city and another by product, including details of the sales and sub-totals and totals for quantity.

  Prediction for open standards that may change world again

In April of 1990, entire concept of domain was born, and email addresses "opened up". What might be the prediction about more open standards which may change our world again?

  Good meetings in software development life cycle

Provide three words or phrases that explain why "good meetings" are important during the Software Development Life Cycle?

  Describing fields and options with user account set-up

Describe the fields and options associated with user account set-up.

  Creating data encryption standard for ibm

Let us start off with once widely used Data Encryption Standard (DES) which was created by International Business Machines (IBM).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd