How many bits are there in a memory address

Assignment Help Basic Computer Science
Reference no: EM13956956

PROBLEM 1:

A block set - associative cache consists of a total of 64 blocks divided into four - block sets. The main memory contain 4096 blocks, each consists of 128 words.

a) How many bits are there in a memory address?

b) How many bits are there each of the TAG, SET AND WORD fields?

c) What is the size of cache memory?

PROBLEM 2:

An eight way set – associative cache consists of a total of 256 blocks. The main memory contains 8192 blocks, each consisting of 128 words

a) How many bits are there in main memory address?

b) How many bits are there in TAG, SET & WORD?

Reference no: EM13956956

Questions Cloud

Explain and to what sort of reader : What does the writer set out to explain and to what sort of reader? What are the components of his/her argument? Do you agree or disagree? Why? In what way is this article useful?
Cauchy sequence and translate : For the reverse direction, I know I have to take a cauchy sequence and translate it to the unit circle and then show that if it is convergent there, it is convergent outside of the unit circle.
What would the economy look like if bernie sanders : What would the economy look like if Bernie Sanders were to win?
Calculate the tension in the string connecting the two block : Two blocks are connected by a massless string and are held in position by another massless string along a frictionless incline. Let M1 = 44.0 kg, M2 = 51.0 kg, and theta = 50°. Calculate the tension in the string connecting the two blocks.
How many bits are there in a memory address : A block set - associative cache consists of a total of 64 blocks divided into four - block sets. The main memory contain 4096 blocks, each consists of 128 words.a) How many bits are there in a memory address?b) How many bits are there each of the TAG..
Need a 7-8 pages on the legal & political influences : Need a 7-8 pages on the legal  & political influences and moral & ethical implication on Nuclear reactors...
Find the average value of the function : Find the average value of the function f(x, y, z) = 1/(x^2 + y^2 + z^2) over the region where x^2 + y^2 + z^2 is greater than or equal to 1 and less than or equal to 4.
Global summary of cvs pharmacy : Write a Global summary of CVS Pharmacy
Calculate magnitude of the force r supported by pin : The simple 2 kg pendulum is released from rest in the horizontal position. As it reaches the bottom (vertical) position the cord wraps around the smooth fixed pin at A and continues in the smaller arc in the vertical plane. Calculate the magnitude..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Reducing the exchange attack surface

What are some advantages of implementing a host-based firewall on your Exchange Server?What is the procedure for disabling unnecessary services on your Exchange Server?What tools can be used to check and correct incorrect or insecure Exchange Server ..

  What is an array and why are they important in programming

What is a multi dimensional arrays. What purposes can you think of for multi dimensional arrays.

  Multiprotocol operational network using eigrp

The above network has RIPv2, OSPF, and EIGRP protocols in Intranet and is connected to two ISPs thru BGP protocol. As a consultant write a technical proposal to implement the following solutions.

  Create a customer experience strategy

Include components of customer service model reognized within your text. How would you use them to create a customer experience strategy?

  Combinatorics-passing by reference

Create a new project (called, for example, "homework05"), for this assignment. Do not use spaces in the name. Follow the same process as you did in the first assignment; if you need a refresher, please refer back to Homework 1.

  Describe basic computer system and typical components

Describing the basic computer system and the typical components that perform input, output, processing, storage, and control functions.

  Why chain of custody must be followed in investigation

You are a computer forensics investigator for a law firm. The firm acquired a new client, a young woman who was fired. What is chain of custody and why must it be followed in investigations?

  Itsec measurably show practical effectiveness of security

To what extent does ITSEC quantitatively and measurably illustrate practical effectiveness of the security measures it mandates?

  Job to take into account possible threats

It is your job to take into account possible threats, assess the likelihood of those threats, and examine the ways in which SIGINT could be used to discover and mitigate those threats.  Use as many of the subcategories of SIGINT as you can to help yo..

  Design process

You have recently started your own software design company. You discover that your local DMV is looking to build a system that will allow receptionists to check customers in quickly. They would like for the system to allow customers to self-check-in ..

  Paper on human-computer interaction

Write a paper which is called Human-computer interaction

  Research assignment

Directions: Read one or more articles on The Hacker News concerning topics that you find interesting. Write a one-page summary concerning the specific article or articles you read and explain how you think the issue affects network and/or global secu..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd