How many ram chips are needed for each memory word

Assignment Help Operating System
Reference no: EM131258467

Assignment

1. How many bits are required to address a 8G X 64 main memory if

a) Main memory is byte addressable?
b) Main memory is word addressable?

2. Suppose that a 4M X 32 main memory is built using 1M X 8 RAM chips and memory is word addressable.

a) How many RAM chips are necessary?
b) How many RAM chips are needed for each memory word?
c) How many address bits are needed for each RAM chip?
d) How many address bits are needed for all memory?

3. A digital computer has a memory unit with 26 bits per word. The instruction set consists of 50 different operations. All instructions have an operation code part (opcode), and an address part (allowing for only one address). Each instruction is stored in one word of memory.

a) How many bits are needed for the opcode?
b) How many bits are left for the address part of the instruction?
c) What is the maximum allowable size for memory?

4. Write the following MARIE assembly language equivalent of the following machine language instructions where:
0010 0000 0000 0111 is Store 007

5. What is the difference between hardwired control and microprogrammed control?

Reference no: EM131258467

Questions Cloud

How many employees should be cross trained for the cell : How many employees should be cross-trained for the cell?- Which operations may warrant special consideration?
Evaluate various issues presented while arguing and debating : Discuss whether there should be a different standard of behavior in the workplace compared to personal relationships. Analyze and evaluate the various issues presented while arguing and debating the connections between business, law, politics, an..
Can the theoretical minimum actually be reached : What is the cycle time? - What is the theoretical minimum for the number of workstations that Rosenberg can achieve in this assembly line?
Policy mix of relatively tight fiscal policy : Since the Keynesians prefer a policy mix of relatively "tight" fiscal policy and "easy" monetary policy, how would they respond to an income tax cut in order to expand the economy?
How many ram chips are needed for each memory word : How many RAM chips are necessary? How many RAM chips are needed for each memory word? How many address bits are needed for each RAM chip? How many address bits are needed for all memory?
Describe forensic characteristics of document examination : Describe the forensic characteristics of document examination. Describe the collection and preservation of drugs, as well as the toxicology of drugs. Identify the role of the forensic pathologist, forensic entomologist, forensic toxicologist and f..
Show how the value ascii devora is stored in memory : Show how the value ASCII "DEVORA" is stored in memory in Big Endian and in Little Endian format starting at location 200 hexadecimal. Assume that each memory location stored two ASCII characters.
Draw a precedence diagram of the operation : Draw a precedence diagram of this operation. -  What is the cycle time for this operation? - What is the theoretical minimum number of workstations?
What is the format of a memory address as seen by the cache : How many blocks of main memory are there? What is the format of a memory address as seen by the cache, that is, what are the sizes of the tag, block, and word fields?

Reviews

Write a Review

Operating System Questions & Answers

  Dynamic memory requires

Main memory in virtually all computers contains how many data bits at each address

  Design several security awareness posters

With the help of graphics program, design many security awareness posters on the following themes, updating antivirus signatures, watching out for e-mail viruses.

  Empirical analysis of an algorithm

Submit a write-up as well as your program. Your write-up should include analysis of performance measure with various parameter values, any known bugs, limitations, and assumptions in your program. This write-up should be in text-format and titled ..

  C program that prompts the user to enter some data

If the user enters -999 as the first account number, the program should simply exit, and display an appropriate message of your choice.

  Identifying wireless network architectures

Some of the local hospital's administrators are questioning privacy of patients' data with wireless transmission. Discuss and determine the merits of their concerns.

  Applications for the programs

Applications are the programs that make our computers powerful. Not counting Microsoft Office, what are some of the new applications that you see making a big difference to computer users in next some years?

  What are some measures used for operating systems security

What are the different operating systems, and can the security measures be used for each system?

  Write a pseudo-code program

Create 10 child processes and each child process will in turn create a grandchild process.

  Explian wired and wireless media

Discuss and explian wired and wireless media along with the drawbacks and benefits of each also Discuss the channel signaling systems used in voice communication along with the drawbacks and benefits of each.

  Use wireshark tool to capture packets when you download

use wireshark tool to capture packets when you download lecture 1 from the coit20229 course webpage. before you

  Describe a client - server protocol

Identify and describe a client/server protocol used in everyday life and identify and describe three concerns dealing with Internet security and privacy?

  O create a variable called nickname which has a nickname

1.  Show the steps to create a variable called NICKNAME which has a nickname for you in it; make this variable available to the environment

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd