Mips uses word alignment

Assignment Help Basic Computer Science
Reference no: EM13163586

Assume we modify the 8 block direct-mapped cache design to implement an 8-block 2-way set associa - tive cache.

(a) How many sets will there be?

(b) How many blocks will there be per set?

(c) MIPS uses word alignment, so all words are stored in memory on word boundaries; this means that address bits A[1:0] are always 00. How many and which address bits would be allocated for the set index?

(d) How many and which address bits would be allocated for the tag?

(e) What is the total size of the cache in bit?

 

Reference no: EM13163586

Questions Cloud

A linked list of your song structure in cd : The CD object should have a data member that is a linked list of your song structure that you have in CD.  The CD class needs a function that allows it to add a song to the object, that function would then append the song to that instance of the link..
Explain volumetric flask and diluting to the mark : solution with a pipet to a second 500.0 mL volumetric flask and diluting to the mark. Find the concentration of Ag+ in the dilute solution.
State the heat of vaporization of liquid a : At 25 degrees Celsius liquid A has a vapor pressure of 100 torr while liquid B has a vapor pressure of 200 torr. The heat of vaporization of liquid A is 32 kJ/mol
Explain henderson-hasselbach equation : If someone can go in depth into finding the Ka to this and then guiding me through the rest of the steps, I'd be eternally grateful
Mips uses word alignment : MIPS uses word alignment, so all words are stored in memory on word boundaries; this means that address bits A[1:0] are always 00. How many and which address bits would be allocated for the set index?
Extend the definition of the class clocktype by overloading : a. Extend the definition of the class clockType by overloading the post-increment operator function as a member of the class clockType
Explain the purification of a protein from bovine live : Describe in detail(ex:individual resins used, etc) the purification of a protein from bovine live that has the following characteristics: Molecular weight of 86,500, pI= 8 and precipitates out of solution at 30% ammonium sulfate
Draw a flow chart for this : Draw a Flow Chart for this 8051 assembly language program below. This program calculate y=x^2+ 2x+9. Register R0 has the x, and at the end of the program R2 should have y. (Test program for x=9).
Explain possible intermediate and the transition states : Draw the energy profile diagram to show the possible intermediate and the transition states.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Compare time complexity of convolution with kernel

Compare the time complexity of convolution with a n x n kernel when using: direct convolution with the 2-D mask, and separable kernel.

  How computer technology has changed our society

How have the major players including the government either made these statements true or false? What are examples of why or why not.

  Explain what can-t be measured can-t be effectively managed

According to the following quote "what can't be measured can't be effectively managed." The question is can everything that is important in network security be measured using metrics or any other process? Why or Why not?

  What sort of system are you building

Create a spreadsheet listing all of the components, their prices, the place or website you could purchase, the cost of each component, and an explanation of why you would choose this part - What sort of system are you building? What tasks are requi..

  Loss of generality in private-key encryption

Prove that, in the context of private-key encryption, we can assume without loss of generality that keys are chosen uniformly at random (and so Gen is trivial).

  Develop the new project plan using microsoft project

Develop the new project plan using Microsoft Project for two-day training session in which people are brought in from different parts of country.

  Action of violation of principle of least common mechanism

Discuss how this technique might prevent legitimate users from accessing the system. Why is this action a violation of the principle of least common mechanism?

  Who are getting advantages from piracy robberies

Why are (were) pirates difficult to eliminate? What to you believe about pirates as moder-day Robin Hoods? Who are getting advantages from piracy robberies?

  What is big-o complexity of method

Write a method maxVal that accepts as parameter the reference to the head node of a linked list of integers. The method should return the largest value in the list. What is the Big-O complexity of the method maxVal?

  String s of lowercase english letters

Given a string S of lowercase English letters, write a program to find the longest magic string than can be obtained by removing some letters of S. If there are more than one solutions, choose the longest magic string which is lexicographically small..

  Use a truth table to determine whether

Use a truth table to determine whether or not the following argument form is valid. You can  justify  your answer by doing the following: indicate which columns represent the premises and which represent the conclusion;

  Apply yen''s algorithm to find the shortest path from node 1

Apply Yen's alogithm to find the shortest paqth from node 1 to all

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd