Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Characteristics of large-register-file and cache organizations
Large Register File
Cache
Hold local variables for almost all functions. This saves time.
Recently used local variables are fetched from main memory for any further use. Dynamic use optimises memory
The variables are individual.
The transfer from memory is block wise.
Global variables are assigned by the compilers.
It stores recently used variables. It cannot keep track of future use.
Save/restore needed only after the
maximum call nesting is over (that is n -
1 open windows).
Save/restore based on cache replacement algorithms.
It follows faster register addressing.
It is memory addressing.
Add 648 and 487 in BCD code. Ans. In BCD Code, addition of 648 and 487: 6 4 8 = 0 1 1 0 0 1 0 0 1 0 0 0 4 8 7 = 0 1 0 0 1 0 0 0 0 1 1 1 ---------------------
The bandwidth requirement of a telephone channel is (A) 3 KHz (B) 15 KHz (C) 5 KHz (D) 25 KH
what is access control
What are difference between Mealy and Moore state machine? Difference between Mealy and Moore state machine: 1) Mealy and Moore models are the fundamental models of state ma
Data phases: After the address phase (particularly, starting with the cycle that DEVSEL# goes low) comes a burst of one or more data phases. In all the cases, initiator drives
Define MFC. To accommodate the variability in response time, the processor waits unless it receives an indication that the requested read operation has been done. The control s
The hexadecimal number for (95.5) 10 is ? Ans. (95.5) 10 = (5F.8) 16 Integer part Fractional part 0.5x16=8.0
Explain Traffic Intensity in networking. Traffic Intensity: The traffic load on a given network may be on interoffice trunk lines, the local switching unit or other common s
Describe the three mapping techniques used in cache memories with suitable Example. The cache memory is a fast memory that is inserted among the larger slower main memory and t
How many methods used to control traffic flowing into and out of the network by firewall? Firewalls utilize one or more of three ways to control traffic flowing into and out of
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd