Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Describe Set-Associative Mapping?
A third type of cache organization known as set-associative mapping is an improvement on direct mapping organization in that every word of cache can store two or more words of memory under same index address. Every data word is stored together with its tag and number of tag data items in one word of cache is said to create a set.
Let's consider an illustration of a set-associative cache organization for a set size of two as displayed in Figure below. Every index address refers to two data words as well as their associated tags. Every tag needs six bits and every data word has 12 bits so word length of cache is 2(6+12) = 36 bits. An index address of 9 bits can accommodate 512 words. So the size of cache memory is 512 × 36. Generally a Set-Associative cache of set size K will accommodate K-words of main memory in every word of cache.
Figure: Two-Way Set-Associative Mapping Cache
What is binary adder? Binary adder is constructed with full adder circuit linked in cascade, with the output carry from one full adder linked to the input carry of next full ad
W To date we have discussed elementary high level language programming and low level assembler programming, one of the benefits of C is the integration of both , this requires a re
What is a binary tree? A binary tree 'T' is described as A finite set of elements, known as nodes, such that: either (i) or (ii) happens: (i) T is empty (known as the 'nu
Explain with the help of examples FIFO algorithms? FIFO policy: This policy easy removes pages in the order they arrived into the main memory. By using this policy we easily
TARGET = "_parent" "_parent" is used in a situation where a frameset file is nested inside another frameset file. A link in one of the inner frameset documents that uses "_par
Q. Explain Addressing modes in RISC? Simple addressing modes: Another benefit is the use of simple addressing modes. RISC machines employ simple register addressing having disp
With relevant logic diagram and truth table explain the working of a two input EX-OR gate. Ans. 2-Input EX-OR Gate: An EX-OR or Exclusive gate recognizes words that have an od
Advantages and Disadvantages of Public-key cryptography Advantages (i) Enhanced security and convenience (ii) Electronic records may be authenticated by affixing
An analysis, which determines the syntactic structure of the source statement, is called ? Ans. Syntax analysis that determines the syntactic structure of the source statement.
Hardware that calculates CRC (Cyclic Redundancy Check) uses: Hardware which computes CRC utilizes shift register and Xor unit.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd