Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. Why are high-speed memories required? Is the main memory not a high-speed memory?
The answer to second question is absolutely 'No' though why so? Then if memories are slower then how slow are they? On an average it has been found that operating speed of main memories lack by a factor of 5 to 10 than the speed of processors (like CPU or Input / Output Processors).
Additionally every instruction needs numerous memory accesses (it may range from 2 to 7 or even more sometimes). If an instruction needs even 2 memory accesses even then nearly 80% of time of executing an expression, processors waits for memory access.
The main question is what can we do to increase this processor-memory interface bandwidth? There are four potential answers to the question which are:
a) Reduce memory access time; use a faster though costly technology for main memory.
b) Access more words in a single memory access cycle which is in place of accessing one word from memory in a memory access cycle access more words.
c) Insert a high-speed memory called as Cache between processor and main memory.
d) Use associative addressing in place of random access.
The total number of class of IP address are? The total number of class of IP addresses are 5.
How the transaction that are programmed by the user can be protected? By executing an authority check.
In IP addressing scheme, class used for multicasting is: A class used for multicasting in IP addressing scheme is class D.
A component can handle its own events by executing the needed event-listener interface and adding itself as its own event listener.
CIH, also known as Chernobyl or Spacefiller, is a Microsoft Windows computer virus which first emerged in 1998. It is one of the most damaging viruses, overwriting critical inform
Hiding data within the class and making it available only by the methods. This method is used to protect your class against accidental changes to fields, which might leave the clas
Accessing the Operands: operands are usually place in one of two places: -registers (32 int, 32 fp) -memory (232locations) registers are -simple to spe
What is pipelining? It is a method of decomposing a sequential process into sub-operations, with each sub-process being implemented in a special dedicated segment that operates
TCP and UDP are both transport-level protocols. TCP is designed to give reliable statement across a variety of reliable and unreliable networks and internets. UDP gives a conne
Q. Explain Register Indirect Addressing? In this addressing technique the operand is data in memory pointed to by a register. Or we can say in other words that the operand fie
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd