Calculate access time when there is cache miss

Assignment Help Basic Computer Science
Reference no: EM1388066

A single level cache has following specifications.

Access time = 2.5 ns
Line size = 64 bytes
Hit ratio = 0.95

Main memory uses the block transfer capability, and has first word (4 bytes) access time of 50 ns and access time for following words as 5 ns.

Calculate the access time when there is cache miss? Suppose that cache waits until line has been fetched from main memory and then re-executes for a hit.

Will increasing line size to 128 bytes, and resulting increase in H (hit ratio) to .97, decrease average memory access time?

Reference no: EM1388066

Questions Cloud

Expected values of a discrete random variable : When the conditionally and unconditionally expected values of a discrete random variable would be different?
Harvard pilgrim health care and eag : Find out the site for Harvard Pilgrim Health Care and Harvard Pilgrim Ethics Advisory Group (EAG). How is the EAG's involvement of a broad group of stakeholders facilitate accountability.
What are the main selling points that you would stress : What are the main selling points that you would stress in this package? Why would you choose those selling points?
Difference between billable revenue and collections : Determine the difference between billable revenue and collections. Discuss how a medical office might be helped or hindered by a disparity between receivables and collections.
Calculate access time when there is cache miss : Calculate the access time when there is cache miss? Suppose that cache waits until line has been fetched from main memory and then re-executes for a hit.
Discrete random variables : 1. What do discrete random variables describe? 2. Explain joint probability. 3. Explain conditional probability.
Strategic alliances joint ventures and cooperative : Strategic alliances, joint ventures, and cooperative agreements between domestic and foreign firms are a potentially fruitful means for the partners to
Components of the urine : Determine which components of the urine would be raised if a person were on a very low carbohydrate, weight-reducing diet? Explain the process involved?
Discuss a health care news situation : Determine and Discuss a health care news situation that affects a healthcare organization such as a hospital, clinic or insurance company.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Explain type to reveal computer to be computer

Explain why you think these questions would be the type to "reveal" the computer to be a computer? Why would these responses have to be given a human begin?

  Encourage cooperation consistent with standards

Encourage cooperation from all, make it suitable to clean up, be consistent with standards - Who will put it away? Explain where will it be put away? When will it be put away?

  Explaining notifier sends e-mail to system administrator

Suppose a notifier sends e-mail to the system administrator when a successful compromise of that system is detected. What are the drawbacks of this approach?

  Explain statement of purpose-pre- and post-conditions

Write specifications for a method that advances any given date by one day. Include a statement of purpose, pre- and post-conditions, and a description of the parameters.

  Use active directory to establish security group memberships

How would you manage creation of novel user accounts in this organization? Utilizing Active Directory to establish security group memberships or manual creation and security.

  Describe why analyst needs to understand how people think

Describe why an analyst requires to understand how people think, how they learn, how they react to change, how they communicate, and how they work.

  Explain applications of pervasive computing

Which of the applications of pervasive computing do you believe are probable to gain greatest market acceptance over next few years? Why?

  Compare how the gestures data is generated and represented

Analyze the accuracy of the input generated by each of the following input devices compared to electrical signals based methods of processing

  What to consider before selecting product for system

National Information Assurance Partnership website, why is this not enough to just say "this product meets our security requirements"? Discuss what else you have to consider before selecting such a product for a system.

  Encrypting a message by crypto device

Crypto device encrypts every message into 20 bits of ciphertext.

  Explaining network attacker steal secure google cookies

Explain how a network attacker (an active attacker that can intercept or forge network packets, etc.) could steal secure google.com cookies.

  Evaluate project at work or home where scope creep occured

Evaluate a situation or project either at work or at home where scope creep occurred. Describe the situation, including the additions to the scope and what could have been done differently to reduce.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd