Calculate performance of cache and the average cpi

Assignment Help Basic Computer Science
Reference no: EM1361301

A program consists of 19.8% Loads, 5.6% Stores and 74.6% other instructions. Without memory stalls, average CPIs for these three categories of instructions are 1, 2, and 1, respectively. Assume a cache read hit takes 1 clock cycle, the cache miss penalty is 50 clock cycles. Finally, assume the instruction cache miss rate is 0.5% and the data cache miss rate is 1%. Calculate the performance of the cache (CPU execution time) and the average CPI.

Reference no: EM1361301

Questions Cloud

High-intensity exercise of equal total caloric expenidture : Why does regular low-intensity exercise stimulate greater body fat loss than high-intensity exercise of equal total caloric expenidture?
What would be price and profit levels would prevail based : What would be price and profit levels would prevail based on the assumption that a new entry into the local market results in competitive market pricing.
Compute the difference in monthly payments : Compute the difference in monthly payments on a $100,000 mortgage, 30-years at 97 percent interest rate and a $100,000 mortgage, 15-years at 8.5 percent interest rate.
Find the work done by this force on the particle : Find the work done by this force on the particle.
Calculate performance of cache and the average cpi : Assume the instruction cache miss rate is 0.5% and the data cache miss rate is 1%. Calculate the performance of the cache (CPU execution time) and the average CPI.
Teaching to patients and nursing staff : What is the demonstrated applicability of teaching to patients and nursing staff?
Creating a powerpoint on roles of participants in hiring : Creating a PowerPoint on the roles of participants in the hiring process - Formulate a plan, including a flowchart, on the participants' roles for the hiring process. Include the following:
Explain why would elasticity of demand be important to you : Explain why would elasticity of demand be important to you in determining the products on which the taxes should be leived.
Assuming the boats acceleration remains the same : What is the distance Delta y_max-min between the second maximum of laser 1 and the third minimum of laser 2, on the same side of central maximum.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Connection between business and information system functions

Give a brief overview/answer of each: Involving individuals with various perspectives in system analysis and design activities and Connection between business and information system functions.

  Decreasing risk of malicious attacks in personal systems

Security budgets is devoted to decreasing risk of malicious attacks. What threats are you aware of when it comes to the personal systems and systems at job

  Writing viruses-worms and trojan horses

Course taught students how to write viruses, worms, and Trojan Horses. It also explained the history of computer viruses as well as how to block attacks.

  Creating presentation to law school class on digital crime

You have been asked to present a presentation to law school class on digital crime. After presentation, a student asks why so few people are really prosecuted for computer crime.

  Simulating problem for arriving for lunch at restaurant

Customers for lunch arrive into a restaurant at Exponential rate of 10 per hour for seated service and at  Exponential rate of 15 per hour for buffet. Simulate this problem for 8 hours using minutes as the basic time units.

  Changing conditions significant influence on way health

What changing conditions do you think have the most significant influence on way the health information is managed today? Why?

  Information culture have negative impact on apple-s business

Which of the given information cultures would have the greatest negative impact on Apple's business? Information-functional culture, Information-sharing culture.

  Explaining stepwise refinement and refactoring

Are stepwise refinement and refactoring the equivalent thing ? If not, describe how do they vary? Term component is sometimes a difficult one to define.

  Expalining protocols essential in data communications

What is meant by protocol? Why are protocols essential in data communications?

  Monitoring performance of it acquisition projects

Who is or should be responsible for monitoring the performance of IT acquisition projects and taking action that may result in cancelling the project?

  Executing critical section in mutual exclusion protocol

In Lamport's mutual exclusion protocol, if process i is implementing critical section.

  Determining contents of memory of specified address

Find the contents of memory from address 0x1800 up to, but not including, 0x1809, after this code is executed.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd