Explaining initial values of cache tags and cache lines

Assignment Help Basic Computer Science
Reference no: EM1351868

Q1) Consider a system with a direct-mapped cache of size 128 (= 27) bytes, and a main memory of size of 1 KB (i.e. 1024 or 210 bytes). Each cache line contains 8 bytes. A program running on the system accesses the following locations in the first ten steps:

1 10 1010 0100,
2 10 1010 1000,
3 10 1010 0100,
4 01 0000 0000,
5 00 1010 0000,
6 00 1010 1100,
7 00 1010 0100,
8 01 0000 0000,
9 10 1010 0000,
10 01 0000 0000

Assuming that the initial values of the cache tags and the cache lines are completely arbitrary, show which accesses will lead to a hit, and which will cause to a miss. Also, show how the cache tags will change for each of the above steps. You should justify your answer.

Reference no: EM1351868

Questions Cloud

Explain how many years would it take for it to double : If the average employee compensation grew at the rate of 3.5% per year, explain how many years would it take for it to double.
Intellectual capital : Would you consider Google's organizational structure an intellectual capital asset? Why or why not? Support your position.
Importance of nutrition-infancy and toddler-hood period : Briefly describe the importance of nutrition during the Infancy and Toddler-hood period. Summarize pediatric recommendations regarding early feeding and the introduction to cow's milk and sold foods
Explain the two systems cannot communicate with each other : Explain the two systems cannot communicate with each other where David Warmdigit a production manager at HandZone
Explaining initial values of cache tags and cache lines : Assuming that the initial values of the cache tags and the cache lines are completely arbitrary, Also, show how the cache tags will change for each of the above steps. You should justify your answer.
What will happen to output assume that consumer confidence : Suppose that consumers decide to consume less (and therefore to save more) for any given amount of disposable income. Specifically, assume that consumer confidence (c0) falls. What will happen to output.
Customer satisfaction survey : Questions is primarily used for demographical purposes in order to pinpoint specific ages, gender and marital statistics that our product or services are targeting.
Determine the amount of post-retirement expenses : The following information is related to the Hedge Corporation post-retirement benefits plan for 2011. Determine the amount of post-retirement expenses for 2011.
Early and middle adulthood roles : Discuss two roles that can be acquired during early and middle adulthood, such as through parenthood, romantic relationships, and career. How have these roles changed through past generation?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Analysis of executive management team

Give a one to two page analysis summarizing the results to the executive management team of Omega.

  Computing effective cpi of computer

Workstation uses a 15-MHZ processor with claimed 10-MIPS rating to execute a given programme mix. Suppose a one-cycle delay for each memory access. Compute effective CPI of this computer ?

  Information security problem or issue in organisation

Illustrate how the work breakdown structure would identify and plan an information security problem or issue in the organisation.

  Website has a duty to be familiar with drug laws

Assume a foreign website sells drugs which are not approved by regulatory agencies for sale to citizens of another country. Do you believe that website has a duty to be familiar with drug laws throughout the world?

  Feature set of free helix forensics cd

Visit Helix web site and read about feature set of free Helix forensics CD. Note that documentation for Helix is not on CD, to keep it down to ~700MB.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Threat to ships-which manufactures have instituted control

Provide two examples of threats to boats/ships for which manufactures and/or regulators have instituted controls. Describe the vulnerabilities for which the controls were created.

  Explaining framework software architecture

Terms architectural style, architectural pattern, and framework are frequently encountered in discussions of software architecture.

  Identify all substrings to create one of five given words

Given a string of letters, identify all substrings that create one of five given words. For example, if the words (arguments) are: structure; such; system; blue.

  How lseek call makes a seek to file

Where lseek call makes a seek to byte 3 of file. What does buffer comprise after the read has completed?

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Assigning value to last array of array list

Write a statement that assigns the value 160000 to the last element of the ArrayList salaryStep.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd