Calculate access time when there is cache miss

Assignment Help Basic Computer Science
Reference no: EM1388066

A single level cache has following specifications.

Access time = 2.5 ns
Line size = 64 bytes
Hit ratio = 0.95

Main memory uses the block transfer capability, and has first word (4 bytes) access time of 50 ns and access time for following words as 5 ns.

Calculate the access time when there is cache miss? Suppose that cache waits until line has been fetched from main memory and then re-executes for a hit.

Will increasing line size to 128 bytes, and resulting increase in H (hit ratio) to .97, decrease average memory access time?

Reference no: EM1388066

Questions Cloud

Expected values of a discrete random variable : When the conditionally and unconditionally expected values of a discrete random variable would be different?
Harvard pilgrim health care and eag : Find out the site for Harvard Pilgrim Health Care and Harvard Pilgrim Ethics Advisory Group (EAG). How is the EAG's involvement of a broad group of stakeholders facilitate accountability.
What are the main selling points that you would stress : What are the main selling points that you would stress in this package? Why would you choose those selling points?
Difference between billable revenue and collections : Determine the difference between billable revenue and collections. Discuss how a medical office might be helped or hindered by a disparity between receivables and collections.
Calculate access time when there is cache miss : Calculate the access time when there is cache miss? Suppose that cache waits until line has been fetched from main memory and then re-executes for a hit.
Discrete random variables : 1. What do discrete random variables describe? 2. Explain joint probability. 3. Explain conditional probability.
Strategic alliances joint ventures and cooperative : Strategic alliances, joint ventures, and cooperative agreements between domestic and foreign firms are a potentially fruitful means for the partners to
Components of the urine : Determine which components of the urine would be raised if a person were on a very low carbohydrate, weight-reducing diet? Explain the process involved?
Discuss a health care news situation : Determine and Discuss a health care news situation that affects a healthcare organization such as a hospital, clinic or insurance company.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Decision to utilize components influence requirements

Must RMO consider using purchased components in the new CSS? If so, When, must it begin looking for components? How will decision to utilize components influence requirements, design and implementation phases?

  Signed-magnitude representations binary numbers in computers

Why do we require signed-and-magnitude representations of binary numbers in computers? Represent decimal values: -37, -54, and 56 in binary by using signed-and magnitude representation.

  Describe why suggestion of connecting by twisted pair cable

Describe why you would suggest connecting all current and new client computers using twisted pair cable instead of staying with the current coax wiring structure.

  Describe the five forces model

Describe the Five Forces Model. What role does the Five Forces Model play in decision making? Define a database management system and discuss each of the five important software components of a database management system.

  Explain how decision problem is decidable

Think of the way to mark all variables A such that for some string x ∈ Σ*, A (⇒*(over)G) x. Describe algorithm in detail.

  Determining most effective it projects

Not sure what will suit their requirements in achieving better organization between branches by updating their information systems. What will you suggest they do to find out most effective IT projects?

  Key principles on smart phone devices gps tracking system

How to apply these key principles on smart phone devices GPS tracking system/software to mitigate user personal information be exposed undesirably.

  Effective method to find attack on computer network

Find the most effective method to find out if attack has been made on computer network?

  Corporate agency policy on employee use of instant messaging

What specific questions should a corporate or government agency policy on "Employee use of Instant Messaging (IM) using corporate computers" address?

  Factors finding whether something is politically feasible

Describe political feasibility. What factors go into determining whether something is politically feasible in an organization? Answers may include whether a sponsor exists

  Program to randomly select three numbers

Write a program to randomly select the numbers of 3 finalist to recieve a prize. Make sure not to pick the same number twice.

  Identify system operation and section of it shop

Write down the four major support activities you require to be aware of, and what is critical requirement for each of these activities.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd