How many blocks of main memory are there

Assignment Help Operating System
Reference no: EM13942783

1. A computer using direct-mapped cache has 2^24 words of main memory and a cache of 256 blocks. Each cache block contains 64 words.

a) How many blocks of main memory are there?

b) What is the format of a memory address as seen by the cache? (What are the sizes of the tag, block and word fields?)

c) To which block will the memory reference 01BD36 (in hexadecimal) map?

2. A computer using fully-associative cache has 2^32 words of main memory and a cache of 1024 blocks. Each cache block contains 32 words.

a) How many blocks of main memory are there?

b) What is the format of a memory address as seen by the cache? (What are the sizes of the tag, block and word fields?)

c) To which block will the memory reference 025A13CF (in hexadecimal) map?

Reference no: EM13942783

Questions Cloud

What is the impact of unionization on employment laws : What is the impact of unionization on employment laws? How has the creation of employment laws impacted union membership?
Set of clearly defined operational outcomes : Produce a set of clearly defined operational outcomes To achieve a Pass you must explain how a firm may achieve the operational outcomes as represented by the five performance objectives.
Re-emerging infectious diseases discussion : As presented in this week's readings, many individuals actually acquire infections as a result of being treated in a hospital. As you know, hospitals are no longer being reimbursed for services required when patients acquire these types of infecti..
Discussing the pros and cons of the process : Machining of composites can be classified as conventional machining and non-traditional machining. Among each category, there are many processes. Describe each of those processes, by giving the brief definition of the process, listing the machine..
How many blocks of main memory are there : To which block will the memory reference 025A13CF (in hexadecimal) map?
Components of a research project : For the Application, you will select two articles from a list, identify the components of a research project and evaluate the strengths and weaknesses of the articles.
Role of the company acting as moral agent : Task: This task asks you to assess the role of the company acting as moral agent.
Evaluate critical path analysis and network planning : To achieve a pass you must define and explain critical path analysis in terms of dependent and independent tasks, flow charts and network planning and you must explain how critical path can be applied to, or is used, in your company.
Do we see evidence of diminishing marginal product : At what point (in terms of workers) do we see evidence of diminishing marginal product? At the point (in terms of number of workers) 3 we see evidence of diminishing marginal product.

Reviews

Write a Review

Operating System Questions & Answers

  Comprehensive network installation plan

Determine the main steps that should be included in a comprehensive network installation plan. In your opinion, what are the 2most important steps in ensuring success of the network?

  Question about it planning

Some companies think that IT planning is a waste of time because the competitive environment and technologies change too rapidly.

  Assessing security risks

In your new position at XYZ Company, you have been asked to lead a risk assessment group. As part of your assignment to assess security risks for the computing infrastructure.

  Network crashes are hypothesized

Assume we are using Lamport's hash, and Bob's system crashes before receiving Alice's reply to a message.

  Explain the design goals of windows xp

Explain the design goals of Windows XP and describe the booting process for Windows XP system

  Explian wired and wireless media

Discuss and explian wired and wireless media along with the drawbacks and benefits of each also Discuss the channel signaling systems used in voice communication along with the drawbacks and benefits of each.

  Draw curves for throughput-delay and power

Assume two hosts A and B are connected via router R. A-R link has infinite bandwidth; A-R link has infinite bandwidth; draw curves for throughput, delay, and power, each as function of load.

  Operating system security fundamentals

1. Explain the function of an operating system. 2. Describe the operating system security environment from a database perspective.

  Computer privacy related question

One of the main concerns with the expanding influence of information technology is issue of personal privacy. As more and more individuals and businesses are using computers to transact business and store data the protection of individual privacy is ..

  Determine largest value for which system is schedulable

Assume that four events need 35,20,10, and x me=sec of CPU time, respectively. Determine the largest value of x for which system is schedulable?

  Design several security awareness posters

With the help of graphics program, design many security awareness posters on the following themes, updating antivirus signatures, watching out for e-mail viruses.

  Discuss mitigation strategies

It is determined that 3-out of 5-businesses that experience downtime of forty-eight hours or more will be out of business within three years.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd