Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
(a) How does a data cache take advantage of spatial locality? Give an suitable example.
(b) What are the basic differences between a write-allocate and no-write-allocate policy in a cache?
(c) With the help of a fully labeled diagram, distinguish between direct and related mapping in cache memory?
(d) One example of a semiconductor memory is the DRAM
(i) Describe why a 16 Mbit DRAM chip is better being organised as compared a (2048 x 2048) x 4-bit array instead of 1M of 16 bit words.
(ii) Show a typical block diagram of the array, showing the row and column buffer blocks, refresh circuitry amongst others.
(iii) Approximately how many transistors and capacitors are required to construct a 4 MB DRAM?
(e) Describe two reasons why SRAM could be better than DRAM.
(f) Briefly explain how a multiple platter hard disk works.
Write an ALP to count positve and numbers from array.
Q. What do you mean by Daisy chain? This scheme provides a hardware poll. With this scheme, an interrupt acknowledge line is chain by different interrupt devices. All I/O inter
Determine the equivalent Gray code for decimal number 6 ? Ans. The equivalent Gray code for decimal number 6 is 0101 Because the Decimal number 6 is equivalent to binary nu
How to draw the pipe and filter using data flow and it components and connectors
Q. Fundamental issues of concerns for instruction set design? A number of fundamental issues of concerns for instruction set design are: Completeness: For an early design
A phonetic password generator picks two segments randomly for each six letter password. form is CVC. what is the total password population? 1> what is the total password population
The success of a system relies on the approach of building it. If development approach is right then system will work successfully. Figure below portrays a System Development Life
Common channel signalling in SS7 is (A) out band control channel. (B) In band control channel. (C) Speech control channel. (D) None of the above. Ans:
When the get cursor command used in interactive lists? If the hidden information is not enough to uniquely recognize the selected line, the command GET CURSOR is used. The GET
Define underflow and overflow. Underflow: If the result the arithmetic operation including n-bit numbers is too small to show by n-bits, underflow is said to occur. Overflow
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd