Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Use the following information for questions 12-14. Consider a machine with byte addressable main memory of 224 bytes, and block (word) size of 4 bytes

image text in transcribed
Use the following information for questions 12-14. Consider a machine with byte addressable main memory of 224 bytes, and block (word) size of 4 bytes (32-bit processor), and 16 lines (64 bytes) of cache with this machine. 12. How 24 bit address is divided into tag, line number and byte number for direct mapped cache? naoned a. Tag 22 bits, line 0, byte offset -2 bits b. Tag 16 bits, line 5, byte offset-3 bits c. Tag 18 bits, line- 4, byte offset 2 bits d. Tag 17 bits, line 4, byte offset -2 bits 13. How 24 bit address is divided into tag, line number and byte number for fully-associative cache? a. Tag 22 bits, line 0, byte offset - 2 bits b. Tag 18 bits, line 4, byte offset- 2 bits c. Tag 18 bits, line-0, byte offset 2 bits d. Tag 17 bits, line 4, byte offset- 3 bits 14. How 24 bit address is divided into tag, line number and byte number for two-way set associative cache? a. Tag 20 bits, line 2, byte offset 2 bits b. Tag- 16 bits, line 5, byte offset 3 bits c. Tag 18 bits, line -4, byte offset 2 bits d. Tag 19 bits, line 3, byte offset 2 bits 15. What is ROM used for, in a computer? Storing system BIOS and calibration tables a. b. Storing the user program Storing the operating system Storing the log of events c. d. 16. What type of memory cells are used to build cache? a. FLASH b. ROM c. DRAM d. SRAM 17. Assume FIFO replacement policy is used and all the variables in the program below map to set 1 a two-way set associative cache. What would be in set I upon the complete execution of the program? Mov eax, varl Mov ebx, var2 Mov ecx, var3 Mov edx, var4 Mov eax var5 a. Var5, and var2 b. Var4 and var c. Var3 and var5 d. Var4 and varl

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Securing SQL Server Protecting Your Database From Attackers

Authors: Denny Cherry

1st Edition

1597496251, 978-1597496254

More Books

Students also viewed these Databases questions

Question

What is meant by planning or define planning?

Answered: 1 week ago

Question

Define span of management or define span of control ?

Answered: 1 week ago

Question

What is meant by formal organisation ?

Answered: 1 week ago

Question

What is meant by staff authority ?

Answered: 1 week ago