Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) Describe the general operation of the following flags.

i) Z(Zero)

ii) C(Carry)

iii) N(Negetive)

iv) V (Overflow)

b) Draw a neat diagram of associative memory organization and describe the function of the following components .with necessary diagrams.

i) input register

ii) mask register

iii) output register

iv) match logic

v) match register

problem 2)a) Describe polled and daisy chain techniques of handling multiple interrupts with neat figures.

b) Consider a typical segment table as shown.

Segment number Segment base address     Segment length

      0                             0D116                    25816

      1                              8FC16                    00E16

The virtual address format is

|------3bits------|------9 bits------|
|--segment------|------offset------|

What are the physical address for the following virtual addresses?

i) 1FE16

ii) 20A16

c) A set associative cache has a total of 64 blocks divided into sets of 4 blocks each. Main memory has 1024 blocks with 16 words per block. How many bits are needed in each of the tag, set and word fields of the main memory address?

d) Suppose a main memory has 4 page frames and initially all page frames are empty. Consider the following stream of references:

1, 2, 3, 4, 5, 1, 2, 6, 1, 2, 3, 4, 5, 6, 5.

Compute the hit ratio using LRU replacement policy.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96535

Have any Question? 


Related Questions in Computer Engineering

Cost and measurement analysisidentify two non-current

Cost and Measurement Analysis Identify two non-current assets and comment on how Yahoo values these two assets in the balance sheet. Does the Yahoo have other alternatives as to how they could value the two assets? Which ...

1 in a graph if we know that the shortest path from node a

1. In a graph, if we know that the shortest path from node A to node G is (A → B → E → G), what is the shortest path from node G to node A? 2. Assume the shortest path in a graph from node A to node H is A → B → H. Also ...

Write a function that counts the occurrences of a word in a

Write a function that counts the occurrences of a word in a string. The function should return an integer. Do not assume that just one space separates words and a string can contain punctuation. Write the function so tha ...

Foundations of informations1describe the hardware

Foundations of Informations 1. Describe the hardware components in a computer by relating them with objects, processes, or analogies from the real world. Which of these components do you think would make the biggest diff ...

1 both acls and c-list entries use owners users rather than

1: Both ACLs and C-List entries use "owners" (users) rather than individual processes. Why? 2: Alice can read and write to the file x, can read the file y, and can execute the file z. Bob can read x, can read and write t ...

1 evaluate the worst case time-complexity of the sparse

1. Evaluate the worst case time-complexity of the Sparse Matrix ADT implemented in Programming Project 9.7. 2. Provide the code to implement the four basic operations - traversal, search, insertion, deletion - for an uns ...

1 we said that tcp provides a connection-oriented service

1. We said that TCP provides a connection-oriented service between the two application programs. A connection in this case needs a connection identifier that distinguishes one connection from another. What do you think t ...

Cryptography projectlets suppose that alice and bob have

Cryptography Project Let's suppose that Alice and Bob have each a number n_A and respectively n_B between 1 and 10 and they want to know if they have the same number or not. The problem is that in case they don't have th ...

1 list and describe four vulnerability intelligence sources

1. List and describe four vulnerability intelligence sources. Of those that you listed, which seems the most effective? Why? 2. What does CERT stand for? Is there more than one CERT? What is the purpose of a CERT?

Assignmentinstructions while it may sound simple to

Assignment Instructions: While it may sound simple to validate your HTML code, it is often times difficult to understand the error messages validation services return. Using the W3C Markup Validation Service, validate an ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro