Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) Describe the general operation of the following flags.

i) Z(Zero)

ii) C(Carry)

iii) N(Negetive)

iv) V (Overflow)

b) Draw a neat diagram of associative memory organization and describe the function of the following components .with necessary diagrams.

i) input register

ii) mask register

iii) output register

iv) match logic

v) match register

problem 2)a) Describe polled and daisy chain techniques of handling multiple interrupts with neat figures.

b) Consider a typical segment table as shown.

Segment number Segment base address     Segment length

      0                             0D116                    25816

      1                              8FC16                    00E16

The virtual address format is

|------3bits------|------9 bits------|
|--segment------|------offset------|

What are the physical address for the following virtual addresses?

i) 1FE16

ii) 20A16

c) A set associative cache has a total of 64 blocks divided into sets of 4 blocks each. Main memory has 1024 blocks with 16 words per block. How many bits are needed in each of the tag, set and word fields of the main memory address?

d) Suppose a main memory has 4 page frames and initially all page frames are empty. Consider the following stream of references:

1, 2, 3, 4, 5, 1, 2, 6, 1, 2, 3, 4, 5, 6, 5.

Compute the hit ratio using LRU replacement policy.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96535

Have any Question? 


Related Questions in Computer Engineering

1 determine the 4-point dft matrix d4 and the corresponding

1. Determine the 4-point DFT matrix D4 and the corresponding inverse DFT matrix D -1 4. 2. This problem investigates zero padding applied in the frequency domain. Plot each N-point DFT as a function of frequency fk = k/N ...

1 implement the function treesizeroot which computes the

1. Implement the function treeSize(root), which computes the number of nodes in a binary tree. 2. Implement the function treeHeight(root), which computes the height of a binary tree. 3. Implement the computeOp(lvalue, op ...

Describe how exactly you would perform a collision search

Describe how exactly you would perform a collision search to find a pair x1, x2, such that h(x1) = h(x2) for a given hash function h. What are the memory requirements for this type of search if the hash function has an o ...

1 discuss the concept of global privilege does it work well

1. Discuss the concept of global privilege. Does it work well in a distributed authorization or centralized authorization? 2. With the principle of "least privileged," is it possible to have too much authorization? What ...

Assignment -you can generally assume that code shown in the

Assignment - You can generally assume that code shown in the questions is intended to be syntactically correct, unless something in the question or one of the answers suggests otherwise. Q1. Given the following statement ...

When people describe client-server architecture they are

When people describe client-server architecture, they are usually referring to a system in which a large server is serving a client on a PC. With X Window, the reverse is frequently the case. Explain.

1 does the recursive implementation of the binary search

1. Does the recursive implementation of the binary search algorithm from Listing 2. exhibit tail recursion? If not, why not? 3. Determine the worst case run time of the recursive exponential function exp(). 4. Determine ...

1 a deque pronounced deck is similar to a queue except that

1. A deque (pronounced "deck") is similar to a queue, except that elements can be enqueued at either end and dequeued from either end. Define a Deque ADT and then provide an implementation for your definition. 2. Design ...

Write a java program that allows to generate a random

Write a java program that allows to: Generate a random integer number between 20 and 100. Ask the user to find the number by giving propositions (or guessing). The program gives feedback to the user if the proposed numbe ...

Discuss the different types of attacks launched against usb

Discuss the different types of attacks launched against USB devices and counter measure users can take to protect their devices.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro