Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) Describe the general operation of the following flags.

i) Z(Zero)

ii) C(Carry)

iii) N(Negetive)

iv) V (Overflow)

b) Draw a neat diagram of associative memory organization and describe the function of the following components .with necessary diagrams.

i) input register

ii) mask register

iii) output register

iv) match logic

v) match register

problem 2)a) Describe polled and daisy chain techniques of handling multiple interrupts with neat figures.

b) Consider a typical segment table as shown.

Segment number Segment base address     Segment length

      0                             0D116                    25816

      1                              8FC16                    00E16

The virtual address format is

|------3bits------|------9 bits------|
|--segment------|------offset------|

What are the physical address for the following virtual addresses?

i) 1FE16

ii) 20A16

c) A set associative cache has a total of 64 blocks divided into sets of 4 blocks each. Main memory has 1024 blocks with 16 words per block. How many bits are needed in each of the tag, set and word fields of the main memory address?

d) Suppose a main memory has 4 page frames and initially all page frames are empty. Consider the following stream of references:

1, 2, 3, 4, 5, 1, 2, 6, 1, 2, 3, 4, 5, 6, 5.

Compute the hit ratio using LRU replacement policy.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96535

Have any Question? 


Related Questions in Computer Engineering

The suggestion in the previous problem can result in a

The suggestion in the previous problem can result in a considerable overhead for the procedure calls to the insertion sort. An alternative and more effective approach is to postpone the insertion sorting until after all ...

A key feature of hybrid idps systems is event correlation

A key feature of hybrid IDPS systems is event correlation. After researching event correlation online, define the following terms as they are used in this process: compression, suppression, and generalization.

1 prove that any file in the dgux system with a link count

1. Prove that any file in the DG/UX system with a link count greater than 1 must have an explicit MAC label. 2. In the DG/UX system, why is the virus prevention region below the user region? 3. In the DG/UX system, why i ...

1 redesign the ticketcounterclass to implement a generic

1. Redesign the TicketCounterClass to implement a generic simulation class from which a user can derive their own simulation classes. 2. Design, implement, and test a computer program to simulate the checkout at a grocer ...

1 an organization is assigned the block 20001234142348 what

1. An organization is assigned the block 2000:1234:1423/48. What is the CIDR for the blocks in the first and second subnets in this organization? 2. Find the interface identifier if the physical address of the EUI is (F5 ...

In problem how far upstream does the flow from the source

In Problem, how far upstream does the flow from the source reach? Problem :- For the case of a source at the origin with a uniform free stream plot the streamline ψ = 0.

1what are the fundamental object oriented concepts2what is

1.What are the fundamental object oriented concepts? 2.What is inheritance? 3.What is abstraction? 4.What is polymorphism and what are its benefits? 5.What is encapsulation?

1 what are the inherent problems with iso 17799 and why

1. What are the inherent problems with ISO 17799, and why hasn't the United States adopted it? What are the recommended alternatives? 2. What documents are available from the NIST Computer Resource Center, and how can th ...

1 describe two types of variables or methods that can be

1.) Describe two types of variables or methods that can be used to exchange data between web pages and give example code of both types. 2.) Discuss authorization and authentication and explain forms-based-authentication. ...

Program a consists of 1000 consecutive add instructions

Program A consists of 1000 consecutive ADD instructions, while program B consists of a loop that executes a single ADD instruction 1000 times. You run both programs on a certain machine and find that program B consistent ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro