Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) Describe the general operation of the following flags.

i) Z(Zero)

ii) C(Carry)

iii) N(Negetive)

iv) V (Overflow)

b) Draw a neat diagram of associative memory organization and describe the function of the following components .with necessary diagrams.

i) input register

ii) mask register

iii) output register

iv) match logic

v) match register

problem 2)a) Describe polled and daisy chain techniques of handling multiple interrupts with neat figures.

b) Consider a typical segment table as shown.

Segment number Segment base address     Segment length

      0                             0D116                    25816

      1                              8FC16                    00E16

The virtual address format is

|------3bits------|------9 bits------|
|--segment------|------offset------|

What are the physical address for the following virtual addresses?

i) 1FE16

ii) 20A16

c) A set associative cache has a total of 64 blocks divided into sets of 4 blocks each. Main memory has 1024 blocks with 16 words per block. How many bits are needed in each of the tag, set and word fields of the main memory address?

d) Suppose a main memory has 4 page frames and initially all page frames are empty. Consider the following stream of references:

1, 2, 3, 4, 5, 1, 2, 6, 1, 2, 3, 4, 5, 6, 5.

Compute the hit ratio using LRU replacement policy.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96535

Have any Question? 


Related Questions in Computer Engineering

Design and implement an algorithm that performs insertions

Design and implement an algorithm that performs insertions and deletions on a doubly linked list. In a doubly linked list each node has two pointers (except at the head and tail), one to its successor and one to its pred ...

Learning objectives and outcomesyou will review the fourth

Learning Objectives and Outcomes You will review the Fourth Amendment and will be able to analyze the specific exceptions to the application of this right. Assignment Requirements In this assignment, you need to work on ...

1 the issue of binding assurance requirements to functional

1: The issue of binding assurance requirements to functional requirements versus treating them as mutually exclusive sets has been debated over the years. Which approach do you think is preferable, and why? 2: What are t ...

Computer modeling and chaos theory chaos theory was

Computer modeling and chaos theory Chaos theory was developed from traditional equation-based modeling, but one of its inspirations came from computer modeling. Edward Lorenz discovered that mathematical systems could pr ...

What are some of the best practices that are used to

What are some of the best practices that are used to optimize networks and what might be some of the pitfalls that can arise from poor network documentation?

1 assume a 64 kib direct-mapped cache with a 32-byte block

1. Assume a 64 KiB direct-mapped cache with a 32-byte block. What is the miss rate for the address stream above? How is this miss rate sensitive to the size of the cache or the working set? How would you categorize the m ...

Sql research paperwrite a 4 page technical paper about the

SQL Research Paper Write a 4 page technical paper about the following topic: Topic : NOSQL as a mechanism for storage and retrieval of data. Your paper may include any or some of the following themes: • It must have a te ...

1 what capabilities should a wireless security toolkit

1. What capabilities should a wireless security toolkit include? 2. What is biometric authentication? What does the term biometric mean? 3. Are any biometric recognition characteristics considered more reliable than othe ...

1 how many invalid unused code sequences can we have in

1. How many invalid (unused) code sequences can we have in 5B/6B encoding? How many in 3B/4B encoding? 2. What is the result of scrambling the sequence 11100000000000 using each of the following scrambling techniques? As ...

This exercise asks you to consider sources of errors in

This exercise asks you to consider sources of errors in thumbprints (see Section 25.6.2.3). Recall that a thumbprint is computed from the contents of a connection over some interval of time. Consider clocks on two differ ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen