Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) Describe the general operation of the following flags.

i) Z(Zero)

ii) C(Carry)

iii) N(Negetive)

iv) V (Overflow)

b) Draw a neat diagram of associative memory organization and describe the function of the following components .with necessary diagrams.

i) input register

ii) mask register

iii) output register

iv) match logic

v) match register

problem 2)a) Describe polled and daisy chain techniques of handling multiple interrupts with neat figures.

b) Consider a typical segment table as shown.

Segment number Segment base address     Segment length

      0                             0D116                    25816

      1                              8FC16                    00E16

The virtual address format is

|------3bits------|------9 bits------|
|--segment------|------offset------|

What are the physical address for the following virtual addresses?

i) 1FE16

ii) 20A16

c) A set associative cache has a total of 64 blocks divided into sets of 4 blocks each. Main memory has 1024 blocks with 16 words per block. How many bits are needed in each of the tag, set and word fields of the main memory address?

d) Suppose a main memory has 4 page frames and initially all page frames are empty. Consider the following stream of references:

1, 2, 3, 4, 5, 1, 2, 6, 1, 2, 3, 4, 5, 6, 5.

Compute the hit ratio using LRU replacement policy.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96535

Have any Question? 


Related Questions in Computer Engineering

Assignment doorstep treats guithis assignment will assess

Assignment: Doorstep Treats GUI This assignment will assess the competency: 1. Explain Windows Command Line and Forms applications 2. Demonstrate Windows Form design

Consider the uc davis policy on reading electronic mail a

Consider the UC Davis policy on reading electronic mail. A research group wants to obtain raw data from a network that carries all network traffic to the Department of Political Science. a. Discuss the impact of the elec ...

Purposedemonstrate the ability to implement and use

Purpose Demonstrate the ability to implement and use structured data types utilizing the facilities of the C programming language. Assignment Write a program that simulates a soft drink machine. Your program will consist ...

1 describe the critical characteristics of information how

1. Describe the critical characteristics of information. How are they used in the study of computer security? 2. Identify the six components of an information system. Which are most directly affected by the study of comp ...

What is the relationship between increased social

What is the relationship between increased social responsibility and IT at the workplace? Answer in about two paragraphs with reference. Must be 200-400 words and show an understanding and full development of the concept ...

1 write a method in java to find the last address in the

1. Write a method in Java to find the last address in the block when one of the addresses in the block is given as a string representing a CIDR notation. 2. Write a method in Java to find the size of a block when one add ...

1 develop an equation that computes how many links in the

1. Develop an equation that computes how many links in the n-cube (where n is the order of the cube) can fail and we can still guarantee an unbroken link will exist to connect any node in the n-cube. 2. Compare the resil ...

Different types of distributions in this model we used a

Different types of distributions In this model we used a mean and discussed how to use variance to characterize the results of multiple runs. This characterization assumes that the distribution of data can be described u ...

Assignmentlego mindstorms line following algorithmlego

Assignment Lego Mindstorms Line following algorithm Lego Mindstorms have EV3 robots which can be modified to do assignments, one time or over and over. We utilize the software Lego Mindstorms which has in-fabricate alter ...

Consider an ethernet segment with propagation delay between

Consider an Ethernet segment with propagation delay between any two nodes at most 225 bit times. Assuming the smallest possible Ethernet frame to be 576 bits (which it is), can a host transmit a frame without detecting a ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro