Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Q1.

a) Compare and contrast the RISC and CISC instructions. Give their respective merits and demerits.

b) Give an illustration to describe zero-address, one-address and the two-address instructions.

c) Describe the role of symbolic micro-program and binary micro-program in micro-programmed control.

Q2.

a) Access time of the cache memory is 50 ns and that of main memory is 500 ns. It is estimated that 80% of the main memory requests are for read operation and the remaining are for prepare operation. The hit ratio for read access is just 0.9 and a prepare through policy which is used.

i) Find out the average access time of the system considering just memory read cycles?
ii) Find out the average access time of the system for both the read and prepare requests?
iii) Determine the hit ratio taking into consideration of prepare cycle?

b) Describe the need of memory hierarchy with the assist of a block diagram? Illustrate the reason for not having one big memory unit for storing all the information at one place?

c) Why page-table is needed in a virtual memory system. Describe various ways of organizing the page table.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M910375

Have any Question? 


Related Questions in Computer Engineering

The registration area has just opened at large convention

The registration area has just opened at large convention of building contractors in New York. There are 600 people arriving per hour (exponential interarrival times), and their cost of waiting in queue is valued at $40 ...

In the future klamaths separate voice network will be

In the future, Klamath's separate voice network will be dismantled. All voice, data, and video traffic will traverse the Metro Ethernet network. This will simplify the topology of the current voice/data network and facil ...

In a commentary piece on the rising cost of health

In a commentary piece on the rising cost of health insurance ("Healthy, Wealthy, and Wise," Wall Street Journal, May 4, 2004, A20), economists John Cogan, Glenn Hubbard, and Daniel Kessler state, "Each percentage-point r ...

Design and implement a class that uses an array to mimic

Design and implement a class that uses an array to mimic the behavior of the ArrayList class. Include as many methods from the ArrayList class as possible. Write a program to test your implementation.

Write a program to plot a horizontal bar chart of student

Write a program to plot a horizontal bar chart of student exam scores. Your program should get input from a file. The first line of the file contains the count of the number of students in the file, and each subsequent l ...

In a network using the selective-repeat protocol with m 4

In a network using the Selective-Repeat protocol with m = 4 and the sending window of size 8, the value of variables are S f = 62, S n = 67, and R n = 64. Packet 65 has already been acknowledged at the sender site; packe ...

You are currently working for a company with outdated

You are currently working for a company with outdated multimedia tools. Give proposal to your manager that includes the following: An overview describing how multimedia has evolved The tools or protocols you recommend fo ...

1 what does it mean to say that a product is cc or tcsec

1. What does it mean to say that a product is CC or TCSEC compliant? 2. Research and find out if there are any widely used computer product security evaluation criteria. 3. Using the product evaluation list for computer ...

1 explain why we have only one frame type in a wired lan

1. Explain why we have only one frame type in a wired LAN, but four frame types in a wireless LAN. 2. Do the MAC addresses used in an 802.3 (Wired Ethernet) and the MAC addresses used in an 802.11 (Wireless Ethernet) bel ...

The section on public key cryptosystems discussed

The section on public key cryptosystems discussed nonrepudiation of origin in the context of public key cryptosystems. Consider a secret key system (in which a shared key is used). Bob has a message that he claims came f ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro