Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Q1.

a) Compare and contrast the RISC and CISC instructions. Give their respective merits and demerits.

b) Give an illustration to describe zero-address, one-address and the two-address instructions.

c) Describe the role of symbolic micro-program and binary micro-program in micro-programmed control.

Q2.

a) Access time of the cache memory is 50 ns and that of main memory is 500 ns. It is estimated that 80% of the main memory requests are for read operation and the remaining are for prepare operation. The hit ratio for read access is just 0.9 and a prepare through policy which is used.

i) Find out the average access time of the system considering just memory read cycles?
ii) Find out the average access time of the system for both the read and prepare requests?
iii) Determine the hit ratio taking into consideration of prepare cycle?

b) Describe the need of memory hierarchy with the assist of a block diagram? Illustrate the reason for not having one big memory unit for storing all the information at one place?

c) Why page-table is needed in a virtual memory system. Describe various ways of organizing the page table.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M910375

Have any Question? 


Related Questions in Computer Engineering

1 when a party makes a local telephone call to another

1. When a party makes a local telephone call to another party, is this a point-to point or multipoint connection? Explain the answer. 2. Compare the telephone network and the Internet. What are the similarities? What are ...

Nutty hospital wishes to advance-refund its existing 15

Nutty Hospital wishes to advance-refund its existing 15% long-term debt. The present $30,000,000 is not callable until 5 years from today. The payout on the issue over the next 5 years is as presented in table 21-14. At ...

Suppose an n x n image u is mapped into a row-ordered n2 x

Suppose an N x N image U is mapped into a row-ordered N 2 x 1 vector IP. Show that the N 2 x N 2 one-dimensional Hadamard transform of IP gives the N x N twodimensional Hadamard transform of U. Is this true for the other ...

1 the chapter mentioned reconnaissance attacks do some

1. The chapter mentioned reconnaissance attacks. Do some research to learn more about the tools that attackers use when on a reconnaissance mission. In your own words, describe two tools that you researched. 2. What inve ...

What is the relationship between hvac and physical security

What is the relationship between HVAC and physical security? What four physical characteristics of the indoor environment are controlled by a properly designed HVAC system? What are the optimal temperature and humidity r ...

To make the initial sequence number a random number most

To make the initial sequence number a random number, most systems start the counter at 1 during bootstrap and increment the counter by 64,000 every half second. How long does it take for the counter to wrap around?

Anyone who is involved in many activities typically uses a

Anyone who is involved in many activities typically uses a calendar to keep track of the various activities. Colleges commonly maintain several calendars such as an academic calendar, a school events calendar, and a spor ...

Assignmentconsider the following scenarioyou are the it

Assignment Consider the following scenario: You are the IT Manager of a small financial services firm that is in the process of upgrading its content management system. You have been tasked to plan an IT budget and staff ...

1 describe two types of variables or methods that can be

1.) Describe two types of variables or methods that can be used to exchange data between web pages and give example code of both types. 2.) Discuss authorization and authentication and explain forms-based-authentication. ...

1 does the rapid development of computer technology put any

1. Does the rapid development of computer technology put any strain on the existing criteria for updates? 2. Study and compare TCSEC, ITSEC, and CC assurance levels. 3. Trace the evolution of the security evaluation crit ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen