Computers and Technology

Consider a computer architecture that has a dynamically changing caching policy, such that it changes either the blocksize or the associativity of the caching policy in the middle of execution. in some cases, the change may require the computer to invalidate existing blocks in the cache because the blocks stored under the old caching policy are either misplaced or incomplete according to the new policy. for each case below, indicate whether the change may lead to blocks in the cache that are no longer valid, or if all blocks that were in the cache before the change remain valid after the change. for each case, perform an example using an initial blocksize of 16 words per block, and a cache containing 256 words (i. e., initially it contains 16 blocks). for the case where the change may lead to an invalid block in cache, give an example. for the case where the block always remains valid, use an example to demonstrate why, 2 or 3 sentences per case below should suffice. don't write a novel! (a) direct-mapped: blocksize doubles from 16 words / block to 32 words / block (b) direct-mapped: blocksize halves from 16 words / block to 8 words / block (c) fully assoc: blocksize doubles from 16 words / block to 32 words / block (d) fully assoc: blocksize halves from 16 words / block to 8 words /block (e) set assoc, goes from 4-way to 8-way associative (f) set assoc, goes from 4-way to 2-way associative

answer
Answers: 2

Other questions on the subject: Computers and Technology

image
Computers and Technology, 21.06.2019 19:30, LuxTheGirl3070
Entering key dates from your course syllabi test and quiz dates, assignments due dates in your planner can you manage your schedule by allowing you to see commitments ahead of time.
Answers: 3
image
Computers and Technology, 21.06.2019 21:30, willwhitlock803
Write code using c . (take input from user) calculate the size of a given file in kbs. in this task you will complete the function with the following prototype: float get_file_size(char * filename); the function takes the file name (address to the start of a null terminated character array) as input. the function should then open the file and find the number of bytes it contains till eof. the number of bytes divided by 1024 will give the size in kbs. if the file cannot be opened the function should return -1.
Answers: 2
image
Computers and Technology, 23.06.2019 01:30, winstonbendariovvygn
1. which of the following is a search engine? a) mozilla firefox b)internet explorer c)google d)safari 2. which of the following statements is true? a) all search engines will provide the same results when you enter the same query. b) all search engines use the same amount of advertisements. c) some search engines are also browsers. d) search engines often provide different results, even when you enter the same query.
Answers: 2
image
Computers and Technology, 23.06.2019 13:50, mrfishyyyy
Explain how email technologies enable the exchange of messages between users. find out the typical parts of an email address and explain each part.
Answers: 1
Do you know the correct answer?
Consider a computer architecture that has a dynamically changing caching policy, such that it change...

Questions in other subjects:

Konu
Biology, 12.04.2021 16:50
Konu
History, 12.04.2021 16:50
Konu
Mathematics, 12.04.2021 16:50
Konu
Mathematics, 12.04.2021 16:50