Question
a.
Blocks
b.
Frames
c.
Trojan horses
d.
Routines
Posted under Computer Architecture
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. The security loopholes, prevents by not allowing the user process to ask the operating system to access somethingindirectly are known as
Similar Questions
Discover Related MCQs
Q. When the processor is waiting for write instruction to complete during the write-through process, the processor is said to
View solution
Q. If a set has n blocks, the cache placement is then called
View solution
Q. For reducing the frequency on replacement of write-back blocks, the commonly used feature, is known as
View solution
Q. The processor address's size, determines the size of
View solution
Q. A direct-mapped cache having a size of N and has the miss rate same as a two-way set-associative cache, of size
View solution
Q. The block placement strategy, is if set associative/direct mapped, then this miss is called
View solution
Q. When Cycle per instruction is 1.0, data accesses are 50% of the total instructions, and the miss penalty is 25clock-cycles and the miss rate having 2%, then the computer would the faster as,
View solution
Q. The address spaces are typically broken into the fixed-size blocks, called
View solution
Q. The rate of no of misses in a cache which is divided by whole number of memory-accesses, to the cache, is known as
View solution
Q. The name given to the first or highest level of the memory-hierarchy, is known as
View solution
Q. The physical-address that is coming to the cache is further divided into field/s:
View solution
Q. If the cache is not able for containing all the blocks needed while execution, the miss is then known as
View solution
Q. When the victim buffer is totally full, the cache must
View solution
Q. 10% stores and 26% loads instruction for MIPS programs, to make writes
View solution
Q. Larger blocks increases the conflict-misses and the capacity-misses, whenever the cache is
View solution
Q. The page table level that says if page has been modified, is known as
View solution
Q. Data structure, maintaining the addresses of physical-pages, typically takes the form of a
View solution
Q. The matching tag sends the corresponding physical address through effectively a
View solution
Q. For Reducing Miss Rate, using Large blocks', the given statement defines
View solution
Q. Equivalent to the PTE valid bit, used to indicate the valid translation is refered to as
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Computer Architecture? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!