The memory blocks are mapped on to the cache with the help of ______
Explanation: The mapping functions are used to map the memory blocks on to their corresponding cache block.
During a write operation if the required block is not present in the cache then ______ occurs.
Explanation: This indicates that the operation has missed and it brings the required block into cache.
In ________ protocol the information is directly written into main memory.
Explanation: In case of the miss, then the data gets written directly in main memory.
The only draw back of using the early start protocol is _______
Explanation: In this protocol, the required block is read and directly sent to the processor.
The method of mapping the consecutive memory blocks to consecutive cache blocks is called ______
Explanation: This method is most simple to implement as it involves direct mapping of memory blocks.
While using the direct mapping technique, in a 16 bit system the higher order 5 bits is used for ________
Explanation: The tag is used to identify the block mapped onto one particular cache block.
In direct mapping the presence of the block in memory is checked with the help of block field.
Explanation: The tag field is usd to check the presence of a mem block.
In associative mapping, in a 16 bit system the tag field has ______ bits.
Explanation: The Tag field is used as an id for the different memory blocks mapped to the cache.
The associative mapping is costlier than direct mapping.
Explanation: In associative mapping all the tags have to be searched to find the block.
The technique of searching for a block by going through all the tags is ______
The set associative map technique is a combination of the direct and associative technique.
Explanation: The combination of the efficiency of the associative method and the cheapness of the direct mapping, we get the set-associative mapping.
In set-associative technique, the blocks are grouped into ______ sets.
Explanation: The set-associative technique groups the blocks into different sets
A control bit called ____ has to be provided to each blocj in set-associative.
Explanation: The valid bit is used to indicate that the block holds valid information.
The bit used to indicate whether the block was recently used or not is _______
Explanation: The dirty bit is used to show that the block was recently modified and for replacement algorithm.
Data which is not up-to date is called as _______