
- •Input contacts: Set and Reset operations; Address processing; Interrupts generation. Output contacts: Instruction modification.
- •Input contacts: Even and Odd operations; Address correction; Interrupts generation. Output contacts: Instruction modification.
- •Input contacts: Numeric and Binary operations; Logical Address processing; Interrupts fabrication. Output contacts: Instruction modification.
- •It occurs because different lines of the bus may have different propagation speeds.
- •Fast Access; Slow Access.
- •Binary Access; Decimal Access.
- •To the cheapest level.
Which of the Access methods are used for internal (primary) memory Access?
Fast Access; Slow Access.
Virtual Access; Discrete Access.
Random Access; Associative Access.
Short Access; Near Access.
Limited Access; Reduced Access.
Which of the Access methods are used for external (secondary) memory Access?
Sequential Access; Direct Access.
Permanent Access; Temporary Access.
Binary Access; Decimal Access.
Short Access; Far Access.
Quick Access; Slow Access.
Which changes of computer memory subsystems characteristics will be observed as one goes down the memory hierarchy?
1.Increasing cost/bit; 2.Increasing capacity; 3.Increasing access time; 4.Decreasing frequency of access of the memory by the CPU.
1.Decreasing cost/bit; 2.Decreasing capacity; 3.Increasing access time; 4.Decreasing frequency of access of the memory by the CPU.
1.Decreasing cost/bit; 2. Decreasing capacity; 3. Decreasing access time; 4.Decreasing frequency of access of the memory by the CPU.
1. Increasing cost/bit; 2. Increasing capacity; 3. Increasing access time; 4. Increasing frequency of access of the memory by the CPU.
1.Decreasing cost/bit; 2.Increasing capacity; 3.Increasing access time; 4.Decreasing frequency of access of the memory by the CPU.
To which of the Memory hierarchy levels does an access by CPU occur more frequently?
To the network level.
To the physical level.
To the cheapest level.
To the highest level.
To the protected level.