题目内容 (请给出正确答案)
[主观题]

What is the function of the compiler?(_______)

A、Translates assembly language into binary instructions.

B、Translates source code into intermediates and immediately executes it.

C、Combines independent programs and resolves labels into an executable file.

D、Translate a high-level language into assembly language.

提问人:网友zhaojian0510 发布时间:2022-01-07
参考答案
  抱歉!暂无答案,正在努力更新中……
如搜索结果不匹配,请 联系老师 获取答案
更多“What is the function of the co…”相关的问题
第1题
The clarity and fidelity of laser-read digital recordings of music and speech and the freedom of these recordings from background noise are recent advancements , but the human ear can not convert binary data recorded on a disc to music or speech.
点击查看答案
第2题
【单选题】As the cost-driver activitylevel increases within the relevant range:

A、totalfixed costs remain unchanged

B、fixed costs per unit increases

C、total variable costsdecrease

D、variable costs perunit increases

点击查看答案
第3题
Interrupts can be generated in response to (_______).

A、detected program errors such as arithmetic overflow or division by zero

B、detected hardware faults

C、input/output activities

D、All of the above.

点击查看答案
第4题
Write Through technique is used in which memory for updating the data? (_______)

A、Virtual memory

B、Main memory

C、Auxiliary memory

D、Cache memory

点击查看答案
第5题
The bit used to signify that the cache location is updated is (_______).

A、Dirty bit

B、Update bit

C、Reference bit

D、Flag bit

点击查看答案
第6题
Forwarding is a technique used in a pipeline to reduce the number of stall cycles caused by hazards. Each sequence of instructions shown below causes a hazard for the version of the RISC-V pipeline that we studied in class. The pipeline bubble that would be caused by some of these hazards can be avoided through the use of forwarding. Others cannot. Mark the sequences for which the bubble cannot be avoided through forwarding. (_______)

A、lw x5, 0(x6) sll x9, x10, x11 add x7, x8, x5

B、add x7, x8, x9 beq x7, x0, L2

C、sub x5, x6, x7 add x8, x9, x5

D、lw x5, 0(x6) add x7, x8, x5

点击查看答案
第7题
The RISC-V addressing mode of “jal x1, 100” is (_______).

A、Immediate addressing

B、Base addressing

C、PC-relative addressing

D、None of the above.

点击查看答案
第8题
The execution of the following two instructions may have the (_______). lw x5,0(x6) lw x7,0(x5)

A、RAW (Read after Write)

B、WAW (Write after Write)

C、WAR (Write after Read)

D、No data dependency.

点击查看答案
第9题
Which type of parallel computing architecture is no longer commonly encountered in machines today? (_______)

A、MIMD (Multiple Instruction/Multiple Data Stream)

B、MISD (Multiple Instruction/Single Data Stream)

C、SIMD (Single Instruction/Multiple Data Stream)

D、SISD (Single Instruction/Single Data Stream)

点击查看答案
第10题
Calculate AMAT (Average Memory Access Time) for a machine with the following specs: L1 hits take 3 cycles, L1 local miss rate is 25%. L2 hits take 10 cycles, L2 local miss rate is 60%. L3 hits take 100 cycles, L3 global miss rate is 9%. Main memory accesses take 1000 cycles and all data is available in memory. (_______)

A、105.5 cycles

B、110.5 cycles

C、24.5 cycles

D、None of the above.

点击查看答案
账号:
你好,尊敬的用户
复制账号
发送账号至手机
密码将被重置
获取验证码
发送
温馨提示
该问题答案仅针对搜题卡用户开放,请点击购买搜题卡。
马上购买搜题卡
我已购买搜题卡, 登录账号 继续查看答案
重置密码
确认修改
欢迎分享答案

为鼓励登录用户提交答案,简答题每个月将会抽取一批参与作答的用户给予奖励,具体奖励活动请关注官方微信公众号:简答题

简答题官方微信公众号

警告:系统检测到您的账号存在安全风险

为了保护您的账号安全,请在“简答题”公众号进行验证,点击“官网服务”-“账号验证”后输入验证码“”完成验证,验证成功后方可继续查看答案!

微信搜一搜
简答题
点击打开微信
警告:系统检测到您的账号存在安全风险
抱歉,您的账号因涉嫌违反简答题购买须知被冻结。您可在“简答题”微信公众号中的“官网服务”-“账号解封申请”申请解封,或联系客服
微信搜一搜
简答题
点击打开微信