1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jenyasd209 [6]
3 years ago
5

You are provisioning a server with eight-core 3 GHz CMP that can execute a workload with an overall CPI of 2.0 (assuming that L2

cache miss refills are not delayed). The L2 cache line size is 32 bytes. Assuming the system uses DDR2-667 DIMMs, how many independent memory channels should be provided so the system is not limited by memory bandwidth if the bandwidth required is sometimes twice the average
Computers and Technology
1 answer:
n200080 [17]3 years ago
4 0

Answer:

The explanation for the question is given in the Explanation section below.

Explanation:

Throughout the query, we gave that we already have 8 core 3 GHz CMP and therefore it performs workflow in 2.0 CPI.

So,

(8 cores*3 GHz) /2.0 CPI = 12 billion/second guidance, we've turned GHz into seconds, so that's a billion years.

Well into the question considering whether he loses 6.67 L2 per 1 K direction.

So,

12*0.00667 = 80 million mistakes per second level-2. For an 8, so 32B*80 = 2560 MB per sec.

Whether the maximum storage capacity is double that of high as 2560*2 = 5120 MB per sec.

However, that's just throughout the DDR2-67 DIMM range. So, we should infer this, because only one storage source could be enough.

You might be interested in
Please Help Me!!!!!!!!!!!!!
My name is Ann [436]

Explanation:

a magazine cause it helps put out commercial

3 0
2 years ago
Two system administrators who work in two different buildings for the same company want to open a communication channel between
xz_007 [3.2K]

Bridge communication is the best solution to continue two different building for the same company.

<u>Explanation:</u>

Bridge communication to be placed in both building.master device should be placed in one building where should be connected to a high-end server and the slave device should be placed in another device.

Both the master device and salve should have a subsequent TCPIP address. For example, if the master  TCPIP address is 192.168.1.51 and the salve Tcpip address should be 192.168.1.52.

Very easy configure and communication is established. Both devices should be connected with nonstop current interruption. Once communication established speed depends on device capacity.

8 0
2 years ago
Write a program that reads an unspecified number of integers, determines how many positive and negative values have been read, a
GarryVolchara [31]

Answer:

<em>C++</em>

////////////////////////////////////////////////////////////////////////////////////////////////////////

#include <iostream>

#include <vector>

using namespace std;

int main() {

  vector<int> v;

   int n = 1;

   while (n != 0) {

       cout<<"Enter an integer, the input ends if it is 0: ";

       cin>>n;

       v.push_back(n);

   }

   cout<<endl;

   ///////////////////////////////////////////////////////////

   int sum = 0;

   int num_positives = 0, num_negatives = 0;

   for (int i=0; i<v.size()-1; i++) {

       if (v[i] > 0)

           ++num_positives;

       else

           ++num_negatives;

           

       sum = sum + v[i];

   }

   //////////////////////////////////////////////////////////

   cout<<"The number of positives is "<<num_positives<<endl;

   cout<<"The number of negatives is "<<num_negatives<<endl;

   cout<<"The total is "<<sum<<endl;

   cout<<"The average is "<<(float)sum/(v.size()-1);

   ///////////////////////////////////////////////////////////

   return 0;

}

5 0
3 years ago
Yo, how can I bypass the securely filter on a chromebook?
OLga [1]
Open your Chromebook and press the power button for 30 seconds. This should bypass the admin block.

Proxy Websites. Probably one of the oldest methods of bypassing web filters, proxy websites enable users to anonymously connect to websites through outside servers. ...
VPNs. VPNS or Virtual Private Networks, work as a tunnel between two devices. ...
Browser Extensions. ...
Stolen Passwords. ...
Firefox from USB. ...
5 0
2 years ago
How do you implement instruction level parallelism
netineya [11]

Answer:

To obtain substantial performance enhancements, we must exploit ILP across multiple basic blocks.

Explanation:

8 0
3 years ago
Other questions:
  • Why does a satellite requires two bridges?
    11·1 answer
  • Objects falling through air experience a type of friction called.. A.terminal velocity B.air resistance C.rolling friction
    8·1 answer
  • Which are factors that go into a project plan? choose four answers
    14·1 answer
  • What does %d, , %c, %s mean and what's their difference?
    12·1 answer
  • man who is colorblind marries a woman who has normal color vision and is not a carrier of color blindness. If this couple has a
    15·1 answer
  • Who can provide you with a new password when you have forgotten your old one?
    14·2 answers
  • Given the three thread states: running, runnable (i.e., ready), and blocked (i.e., waiting), state which of the six possible thr
    13·1 answer
  • How many clients has<br> Accenture engaged globally on blockchain?
    12·1 answer
  • In 1980, IBM's cheapest computer was more affordable than Apple's.<br><br><br> True<br><br> False
    10·1 answer
  • state an application that would be better to write c++ than java and give a rationale for your answer
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!