1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jenyasd209 [6]
3 years ago
5

You are provisioning a server with eight-core 3 GHz CMP that can execute a workload with an overall CPI of 2.0 (assuming that L2

cache miss refills are not delayed). The L2 cache line size is 32 bytes. Assuming the system uses DDR2-667 DIMMs, how many independent memory channels should be provided so the system is not limited by memory bandwidth if the bandwidth required is sometimes twice the average
Computers and Technology
1 answer:
n200080 [17]3 years ago
4 0

Answer:

The explanation for the question is given in the Explanation section below.

Explanation:

Throughout the query, we gave that we already have 8 core 3 GHz CMP and therefore it performs workflow in 2.0 CPI.

So,

(8 cores*3 GHz) /2.0 CPI = 12 billion/second guidance, we've turned GHz into seconds, so that's a billion years.

Well into the question considering whether he loses 6.67 L2 per 1 K direction.

So,

12*0.00667 = 80 million mistakes per second level-2. For an 8, so 32B*80 = 2560 MB per sec.

Whether the maximum storage capacity is double that of high as 2560*2 = 5120 MB per sec.

However, that's just throughout the DDR2-67 DIMM range. So, we should infer this, because only one storage source could be enough.

You might be interested in
Fill in the blank
melamori03 [73]

Explanation:

save as because if u want to save the bame of it press save as to save it as what u want

3 0
3 years ago
Read 2 more answers
Which automated method for VPN connection deployment would work best in combination with Microsoft Intune or Microsoft Endpoint
maks197457 [2]

There are different kinds of automated method for VPN connection deployment. The automated method for VPN connection deployment would work best  is ProfileXML

  • ProfileXML is known to be often used as a delivery methods in Windows PowerShell, Microsoft Endpoint Configuration Manager, and Intune. For an individual to be able to use the ProfileXML VPNv2 CSP setting, one have to construct XML by using the ProfileXML schema.

An individual can configure the Always On VPN client by using the PowerShell, Microsoft Endpoint Configuration Manager, or Intune. They all need an XML VPN profile to configure the appropriate VPN settings.

Learn more from

brainly.com/question/25554117

3 0
2 years ago
"how do we store information in long term memory?"
Andru [333]

Answer:

By saving it in the hard drive.

Hope I helped!

8 0
3 years ago
Who could vote in the first democracy?
zmey [24]
B citizens

in the 4th century there were about 100k citizens. only about 40k could participate in the democratic process ( this is only if the question is referring to ancient democracy )
4 0
3 years ago
CLS
Ainat [17]

Answer:

INPUT "Enter your marks in computer"<u><em>;</em></u>CS

<u><em>IF</em></u> C>40 THEN

PRINT "You are passed. <u><em>"</em></u>

ELSE

PRINT "You are failed."

END <u><em>IF</em></u>

Explanation:

see corrections above.

5 0
3 years ago
Other questions:
  • What information is not typically included in an e-mail header?​?
    15·1 answer
  • Discuss the differences between permanent internal memory and volatile internal memory.
    14·1 answer
  • When possible, you should avoid using _________ variables in a program?
    11·1 answer
  • Kiera is building a new computer and wants to make sure she has an adequate power supply for all the new equipment she is purcha
    15·2 answers
  • Does Buzz or APEX shows all your due assignments on the left of the main home screen?
    11·1 answer
  • 4. Give four reasons why a laptop computer is more expensive than a desktop computer of the
    10·1 answer
  • What is the difference between RELIABLE and UNRELIABLE sources of<br> income?
    7·2 answers
  • Is social media bringing people together or cause in sepretation?​
    11·2 answers
  • 1. Which of the following is not true about high-level programming language s? (a) Easy to read and write (b) Popular among prog
    12·1 answer
  • What type casting mechanism should be used if you want to safely change (cast) a pointer type for pointing to a different object
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!