1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anygoal [31]
3 years ago
6

Assume your computer clock runs at the speed of 2.5 GHz (G=10^9).

Computers and Technology
1 answer:
azamat3 years ago
7 0

Answer:

a) T=4*10^{-4}μs

b) N=2.5*10^6 cycles

c) 10000 programs.

Explanation:

a) We know that the frequency is the inverse of the period, so:

f=\frac{1}{T}\\\\T=\frac{1}{f}\\T=4*10^{-10}s

1μs is equal to 1*10^{-6}s

so T=4*10^{-4}us

b) If in a second there are 2.5*10^9 cycles:

N=2.5*10^9*(1*10^{-3})=2.5*10^6 cycles

c) we have to make a conversion, we know that a program takes 100*10^(-3) milliseconds, that is, 1*10^(-4) seconds so in 1 second we can execute:

P=\frac{1s}{1*10^{-4}s}=10000

10000 programs.

You might be interested in
State any three points of importance of local level profession​
melamori03 [73]

Answer:

hello 안녕하세요

Explanation:

mate I tried to write here but it says it's too much writing that why I attached a pic

BTW did u like that☺☺

8 0
3 years ago
The Integers 10, 30, 20 are inserted in that order, into an AVL Tree. Which sequence of commands will make the correct method ca
mel-nik [20]

Answer and Explanation:

After inserting the integers "10", "30" and "20" in an AVL tree, It looks like:

This tree is not balanced. So, to balance this tree, we have to follow some steps:

Step 1 :

After following the LR (Left rotation), Tree will look like:

Step 2 :

Now, following the RL (Right rotation), we will get a balanced AVL tree like:

4 0
3 years ago
Write a program that calculates and displays the number of minutes in a month. This program does not require any user input, and
dimulka [17.4K]

Answer:

Code to the answer is shown in the explanation section

Explanation:

import java.util.Scanner;

public class Question {

   public static void main(String args[]) {

     Scanner scan = new Scanner(System.in);

     System.out.println("Please enter the days of the month: ");

     int daysOfMonth = scan.nextInt();

     int minuteOfMonth = daysOfMonth * 60 * 24;

     System.out.println(minuteOfMonth);

   }

}

// 60 represents the number of minutes in one hour

// 24 represents the number of hours in a day

4 0
3 years ago
Your network consists of a single Active Directory domain. Your company has recently merged with another company. The acquired c
solmaris [256]

Answer:

Option E is correct.

Explanation:

While the user's server forms of the specific domain Active Directory. His corporation also partnered with some firms recently. The obtained corporation seems to have a multi-domain Active Directory server for both areas, both domain operators use the following Windows Servers. This was assigned the responsibility of proposing improvements to the Active Directory system.

He needs users of all corporations will gain exposure with each other's services, however, he wants to reduce logistical activity to achieve. Thus, he would build a two-way forest relationship between both the two roots forest domains.

6 0
3 years ago
In a computer instant messaging​ survey, respondents were asked to choose the most fun way to​ flirt, and it found that ​P(D)equ
MA_775_DIABLO [31]

Answer:

P(D) = 0.4

Explanation:

P(D) is the probability of randomly selecting someone.

who does not choose a direct​ in-person encounter as the most fun way to flirt.

1 – 0.600 = 0.4

P(D) = 0.4

hence the upper D over bar right parenthesis represent and its value is 0.4

8 0
3 years ago
Other questions:
  • Search the internet for news of a motor vehicle collision in your community involving drugs or alcohol. Keeping in mind that you
    15·1 answer
  • An organization uses SAP financial management software to store accounting details and Microsoft CRM software to record customer
    12·1 answer
  • Cassie is worried about credential management on a network where users often have over six passwords to remember. She’s curren
    13·1 answer
  • Assuming the Direct Hashing function and the Subtraction preprocessing algorithm is used to map keys into indices, give the inde
    15·1 answer
  • Which of the following access control techniques allows the user to feel empowered and able to change security attributes?
    5·1 answer
  • What is the best way to use copyrighted material?
    14·2 answers
  • The advancement of technology in our daily lives has changed how we interact with the world.
    10·1 answer
  • How to write my name in binary code ? Rivas
    7·2 answers
  • An epic games service is unavailable at the moment
    8·1 answer
  • How do people and computers approach problems differently
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!