1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GalinKa [24]
3 years ago
13

Suppose that a machine with a 5-stage pipeline uses branch prediction. 15% of the instructions for a given test program are bran

ches, of which 84% are correctly predicted. The other 16% of the branches su er a 4-cycle mis-prediction penalty. (In other words, when the branch predictor predicts incorrectly, there are four instructions in the pipeline that must be discarded.) Assuming there are no other stalls, develop a formula for the number of cycles it will take to complete n lines of this program

Computers and Technology
1 answer:
zhenek [66]3 years ago
3 0

Answer:

solution attached below

Explanation:

You might be interested in
Grade Co... ▶ Da'yana Stover - Aerospace Engineering.pdf
SVEN [57.7K]
The answer is Space shuttle.
8 0
1 year ago
Read 2 more answers
A cybercrime: Select one: a. Is the act of defaulting on a properly signed agreement entered into upon the internet. b. Can be c
aalyn [17]

The answer is B because cyber crime is when a computer is used to commit criminal activities.

3 0
3 years ago
How do you know if a remote host is alive or not?
-BARSIC- [3]

Answer:

ing is the way to test whether a host is alive and connected. (If a host is alive but disconnected or slow to respond, you can't distinguish that from its being dead.) Options supported by the ping command vary from system to system

Explanation:

5 0
3 years ago
You work for a company that hired a pen testing firm to test the network. For the test, you gave them details on operating syste
Bingel [31]

Answer:

White box testing strategy

Explanation:

Pen or penetration testing, also known as ethical hacking is a technique used by an organisation to examine the computer systems, networks and web applications for security vulnerabilities such as loopholes, that can be exploited by an attacker.

There several strategies in pen testing that can be used to check for network vulnerabilities, they are, internal testing, external testing, black box testing, white box testing, blind testing etc.

Unlike in black box testing, white box testing provides all necessary information like IP addresses, network structure, operating system etc, to the pen tester.

4 0
3 years ago
Random stuff and pls don't report this thank you :D
skad [1K]

Answer:

hmmm....nice colors....what is it for?

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • 14. Which commercial RDBMS product was the first to hit the market and is the biggest?
    15·1 answer
  • How to analyze time complexity of a code?
    5·1 answer
  • In this assignment you will write a function that will calculate parallel resistance for up to 10 parallel resistors. Call the f
    12·1 answer
  • Who is father of computer <br>​
    8·1 answer
  • Which of the following code segments does not contain any errors?
    7·1 answer
  • Why might a neurosurgeon receive a higher wage than a nail technician ?
    12·2 answers
  • Identify some advantages of using Excel over lists, paper files, or simple word documents?
    6·1 answer
  • Which of these about non-disclosure agreements is accurate?
    13·2 answers
  • Which of the following is a document view you can select using Button on the status bar?
    11·1 answer
  • A project manager has designed a new secure data center and has decided to use multifactor locks on each door to prevent unautho
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!