1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Shtirlitz [24]
3 years ago
15

Suppose we wish to put a set of names in alphabetical order. We call the act of doing so sorting. One algorithm that can accompl

ish that is called the bubble sort. We could then program our bubble sort algorithm in C, and compile the C program to execute on an x86 ISA. The x86 ISA can be implemented with an Intel Pentium IV microarchitecture. Let us call the sequence "Bubble Sort, C program, x86 ISA, Pentium IV microarchitecture" one transformation process. Assume we have available four sorting algorithms and can program in C, C++, Pascal, Fortran, and COBOL. We have available compilers that can translate from each of these to either x86 or SPARC, and we have available three different microarchitectures for x86 and three different microarchitectures for SPARC.
a. How many transformation processes are possible?

b. Write three examples of transformation processes.

c. How many transformation processes are possible if instead of three different microarchitectures for x86 and three different microarchitectures for SPARC, there were two for x86 and four for SPARC?

Computers and Technology
1 answer:
Sergeeva-Olga [200]3 years ago
3 0

Answer:

See explaination

Explanation:

We refer to a compiler as a special program that processes statements written in a particular programming language and turns them into machine language or "code" that a computer's processor uses. Typically, a programmer writes language statements in a language such as Pascal or C one line at a time using an editor.

Please kindly check attachment for the step by step solution

You might be interested in
Which organization safeguards americans from health, safety, and security hazards and threats?
Mrrafil [7]

OSHA (Occupational Safety and Health Administration)

4 0
3 years ago
Read 2 more answers
Which Supreme Court case resulted in a decree issued for the Michigan Department of Corrections to provide female inmates access
SOVA2 [1]

Answer:

GLOVER v. JOHNSON December 14th 1999 at Michigan

Explanation:

The court case mentioned above is exactly the court case that has ended with a decree being issued  through the Michigan Department of Corrections for providing female inmates the access to the programming which has previously been allowed only to the male inmates. And this happened in 1999, and some big names were part of the jurisdiction. Its a very popular case definitely.

7 0
3 years ago
___________ system allows us to talk to any person in the world it any time​
GuDViN [60]
World wireless system
7 0
3 years ago
Read 2 more answers
Can you prove that the bleu areas are the same please?
Nookie1986 [14]

\huge\color{darkred}{ \tt{NO!!}}

8 0
2 years ago
Read 2 more answers
What service converts ip addresses into more recognizable alphanumeric names??
tresset_1 [31]
I think is DNS..........
6 0
3 years ago
Other questions:
  • Implement the function calcWordFrequencies() that uses a single prompt to read a list of words (separated by spaces). Then, the
    8·1 answer
  • Please draw a diagram of a complete graph with 5 vertices (K5), its adjacency matrix and adjacency list representations.
    13·1 answer
  • What two programming systems uses numbers and text?
    6·1 answer
  • Order the steps to take when drawing electron dot diagrams.
    15·2 answers
  • Which of the following are not parts of a message? Select all that apply.
    12·1 answer
  • When creating a presentation you should use a blank as a starting point?
    15·1 answer
  • Book information (overriding member methods) Given main() and a base Book class, define a derived class called Encyclopedia. Wit
    12·1 answer
  • Which view would you need to use to make changes to the design theme for the entire presentation?
    10·2 answers
  • How can you prevent someone with access to a mobile phone from circumventing access controls for the entire device
    5·1 answer
  • What is the descriptor for a filter that warns or blocks you from potentially fraudulent or suspicious websites?.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!