1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Shtirlitz [24]
3 years ago
15

Suppose we wish to put a set of names in alphabetical order. We call the act of doing so sorting. One algorithm that can accompl

ish that is called the bubble sort. We could then program our bubble sort algorithm in C, and compile the C program to execute on an x86 ISA. The x86 ISA can be implemented with an Intel Pentium IV microarchitecture. Let us call the sequence "Bubble Sort, C program, x86 ISA, Pentium IV microarchitecture" one transformation process. Assume we have available four sorting algorithms and can program in C, C++, Pascal, Fortran, and COBOL. We have available compilers that can translate from each of these to either x86 or SPARC, and we have available three different microarchitectures for x86 and three different microarchitectures for SPARC.
a. How many transformation processes are possible?

b. Write three examples of transformation processes.

c. How many transformation processes are possible if instead of three different microarchitectures for x86 and three different microarchitectures for SPARC, there were two for x86 and four for SPARC?

Computers and Technology
1 answer:
Sergeeva-Olga [200]3 years ago
3 0

Answer:

See explaination

Explanation:

We refer to a compiler as a special program that processes statements written in a particular programming language and turns them into machine language or "code" that a computer's processor uses. Typically, a programmer writes language statements in a language such as Pascal or C one line at a time using an editor.

Please kindly check attachment for the step by step solution

You might be interested in
Which of the following electronic collaboration techniques is the best
muminat

Answer:

D. project management software

6 0
2 years ago
Read 2 more answers
The _______ of the story describes the events that takes place as well as the conflict or problem that must be resolved.
Crank

Answer:

The answer is C the plot.

7 0
3 years ago
Baby Boomers are an example of what type of trend?
Bond [772]
The baby boomers is a type of demographic group. The demographic groups are usually categorized by age, income bracket, social class and so on. Baby boomers are classified as a generation of a group of people and also therefore, by their age range. 
8 0
3 years ago
Read 2 more answers
Three healthcare firms jointly own and share the same cloud resources to meet their computing needs. Which cloud model does this
nataly862011 [7]

Answer:

Explanation:

In this particular example, these three healthcare companies using a public cloud because the companies share the resources.

They are using the model IaaS (Infrastructure as a service) this mean an external company is sharing their resources to this three companies, they can store data in this model, Infrastructure as a service gives you the highest level of flexibility and management control around your IT resources, is the best benefit in this model, you buy only what you need.

8 0
2 years ago
By developing a(n) .....,a business owner can launch program in a web brower.
WITCHER [35]
Yes they can , it can grow out their business a lot , promotion work great for a business
8 0
3 years ago
Other questions:
  • Match the following.
    8·2 answers
  • 2. What is “suspension of disbelief?” Which form of immersion is it most closely associated with?
    9·2 answers
  • A wireframe is a sketch detailing where text and images will be placed on a website. T/F
    11·1 answer
  • What is the purpose of ergonomics in the workplace? A.Keep workers safe and injury free
    5·2 answers
  • Media applications that play audio or video files are part of a class of workkloads called "streaming" workloads (i.e., they bri
    9·1 answer
  • PLEASE HELP <br> Which of the following best describes the existence of undecidable problems?
    7·1 answer
  • What critical-thinking tool is being used when asking the question, Is this information specific enough?
    9·1 answer
  • Compare and contrast two fundamental security design principles in network security. Analyze how these principles and how they i
    15·1 answer
  • Jaboooo helloooo are u there
    13·2 answers
  • It is possible to create a share that is invisible to users browsing the network simply by appending what character to the end o
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!