1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
horsena [70]
3 years ago
5

A computer has a pipeline with four stages. each stage takes the same time to do its work, namely, 1 nsec. how many instructions

per second can this machine execute?
Computers and Technology
2 answers:
prisoha [69]3 years ago
6 0

In figuring, a pipeline, otherwise called an information pipeline, is a lot of information preparing components associated in arrangement

Further explanation:

In figuring, a pipeline, otherwise called an information pipeline, is a lot of information preparing components associated in arrangement, where the yield of one component is the contribution of the following one. The components of a pipeline are frequently executed in parallel or in time-cut style.

Instruction travelling:

999,999,997 guidelines for each second. The pipeline has 3 nsec of straightforward figurings, at that point finishes a guidance in each ensuing nsec.  

3nsec (for first guidance to go down the pipeline).10^9 ns every second. 10^9 – 3 = 999999997 directions.

Instruction per second:

MIPS - Million guidelines for each second  

Million guidelines for each second (MIPS) is a more established, outdated proportion of a PC's speed and power, MIPS measures generally the quantity of machine directions that a PC can execute in one second.

Per second:

Million directions for each second (MIPS) is a more established, old proportion of a PC's speed and power, MIPS measures generally the quantity of machine guidelines that a PC can execute in one second. Be that as it may, various directions require pretty much time than others, and there is no standard strategy for estimating MIPS. Moreover, MIPS alludes just to the CPU speed, while genuine applications are commonly constrained by different elements, for example, I/O speed

Answer Details:

Subject: Computer and technology

Level: College.

Key Words:

Further explanation:

Per second:

Instruction per second:

Instruction travelling:

For further Evaluation:

brainly.com/question/6362387

brainly.com/question/12938965

amid [387]3 years ago
4 0
<span>999,999,997 instructions per second. The pipeline has 3 nsec of simple calculations, then completes an instruction in every subsequent nsec.
</span>3nsec (for first instruction to go down the pipeline).10^9 ns per second. 10^9 – 3 = 999999997 instructions.<span>
</span>
You might be interested in
What are the outputs of these please help
larisa [96]

Answer:

monkey know monkey not tell

Explanation:

4 0
2 years ago
Read 2 more answers
List of the earliest invention in human history?​
mojhsa [17]

Answer:

Airplanes, Telephones, Ships, Pens

7 0
3 years ago
Calculate the sum and difference of the given 8-bit unsigned binary numbers. All calculations must be done in binary. Show your
Korolek [52]

Answer:

10010101 + 00101110 = 1 1 0 0 0 0 1 1 , 10010101 - 00101110 = 0 1 1 0 0 1 1 1,

01101101 + 01110011   = 1 1 1 0 0 0 0 0 , 01101101 - 01110011 = - 1  1 1 1  1 0 1  0

Explanation:

10010101 + 00101110 =   1 0 0 1 0 1 0 1

                                    + <u>0 0 1 0 1 1 1 0</u>

                                       <u>1 1 0 0 0 0 1 1</u>

In binary, 1 plus 0 is 1, but 1 plus 1 ( which conventionally is two) is divided by 2 and the result is carried-out, while the remainder is used as the answer.

10010101 - 00101110 =   1 0 0 1 0 1 0 1

                                   - <u>0 0 1 0 1 1 1 0</u>

                                     <u>0 1 1 0 0 1 1 1</u>  

Subtraction in Binary calculation, a borrow to a 0 value is equal to two, this law is implemented in a case where 1 is subtracted from 0 ( which is impossible).

01101101 + 01110011   =   0 1 1 0 1 1 0 1

                                   + <u>0 1 1 1 0 0 1  1</u>

                                      <u>1 1 1 0 0 0 0 0</u>

<u />

01101101 - 01110011   =   0 1 1 0 1 1 0 1

                                   - <u>0 1 1 1 0 0 1  1</u>

                                   - <u>1  1 1 1  1 0 1  0</u>

At the end of the subtraction, if the value subtracted from in less than the subtracted number, two is borrowed and the result becomes negative or signed.

5 0
3 years ago
State two ways of moving an icon from one location to another​
andrezito [222]

Answer:

To arrange icons by name, type, date, or size, right-click a blank area on the desktop, and then click Arrange Icons.

Click the command that indicates how you want to arrange the icons (by Name, by Type, and so on).

If you want the icons to be automatically arranged, click Auto Arrange.

If you want to arrange the icons on your own, click Auto Arrange to remove the check mark.

Explanation:

7 0
3 years ago
List at least two questions you can use to help decide whether a website's information is trustworthy
alexandr1967 [171]

Answer:

Questions (three) that can be used to decide whether a website's information is trustworthy are;

1) Who is or are the authors of the website

2) What type of information the website conveys

3) Why was the information published on a website

Explanation:

1) Who is or are the authors of the contents of the website including the authors credentials so as to ascertain whether the author is qualified with regards to the topic or topics written about on the website

2) What are the information presented on the website and the context the in which the information are presented

Are the articles in the website backed by a source, with hyperlinks, references or footnotes

3) Why was the on the website information created. Is the information to entertain, persuade, sell or inform

8 0
3 years ago
Other questions:
  • A job posting is the best way to find out what _____ are required for a position.A.aptitudes B.hard skills C.soft skills D.dress
    10·2 answers
  • 2. What are the pros and cons of Toyota structure?
    13·1 answer
  • What are the advantages and disadvantages of malware maintenance?
    12·1 answer
  • Order the steps to take when drawing electron dot diagrams.
    15·2 answers
  • Which of the following is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user’s person
    7·2 answers
  • From your computer you are able to establish a telnet connection to a remote host but a traceroute to the host IP address result
    6·1 answer
  • Select the correct text in the passage,
    10·1 answer
  • What is the missing term in the code that handles that error??
    11·1 answer
  • Which of the following is an example of an inline element? A. B. C. D.
    8·1 answer
  • Which are ways that technology keeps you hooked?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!