1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kenny6666 [7]
3 years ago
7

Assume that a program consists of integer and floating-point instructions. 60% of the total execution time is spent on floating

point instructions and the remaining 40% is on integer instructions. How much faster should we run the floating-point instructions to execute entire program 1.25 times faster
Computers and Technology
1 answer:
Ymorist [56]3 years ago
5 0

Answer:

the floating-point instructions  should be run 1.5 times faster in order to execute entire program 1.25 times faster

Explanation:

Given that:

a program consists of integer and floating-point instructions. 60% of the total execution time is spent on floating point instructions and the remaining 40% is on integer instructions.

Let the integer be the total execution time = V

The  floating-point instructions = 60%

The integer instruction = 40%

The time spent on the floating-point instruction = 60/100 × V

= 0.6 V

The time spent on t he integer instruction = 40/100 × V

= 0.4 V

However; How much faster should we run the floating-point instructions to execute entire program 1.25 times faster

If we are to execute the entire program 1,25 times faster;

The new execution time = V/1.25

Assuming the new time spent on floating-point instruction = W

∵

W + 0.4 V = V/1.25

W = V/1.25 - 0.4 V

W = (V - 0.5V)/1.25

W = 0.4V

the new time spent on floating-point instruction = W = 0.4 V

The speed required to make the floating -point instruction to run faster = 0.6V/.4 V

= 1.5

Hence,  the floating-point instructions  should be run 1.5 times faster in order to execute entire program 1.25 times faster

You might be interested in
What is occurring when an attacker manipulates commonplace actions that are routinely performed in a business?
serg [7]

Answer:

Vulnerable business processes, also called business process compromise (BPC), occurs when an attacker manipulates commonplace actions that are routinely performed.

4 0
3 years ago
What does it mean when we say that Unity “handles terrain natively,” and how can that assist in game development?
ale4655 [162]

When we say that Unity “handles terrain natively,” and how can that assist in game development, we mean that all or anybody can produce or create the terrain, as they want or intended for it to be instead of a person going out to  download other assets so as to be able to do so.

The sculpting tool and key/mouse commands would you use to most easily create a “plateau” in your terrain is the the paint height too

<h3>What is a sculpting tool?</h3>

There are a lot of tools such as chisels that are said to be used to carve away the stone, shape the forms, and finish the details.

Based on the materials used, a sculptor is one that uses a lot of techniques such as sewing to others.

Learn more about tools from

brainly.com/question/26694215

7 0
3 years ago
Write a pseudocode thats accept and then find out whether the number is divisible by 5 ​
meriva

Answer:

input number  

calculate modulus of the number and 5  

compare outcome to 0  

if 0 then output "divisible by 5"  

else output "not divisible by 5"

Explanation:

The modulo operator is key here. It returns the remainder after integer division. So 8 mod 5 for example is 3, since 5x1+3 = 8. Only if the outcome is 0, you know the number you divided is a multiple of 5.

3 0
4 years ago
A 'deny any-any' rule in a firewall ruleset is normally placed: a. Nowhere in the ruleset if it has a default allow policyb. Bel
tia_tia [17]

Answer:

D. . At the bottom of the ruleset

Explanation:

The main purpose of firewalls is to drop all traffic that is not explicitly permitted. As a safeguard to stop uninvited traffic from passing through the firewall, place an any-any-any drop rule (Cleanup Rule) at the bottom of each security zone context

6 0
4 years ago
<img src="https://tex.z-dn.net/?f=%20%5C%3A%20" id="TexFormula1" title=" \: " alt=" \: " align="absmiddle" class="latex-formula"
Effectus [21]

Answer:

\tt \green{The \: elements }  \: of \:  \red{computer }  \: \blue{are:}

•Hardware

•Software

•Data

•Procedures

•Input Unit

•Output Unit

•CPU(Central Processing Unit)

•Connectivity

•Primary Memory

•Motherboard

•GPU(Graphics Processing Unit)

•Solid State Drive (SSD) or Hard Disk Drive (HDD)

•RAM

Explanation:

\tt \pink{HeavenMistress}

5 0
2 years ago
Read 2 more answers
Other questions:
  • Why are video texts an example of multimedia? A. They use audio and visual elements together. B. They use one type of medium to
    13·2 answers
  • How can I use the internet/social media to protect my identity?
    14·1 answer
  • Feature of electric circuit​
    14·2 answers
  • Which of the following is an example of constructive criticism for a friend who speaks too softly?
    13·2 answers
  • Which three skills are useful for success in any career?
    8·1 answer
  • Write an algorithm using pseudocode to input numbers . reject any numbers that are negative and count how many numbers are posit
    10·1 answer
  • ¿Qué algoritmos de encriptación utilizan una clave para cifrar los datos y una clave diferente para descifrarlos?
    13·1 answer
  • What is the computer?​
    9·1 answer
  • 2. 25 POINTS!!!!!!!!!
    8·2 answers
  • Daily IT Question
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!