1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arada [10]
3 years ago
11

Using Amdahl’s Law, calculate the speedup gain of an application that has a 60 percent parallel component for (a) two processing

cores and (b) four processing cores.
Computers and Technology
1 answer:
Nina [5.8K]3 years ago
8 0

Answer:

a) Speedup gain is 1.428 times.

b) Speedup gain is 1.81 times.

Explanation:

in order to calculate the speedup again of an application that has a 60 percent parallel component using Anklahls Law is speedup which state that:

t=\frac{1 }{(S + (1- S)/N) }

Where S is the portion of the application that must be performed serially, and N is the number of processing cores.

(a) For N = 2 processing cores, and a 60%, then S = 40% or 0.4

Thus, the speedup is:

t = \frac{1}{(0.4 + (1-0.4)/2)} =1428671

Speedup gain is 1.428 times.

(b) For N = 4 processing cores and a 60%, then S = 40% or 0.4

Thus, the speedup is:

t=\frac{1}{(0.4 + (1-0.4)/4)} = 1.8181

Speedup gain is 1.81 times.

You might be interested in
What happens when a filter is applied to a database
IgorLugansk [536]
<span>(A) All records that don't meet the criteria are removed
</span>
6 0
3 years ago
A collection of entries posted on a web site and displayed in reverse chronological order (from newest to oldest entries), is kn
Zina [86]
A) Social Collaboration

Social Collaboration is a way for people to combine their information and make it easier to go through and to work well as a team.
7 0
3 years ago
What are the two main charaters from maid sama?
Gennadij [26K]

Answer:

Takumi Usui and Misaki Ayuzawa

Explanation:

don't know why this is here

8 0
3 years ago
Read 2 more answers
A ___________ is similar to an intranet in that it uses internet technologies, but is developed for users outside the organizati
Vanyuwa [196]
The blank is extranet
I hope this helped!
6 0
3 years ago
What does an Information security analysts do?
coldgirl [10]

Answer:

Information security analysts install software, such as firewalls, to protect computer networks. Information security analysts plan and carry out security measures to protect an organization's computer networks and systems. Their responsibilities are continually expanding as the number of cyberattacks increases.

Explanation:

hope this helps

4 0
3 years ago
Other questions:
  • Design and implement a class dayType that implements the day of the week in a program. The class dayType should store the day, s
    11·1 answer
  • Unlike artistic drawings, which communicate self-expression and
    15·1 answer
  • Two types of business communications enhanced by desktop publishing are
    7·2 answers
  • In regard to protective actions for explosive devices, the area where the blast originates is referred to as ___________ perimet
    8·1 answer
  • Given an array A of size N, and a number K. Task is to find out if it is possible to partition the array A into K contiguous sub
    9·1 answer
  • What is the easiest way to create a resume in Word with predefined content that can be replaced with your information?
    13·2 answers
  • Who plays xbox one offline and knows some multiplayer games that can be played offline.
    15·2 answers
  • Please Help!
    13·1 answer
  • Bob has started a company and registered its name with the government as a private corporation. He tries to create a domain name
    12·1 answer
  • True or false: Concurrent validation is more time consuming to measure than predictive validation because it involves a wait per
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!