1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
shusha [124]
3 years ago
10

Consider a computer system, where each processor can independently perform a separate task. given that the response time on a co

mputer system for a single task is 8 seconds, how long would it take to perform 10 tasks on this system when it has four processors? what would be the throughput per second for 10 tasks?
Computers and Technology
1 answer:
vekshin13 years ago
8 0
First four tasks = 8 seconds
Next four tasks = 8 seconds
Last two tasks = 8 seconds

The total number of seconds to perform all tasks is 24 seconds.

The throughput, which would be the number of tasks per second, is calculated by taking the number of tasks and dividing by the number of seconds:

10 tasks / 24 seconds = 5/12 or 0.4167 tasks per second
You might be interested in
Which avenue may utilize video streaming, audio narration, print designs and animation?
Shtirlitz [24]

Answer:

Multimedia avenue.

Explanation:

A file type is the standard used to store data such as pictures, texts, videos, and audios. All file types have unique file extension that determine which program to use to open a particular file and to access its data e.g pictures (jpeg, png), texts (txt, docx, rtf), videos (mp4, 3gp, avi), audios (mp3, acc).

Sometimes, computer users make the mistake of opening files with the wrong software application or program, this often leads to an error due to the incompatibility of the software application with the particular file.

Basically, all software applications are designed and developed for use with specific file extensions or formats and as such, when used to open a file it isn't developed for, it result in an error.

A multimedia avenue refers to a channel that is designed and developed to accept, utilize and combine various file formats such as audio, video, text, animation effects, etc. A common example of a multimedia avenue is Microsoft PowerPoint software.

Hence, the multimedia avenue may utilize video streaming, audio narration, print designs and animation.

8 0
3 years ago
Diseñe un algoritmo que le permita montar bicicleta y llevar en ella una carga desde la tienda hasta su casa.
Stella [2.4K]

Answer:

La fuerza se aplica en el lado opuesto de la carga.

Explicación:

Para andar en bicicleta y llevar una carga de la tienda a su casa, usamos tales reglas para llevar la carga de manera más fácil y segura. Si la carga es grande y está colgada en el mango derecho de la bicicleta, entonces la fuerza se aplica en el lado izquierdo de la bicicleta para mantener el equilibrio. Si no hicimos esto, la moto se irá hacia el lado derecho y el piloto sufrió el accidente.

6 0
3 years ago
The matrix theory is used in the ___ technique
wlad13 [49]

Answer:

The matrix theory is used by hill cipher.

Explanation:

Th technique which uses matrix theory is hill cipher technique.

Hill cipher technique is a polygraphic substitution cipher and it is based on linear algebra.

For encrypting a message in Hill Cipher technique each block of n letters is multiplied by an invertible matrix of nxn and that to against modulus 26 and  for the decryption of the message, every block is multiplied by the inverse of the matrix that was used for encryption.

3 0
3 years ago
. What projects would Excel best be used for?
adoni [48]

Answer:

Projects that require spreadsheet organization and/or calculations between data

Explanation:

That is why Excel is a spreadsheet program

7 0
3 years ago
What do “phone-copying” systems allow investigators to do?
Anastasy [175]

Answer:

it allows them to be able to look at the recent things people done on it . i believe

6 0
3 years ago
Other questions:
  • Which type of architecture places a firewall in front of the VPN to protect it from Internet-based attacks as well as behind a f
    6·1 answer
  • Web pages with personal or biograpic information are called ​
    10·1 answer
  • The only requirement of __________ is that the sender must provide some mechanism whereby the receiver can opt out of future ema
    14·1 answer
  • Which logic gate produces an output of 1 only if both it’s inputs are 0?
    5·1 answer
  • Which of the following should be the first page of a report?
    11·1 answer
  • What need most led to the creation of the Advanced Research Projects Agency Network? DARPA wanted scientists to be able to colla
    10·2 answers
  • Write a program that prints the following text: In C, lowercase letters are significant. main() is where program execution begin
    14·1 answer
  • what version of the internet do we use as an interactive social system in which users are able to interact with senders
    7·1 answer
  • To drive defensively means taking proactive measures to avoid accident situations regardless of their potential causes.
    6·2 answers
  • Which best describes how a supporting database will be structured?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!