1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Olin [163]
3 years ago
10

The Pentium 4 Prescott processor, released in 2004, has a clock rate of 3.6 GHz and voltage of 1.25 V. Assume that, on average,

it consumed 10 W of static power and 90 W of dynamic power.
The Core i5 Ivy Bridge, released in 2012, had a clock rate of 3.4 GHz and voltage of 0.9 V. Assume that, on average, it consumed 30 W of static power and 40 W of dynamic power.
a) For each processor find the average capacitive loads.
b) Find the percentage of the total dissipated power comprised by the static power and the ratio of static power to dynamic power for each technology.
c) If the total dissipated power is to be reduced by 10%, how much should the voltage be reduced to maintain the same leakage current? Note: power is defined as the product of voltage and current.
Computers and Technology
1 answer:
Zarrin [17]3 years ago
6 0

Answer:

a) C = 3.2 x 10^-8 F, C = 2.9 x 10^-8 F

b) 10%, 42.86%, 0.11, 0.75

c) 0.849 volts to maintain the same leakage current in the Pentium 4 Prescott Processor. 0.783 Volts to maintain the same leakage current in the Core i5 Ivy Bridge Processor.

Explanation:

<u>For the Pentium 4 Prescott processor:</u>

Clock rate (f) = 3.6 GHz

Voltage (V) = 1.25 V

Static Power Consumption = 10 W

Dynamic Power Consumption = 90 W

<u>For the Core i5 Ivy Bridge processor:</u>

Clock rate (f) = 3.4 GHz

Voltage (V) = 0.9 V

Static Power Consumption (SP) = 30 W

Dynamic Power Consumption (DP) = 40 W

(a) To find the average capacitive loads, use the formula:

DP = (1/2) x C x V² x f

Rearranging:

C = (2 x DP)/(V² x f)

For the Pentium 4 Prescott processor:

C = (2 x 90) / [(1.25)² x 3.6 x 10^9]

C = 3.2 x 10^-8 F

For the Core i5 Ivy Bridge processor:

C = (2 x 40) / [(0.9)² x 3.4 x 10^9]

C = 2.9 x 10^-8 F

(b) Percentage of the total dissipated power comprised by the static power can  be found by the formula:

<u>[Static Power/(Static Power + Dynamic Power)] x 100</u>

For the Pentium 4 Prescott Processor:

[10/(90+10)] x 100  = 10%

For the Core i5 Ivy Bridge Processor:

[30/30+40] x 100 = 42.86 %

Ratio of static power to dynamic power for each technology can be computed as:

Pentium 4 Prescott: 10/90 = 0.11

Core i5 Ivy Bridge: 30/40 = 0.75

(c) The total dissipated power can be calculated by:

P = DP + SP

For Static Power we have the formula:

SP = VI where I is the leakage current.

I = SP/V

For Pentium 4 Prescott: I = 10/1.25 = 8A

For Core i5 Ivy Bridge: I = 30/0.9 = 3.33 A

The total disspited power is reduced by 10%, meaning the ratio of new power to old power must be 90% = 0.9. So,

New Power/Old Power = 0.9

For Pentium 4 Prescott:

DP + SP / 100 = 0.9

VI + CV²F = 0.9 x 100

V(8) + (3.2 x 10^-8)V²(3.6 x 10^9) = 90

8V + 115.2V² - 90 = 0

By solving the quadratic equation, we get the positive answer as 0.849. This means that the voltage should be reduced to 0.849 volts to maintain the same leakage current in the Pentium 4 Prescott Processor.

For Core i5 Ivy Bridge:

DP + SP / 70 = 0.9

V(3.33) + (2.9 x 10^-8)V²(3.4 x 10^9) = 70 x 0.9

3.33V +98.6V² -63 = 0

By solving the quadratic equation we get the positive answer as 0.783. This means that the voltage should be reduced to 0.783 Volts to maintain the same leakage current in the Core i5 Ivy Bridge Processor.

You might be interested in
Scripting languages are distinguished by their ____ types.
vodomira [7]
I believe the answer is font.
3 0
2 years ago
Learning in a digital environment is also called [blank] learning.
Dafna1 [17]

Answer:

The blank is online learning

4 0
2 years ago
Read 2 more answers
A robot worker and a human worker are both vulnerable to
Lady bird [3.3K]

Answer:

fire

Explanation:

4 0
3 years ago
Briefly define each components of information systems (hardware, software, data, networking, people and procedure). While you ar
WARRIOR [948]

Answer:

1. Hardware is the physical components that compose a system and provide physical quantity and quality to software applications and accomplish information processing tasks

2. Software is a program that carries out a set of instructions written in a programming language. It instructs a computer on how to carry out specific tasks. Programs can be saved permanently or temporarily.

3. Data may be mostly the raw resources used by information systems experts to give business intelligence to users. Traditional alphanumeric data, which is made up of numbers and alphabetical and other characters, is one type of data.

4. Networking is a resource of any computer system connected to other systems via a communications. It refers to the physical connections between all of the network's nodes. Communication networks are a critical resource component of all information systems, according to networking.

5. People are those who are directly or indirectly involved in the system. Direct users include developers, programmers, designers, and system administrators. Direct users can also be the stakeholder or end user who receives an output from the system. Indirect can be a manager who takes a brief check at the system to check that all criteria are satisfied.

6. Procedure is made up of stages or phases that result in an output. A method of continually receiving feedback on each part while analyzing the overall system by observing various inputs being processed or altered to create outputs.

7 0
1 year ago
Why is malware dangerous
Sonbull [250]

Malware can be hugely damaging to businesses as well as individuals. Hackers often use malware to try and gain entry into an organisation's systems or networks, from where they can access valuable data to steal and sell on.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Again, consider what you believe to be the goal of performing a penetration test. Why would you worry about doing any privilege
    14·1 answer
  • What car dealership websites did you use to conduct your research?​
    8·1 answer
  • What is the role of the constructor for an object?
    5·1 answer
  • Which ipv6 router message is sent via multicast with a scope of link-local with the expectation that all local routers will iden
    5·1 answer
  • Which of the following SQL statements will display all customers who have not recently placed an order? a. SELECT customer# FROM
    15·1 answer
  • _____ is the software that protects you computer from harmful files, Trojan horses, and worms.
    13·2 answers
  • Testing for information would be most likely to occur in which type of engineering?
    5·2 answers
  • Write a technical term for following statements
    15·1 answer
  • Edhesive Intro to cs quiz 2 q#9 <br><br> What is output? <br> Print (3 % 15)<br> Thanks!!
    8·1 answer
  • How has technology impacted our lives and the world we live in? In your own words.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!