1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bess [88]
3 years ago
6

You wrote a C application that takes 20 seconds using your desktop processor. An improved C compiler is released that requires o

nly 0.5 as many instructions as the old compiler. The CPI however increased by 1.3. How fast will the application run when compiled with the new compiler?
Computers and Technology
1 answer:
topjm [15]3 years ago
8 0

Answer:

13 Seconds

Explanation:

Let P1 denotes the performance when old compiler was used to write the C application and P2 denotes the performance when the application is compiled with the new compiler.

CPU time measures of processor performance which is the execution time from the start till end of the program application.

CPU Time of P1 = Instruction count * Average cycles per instruction * Clock cycle time

CPU Time (P1) = I * CPI * T

20 seconds = I * CPI * T

Clock cycle time (T) is also called Clock Rate. So

CPU Time of P1 = Instruction count * Average cycles per instruction * Clock Rate

ClockRate = CPU Time of P1 / Instruction count * Average cycles per instruction

Clock Rate = 20 seconds / (I * CPI )

number of instructions of application = 0.5

Increased CPI = 1.3

The performance of application when compiled with new compiler:

CPU Time of P2 =  Instructions count * Cycles per instruction * Clock Rate

                           = I * CPI * Clock rate

                          = 0.5 * 1.3 * Clock rate

As Clock Rate = 20 seconds / (I * CPI ) So

CPU Time of P2 = (0.5 I ) * 1.3 CPI) * 20/ ( I * CPI)

                          = 0.5 * 1.3 * 20

                          = 13 seconds

So the execution time of application when compiled with new compiler is 13 seconds.

You might be interested in
Convert 4.5 strides to girth
n200080 [17]

There are 0.5 strides in one girth
so 4.5 strides will be equal to 9 girth
hope it helps
3 0
3 years ago
Select the correct answer.
sveticcg [70]

Answer:

D

Explanation:

5 0
3 years ago
Read 2 more answers
Which of the following sentences use the subjunctive mood correctly?Check all that apply. a. Dr. Franklin wishes he were the one
vredina [299]

Answer:

a. Dr. Franklin wishes he were the one who had invented the new web application.

b. If he were willing to submit the proposal, we might win the bid.

Explanation:

The subjunctive mood is when we're talking about wishes, doubts, and possibilities, in this case, we have two examples, where Dr. Franklin wishes to invent the new web application, and the other sentence is a possibility because he believes that they can win the bid. The last example is an affirmation.

4 0
3 years ago
HELP ASAP 40 POINTS & BRAINLIST (ONLY RIGHT ANSWERS) Enrique is trying to decide which college is the best for his career ch
erma4kov [3.2K]

b.Enrique will probably have to pay a high tuition if he doesn’t earn a scholarship or grant.


7 0
3 years ago
Read 2 more answers
1. Information integrity ensures that data can be modified only by appropriate mechanisms.
GrogVix [38]

Answer:

1. True

2. True

3. False

4. False

Explanation:

1. Information integrity is a term in computer business that describes the degree of accuracy, reliability and dependency of an information content, process and system.

The main purpose of Information integrity is to prevent or protect information from accidental or intentional but unauthorized changes.

Hence, it helps to ensure that data can be modified only by appropriate mechanism.

2. Pairing threats with vulnerabilities is a pair of risk analysis, that sets to determine the type of vulnerabilities a system or organization has, which can be paired with valid threats. Hence, the kind of risk involved in the vulnerability threats, can then be addressed.

3. Knowledge based identification (authentication) system which involves password or PIN are the most common form of authentication methods. Ranges from different devices such as phones and PC to platform such as website.

4. Biometric is a type of user authentication that relies on the measurement and calculation of the shape of the body, such as fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent. It is often referred to as Physiological characteristics of Biometric system.

6 0
3 years ago
Read 2 more answers
Other questions:
  • The border that defines the outer boundary of a shape or other object
    13·1 answer
  • Why are cable networks such as mtv and cnn more profitable than the big four broadcast networks?
    8·1 answer
  • The man-in-the-middle attack<br> means what
    7·1 answer
  • Why does my Office Computer send packet #1? What device responds by sending back packet #2? What information does my Office Comp
    15·1 answer
  • How can a user preview the playback of an audio clip in PowerPoint? Use the drop-down menus to complete the statements.
    14·1 answer
  • Use the drop-down menus to describe how Adnan can add shapes to his presentation.
    11·1 answer
  • Write a valid HTML + Python page that will count numbered from 1 to 1,000,000?​
    9·1 answer
  • Complete each sentence
    10·1 answer
  • A file named loan.html, write an HTML document that looks similar to figure 9-7 in the textbook. Write four functions with these
    8·1 answer
  • Which of the following technologies does NOT facilitate the transferring of data between computers in adjacent buildings?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!