1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stira [4]
2 years ago
14

Assume that we have an application with a total of 500,000 instructions where 20% of them are the load/store instructions with a

n average CPI of 6 cycles, and the rest instructions are ALU instructions with average CPI of 1 cycle. If we double the clock rate without optimizing the memory latency, the average CPI for load/store instruction will also be doubled to 12 cycles. What is the speedup after this change?
Computers and Technology
1 answer:
balu736 [363]2 years ago
5 0

Answer:

1.25

Explanation:

#instructions = 5*10^{5}  

Average CPI (old) = 0.2*6 + 0.8*1 = 1.2+0.8 = 2.0

Average CPI (new) = 0.2*12 + 0.8*1 = 2.4 + 0.8 = 3.2

Assuming Clock Rate = x

Speedup = Execution Time (old) / Execution time (new)  = (2.0*5*10^{5} /x) / (3.2*5*10^{5} /2x)  = 4/3.2 = 1.25

You might be interested in
I have a singular monitor that is a TV for my computer. Recently, I took apart my computer and put it back together. When I put
makkiz [27]

your tv should have either a controls are or a setting area there is an option for "game mode" that should work with the HDMI.

4 0
3 years ago
A network technician is planning to update the firmware on a router on the network. The technician has downloaded the file from
zhenek [66]

Answer: B. Perform a hash on the file for comparison with the vendor’s hash.

Explanation:

Before installing the firmware update, the step that the technician should perform to ensure file integrity is to perform a hash on the file for comparison with the vendor’s hash.

Hashing refers to the algorithm that is used for the calculation of a string value from a file. Hashes are helpful in the identification of a threat on a machine and when a user wants to query the network for the existence of a certain file.

5 0
3 years ago
Why isn't 802.1X a good choice for home based wireless networks
Sholpan [36]
It can possibly cause an issue with the authenticator's end. Its capacity has a limited memory capacity and has the minimal processing power. Most of the process will be at the supplicant and authentication servers. However, the 802.1X has a better security compared to the WEP.
6 0
3 years ago
11What is the definition of bandwidth? the speed at which bits travel on the network the measure of the transfer of bits across
DIA [1.3K]

Answer:the transmission capacity of an electronic communications device or system; the speed of data transfer

Explanation:

8 0
3 years ago
Your corporation hosts a Web site at the static public IP address 92.110.30.123.
ladessa [460]

Answer:

Check the explanation

Explanation:

In line with the question, we can now derive that:

The router's outside interface IP address will be 92.110.30.65.

The router's inside interface IP address will be 192.168.11.254.

The Web site's IP public IP address will be 92.110.30.123.

The private IP address of the backup Web server will be 192.168.11.110.

and when we say IP address, it stands for Internet Protocol, it is a set of usual predefined rules which are utilized to administrate the manner to which data packets are sent over the internet. An IP address, which is typically just identified as an IP, is a sequence of figures used to uniquely recognize a computer/device on a particular network or on the internet space.

7 0
3 years ago
Other questions:
  • 13. Which Windows feature allows users to control software operations by clicking and pointing with a mouse?
    15·1 answer
  • For which punctuation symbol will you use the ring finger of your right hand?
    9·1 answer
  • On many advanced routers and switches, you can implement QoS through bandwidth management, such as __________, where you control
    5·1 answer
  • There are six different sequences for the three approval tasks: check inventory; check credit; check special terms.
    5·1 answer
  • What is the job title of someone who works with video and/or film?
    9·1 answer
  • Question 4 1 pts The following code could be rewritten using: if (x > 12): if (x < 34):​
    8·1 answer
  • The software that displays the resulting web pages is​
    9·1 answer
  • You are between flights at the airport and you want to check your email. Your wireless settings show two options:
    14·1 answer
  • 1.
    7·1 answer
  • What is another name for a numbered list
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!