1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stira [4]
3 years ago
14

Assume that we have an application with a total of 500,000 instructions where 20% of them are the load/store instructions with a

n average CPI of 6 cycles, and the rest instructions are ALU instructions with average CPI of 1 cycle. If we double the clock rate without optimizing the memory latency, the average CPI for load/store instruction will also be doubled to 12 cycles. What is the speedup after this change?
Computers and Technology
1 answer:
balu736 [363]3 years ago
5 0

Answer:

1.25

Explanation:

#instructions = 5*10^{5}  

Average CPI (old) = 0.2*6 + 0.8*1 = 1.2+0.8 = 2.0

Average CPI (new) = 0.2*12 + 0.8*1 = 2.4 + 0.8 = 3.2

Assuming Clock Rate = x

Speedup = Execution Time (old) / Execution time (new)  = (2.0*5*10^{5} /x) / (3.2*5*10^{5} /2x)  = 4/3.2 = 1.25

You might be interested in
The convergence of information technology and operations technology, offering the potential for tremendous improvements in effic
Tpy6a [65]

Answer:D. Industrial Internet of things.

Explanation: This is the term used to describe the interconnection of sensors,Routers and other devices in order to improve the overall quality, efficiency, speed, amount of data collected,analysed and processed over a given period of time and over a wide range of Networks.

Industrial Internet of things is different from the internet of things basically because of their usage. Industrial Internet of things is used in industries where the volume of data is high.

7 0
3 years ago
Which risk management framework does the organization of standardization publish
olga2289 [7]

Answer:

ISO 31000:2009 publishes principles and generic guidelines on risk management.

Explanation:

ISO 31000:2009 can be applied to any public, private or community company, organization, society or individual. Hence, ISO 31000:2009 is not particular to either business or area.

ISO 31000:2009 can be implemented during the period of an industry and to a broad variety of actions, including policies and judgments, guidance, methods, functions, plans, goods, services, and assets.

ISO 31000:2009 can be implemented to any type of danger, whatever its kind, whether possessing positive or negative outgrowths.

3 0
4 years ago
Which of the following are the rows or columns of white space created between grids?
erma4kov [3.2K]
It would be margins. none of the others are even terms for anything.
4 0
3 years ago
Algorithm and flowchart to find the perimeter and area of square​
kupik [55]

Answer:

I can give you the perimeter "algorithm" but not the flowchart.

Here you go:

p = w * 4

p = perimiter,

w = width/height

4 = the amount of sides needed.

perimeter = width * 4

to include both width and height, we would instead use:

perimeter = 2(width+height)

This also works with rectangles ^

--------------------------------------------------------------------------

To find an area, it is just width * height. This is also compatible with rectangles.

4 0
3 years ago
Which education and qualifications are most helpful for Law Enforcement Services careers? Check all that apply.
bixtya [17]

Explanation:

For IAS..we need a high amptual amount of knowledge..

For IPS..we need master degree and physical fitness too..

For An Advocate..we need Master degree and social Skills..

so..the education and qualifications depends on the various jobs..

HOPE THE ANSWER IS USEFUL

3 0
3 years ago
Other questions:
  • What runs a network, steering information between computers and managing security and users?
    11·1 answer
  • Discuss two advantages and two disadvantages of agile methods.
    6·1 answer
  • A technician wants to consolidate and log specific alerts from network devices into a database so maintenance tasks and potentia
    11·1 answer
  • 2) Search the Web for two or more sites that discuss the ongoing responsibilities of the security manager. What other components
    15·1 answer
  • I can't find the errors! Could anyone help me please?!
    5·1 answer
  • Describe how both IPv4 and IPv6 access and utilize TCP as an upper-layer transfer protocol.
    6·1 answer
  • Help meee pleaseeee
    5·1 answer
  • What goals do you set for yourself while studying?
    9·2 answers
  • Convert the given for loop to while loop and find the output of the program assuming the
    14·1 answer
  • This is a human-made physical system.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!