1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
puteri [66]
3 years ago
6

For the preceding simple implementation, this execution order would be nonideal for the input matrix; however, applying a loop i

nterchange optimization would create a nonideal order for the output matrix. Because loop interchange is not sufficient to improve its performance, it must be blocked instead. (a) What should be the minimum size of the cache to take advantage of blocked execution

Computers and Technology
1 answer:
Vladimir [108]3 years ago
7 0

Answer:

hi your question lacks the necessary matrices attached to the answer is the complete question

1024 bytes

Explanation:

A) The minimum size of the cache to take advantage of blocked execution

 The minimum size of the cache is approximately 1 kilo bytes

There are 128 elements( 64 * 2 ) in the preceding simple implementation and this because there are two matrices and every matrix contains 64 elements .

note:  8 bytes is been occupied by every element therefore the minimum size of the cache to take advantage of blocked execution

= number of elements * number of bytes

= 128 * 8 = 1024 bytes ≈ 1 kilobytes

You might be interested in
Vocabulary and Bridge Information
motikmotik
Umm
This is to bunch of questions..
6 0
3 years ago
Safety glasses should be worn in which of the following situations?
N76 [4]
When any substance is being heated. Safety glasses
8 0
3 years ago
You are the network administrator for a company. The company's policy is that the users are allowed to set their own passwords b
insens350 [35]

After I have changed her password, all I will need to do is select the “User must change password at next logon” option. This option will prompt her to log on to her PC using the password I assigned to her.

Explanation

An active Directory on most Domain Controllers gives you access to add users, disable accounts, change password, and various other tasks. Assuming that everything is setup, I am just going to go to my Windows Server Manager dashboard of my Domain Controller. While I am at my dashboard, I will click on tools and then drop down to the Active Directory Users and Computers to locate my desired user who seems to have been locked out.

Once the user has been identified, I will simply need to right click on the account and select “reset password”. A small dialog box with a list of cool security options will pop up. I will be required to reset it to something simple and default and make sure to select the “User must change password at next logon” option.

What this means is that the user who is locked out, upon logging back in, will be prompted to enter the password I gave them first as default but then will immediately be asked to change the password to something new. We do not see options A and B a lot in the real world. It is best practice not to select these options

Learn more about Active Directory

brainly.com/question/13615178

brainly.com/question/13591643

#LearnWithBrainly

5 0
4 years ago
What are 4 ratios equal to 60%?
Elza [17]
6:10
3:5
9:15
12:20

These are all equal to 60%
3 0
3 years ago
Read 2 more answers
Advantages of a compiler​
valentina_108 [34]

Answer:

Improved performance.

Reduced system load.

Protection for source code and programs.

Improved productivity and quality.

Portability of compiled programs.

SAA compliance checking.

3 0
2 years ago
Read 2 more answers
Other questions:
  • What's the fastest way to reset Android pin?​
    5·1 answer
  • _____ is when network managers deal with network breakdowns and immediate problems instead of performing tasks according to a we
    9·1 answer
  • If you want the date in your document to update each time the document is opened, _____.
    9·2 answers
  • A computer has a word length of 8 bits (including sign). if 2’s complement is used to represent negative numbers, what range of
    5·1 answer
  • for which is a chart legend used? a.all of the time b.whenever you are comparing data that is the same c.whenever you are compar
    9·2 answers
  • what is created when the movement of light is blocked by an object and cannot pass through the other side?
    13·2 answers
  • You must. place a child in a federally approved child restraint device. if the child is
    5·2 answers
  • Help to how to write pseudo code to insert a new node to Binary Search Tree. Using C++.
    15·1 answer
  • NumA = 3 <br>numB = 2<br>Result = numA ** numB
    12·1 answer
  • Specifications that establish the compatibility of products and the ability to communicate in a network are called:
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!