1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
almond37 [142]
2 years ago
10

Suppose that a computer can read or write a memory word in 5 nsec. Also suppose that when an interrupt occurs, all 32 CPU regist

ers, plus the program counter and PSW are pushed onto the stack. What is the maximum number of interrupts per second this machine can process?
Computers and Technology
2 answers:
Nitella [24]2 years ago
6 0

Answer:

2,941,176 interrupts per second

Explanation:

mojhsa [17]2 years ago
3 0

Answer:

<em>2,941,176 interrupts per second</em>

Explanation:

Given that:

<em>The number of words = </em>1 PSW (program status word) + 1 program counter + 32

                                        CPU registers  

                                     = 34

<em>The time taken to R/W  a memory word = 5 nano seconds </em>

Prior to the interrupt, 34 words are needed to be pushed into the stack, and 34 words are needed to pop out of the stack after the interrupt is handled.

Therefore, in total 68 words are needed during the Read and Write execution.

To calculate the number of interrupts handled by the machine, we have to first establish the time required to read and write 68 words:

= 68 x 5nsec

= 340nsec

= 340 x 10^{-9} sec (converting it to seconds)

maximum number of interrupts = \frac{1,000, 000,000}{340} = 2,491,176 interrupts.

You might be interested in
Which payment method typically charges the highest interest rates
mixer [17]
Credit cards do charge the most interest
5 0
3 years ago
A data structure used to bind an authenticated individual to a public key is the definition of ________.
patriot [66]

Answer:

Digital Certificate is the correct answer of this question.

Explanation:

Digital certificates are always for encryption and identification for transmitting public keys.The concept of digital certificate is a data structure used for linking an authenticated person to a public key. It is used to cryptographically attach public key rights to the organization that controls it.

<u>For example</u>:- Verisign, Entrust, etc.

  • An appendix to an electronic document that is used for authentication purposes.
  • A digital certificate's most frequent use is to confirm that an user sending a message is who he or she appears to be, and provide the recipient with the means to encode a response.

4 0
3 years ago
What is the difference between an html opening tag and a closing tag?.
Doss [256]

Answer:

Explanation:

Generally speaking, there are two kinds of tags - opening tags: <html> and closing tags: </html>. The only difference between an opening tag and a closing tag is the forward slash "/". You label content by putting it between an opening tag and a closing tag.

HTML is all about elements.

7 0
1 year ago
The hardware and software that must be implemented to support the applications that the primary activities use are a part of the
Contact [7]
The answer is infrastructure
7 0
2 years ago
Which of the following OSI layers is responsible for the segmentation, multiplexing, flow control and host-to-host communication
Lisa [10]

Answer:

Transport Layer

Explanation:

The transport layer which is responsible for end-to-end communication over a network. Transport Layer breaks the data, allocated by Application layer in smaller units called segments. It is used to number every byte in the segment. It is also responsible for error correction and provides reliability to the user. It allows the host to send and receive error corrected data, messages or packets  over a network and ensures  that data should be received in the same sequence in which it was sent.  It also enables multiplexing and flow control.

7 0
3 years ago
Other questions:
  • The exercise instructions here are LONG -- please read them all carefully. If you see an internal scrollbar to the right of thes
    8·1 answer
  • How to access files on different computer same network
    14·1 answer
  • which one of these steps describe saving a newly created file. click on the save icon. minimize the file. name the file. select
    12·2 answers
  • Describe how antipoverty programs can discourage the poor from working. How might you reduce this disincentive? What are the dis
    11·1 answer
  • Web browsers are used to browse the world wide web.
    5·2 answers
  • EX 3.8 Write code to declare and instantiate an object of the Random class (call the object reference variable rand). Then write
    6·1 answer
  • What are the most commonly found items in the trash according to the Municipal Solid Waste report?
    12·2 answers
  • In order to create a chart, which of the following must be selected?
    8·1 answer
  • What does this map key show
    12·1 answer
  • What is the greatest number of bits you could borrow from the host portion of a class B subnet mask and still have at least 130
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!