1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ladessa [460]
3 years ago
6

Alex builds a 1 GHz processor where two important programs, A and B, take one second each to execute. Each program has a CPI of

2. Elaine is tasked with designing the company's next-generation processor. She comes up with an idea that improves the CPI of A to 1.5 and the CPI of B to 1.8. But the idea is so complex that the processor can only be implemented with a cycle time of 1.2 ns. Does Elaine's new processor out-perform Alex’s processor on program A? How about on program B?

Computers and Technology
1 answer:
BigorU [14]3 years ago
7 0

Answer:

attached below

You might be interested in
Many phone fraud scammers are expessily cunning because they approach the target to try to sell
saw5 [17]

Answer:

improved computer security programs

Explanation:

4 0
2 years ago
CODEHS- Please help!
Ksivusya [100]

Answer:

Revisiting "Build a Tower"

Recall in the last section how we made Karel make a tower of tennis balls. We told Karel to move() and turnLeft() and putBall() until we had a tower. At the end of the program, Karel was still at the top of the tower, like as in the picture below.

Stuck at top

Suppose that now we want Karel to come back down from the top of the tower. The first thing we need to do is get Karel facing in the right direction. One way to do this is to tell Karel

turnLeft();

turnLeft();

turnLeft();

And then tell Karel to

move();

move();

move();

back to the bottom of the tower.

However, telling Karel to turnLeft() three times is not very readable. That's a lot of writing when all we really want is to tell Karel to "turn right."

Explanation:

Hopefully it would help.

8 0
3 years ago
Write a Python function called readlinesmton that accepts the name of the file (i.e. filename), starting line number (i.e. m) an
KatRina [158]

Answer:

Following are the code to the given question:

def readlinesmton(filename, m ,n):#defining a method that holds three parameters

   f=open(filename, 'r')#defining f variable that holds open method

   l=f.readlines()#defining a variable l that readers input file

   e=len(l)#defining e variable lengths of the file  

   s=m#defining s variable that holds parameter value

   if(m<1):#Using if block that checks m is less than 1

       s=1#use s variable that holds a value that is 1

   if(n < e):#defining n variable that checks n less than e

       e=n #using e that holds n value

   for i in range(s-1, e, 1):#defining for loop that calculates lines  

       print(l[i])#prints lines

readlinesmton("input.txt", -1, 70)#Calling a method

Output:

Please find the ouput in the attached file.

Explanation:

In this code, a method "readlinesmton" is declared that takes three-parameter and inside the method, it uses the open method to open the file, read method to read the file, and len to calculate the length of the file and use the conditional statement to check the file inputs and use the loop to prints its values.    

5 0
3 years ago
Which of the following operations are considered to be crucial tasks that should be performed before installing server roles and
Bas_tet [7]

Answer:

A. Static IP address have been configured.

Explanation:

A network is an interconnection of network devices for communication to occur. A network comprises of end devices and intermediate network devices.

End devices are the sources and destinations of data transmission, while intermediate devices are the devices that makes communication of data possible like routers and switches. Examples of end devices are servers and workstations (computers, smartphones etc.).

A server in a network is a device that provides special services to workstations or clients. The IP addresses of servers must be known, that is, a static IP address must be configured on a server. Examples of server protocols are DNS, TFTP, FTP, DHCP etc.

8 0
3 years ago
in the world of computing accessibilty most often refers to: a how quickly software opens , b password protection, c assistance
Wittaler [7]
C. assistance for the disabled
8 0
3 years ago
Other questions:
  • Tower defense is included under which genre of game
    15·2 answers
  • The equipment that processes data in order to create information is called the _______.
    8·2 answers
  • What does CPL stand for
    9·2 answers
  • When searching the web software programs called fetch a few web pages and then they follow the links on those pages and fetch th
    9·2 answers
  • Secondary hard drive whats its purpose
    5·1 answer
  • Which technology will a business use to figure out who accessed confidential files on a company's computer system
    12·1 answer
  • Your secondary servers have not been able to contact your primary server to synchronize information. How long will the secondary
    12·1 answer
  • I’m gonna ask this again because I REALLY need an answer.
    10·2 answers
  • Which option on the Format tab is used to modify particular portions of the chart?
    13·1 answer
  • Which of the following is the most significant result of technological innovation?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!