1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ladessa [460]
2 years ago
6

Alex builds a 1 GHz processor where two important programs, A and B, take one second each to execute. Each program has a CPI of

2. Elaine is tasked with designing the company's next-generation processor. She comes up with an idea that improves the CPI of A to 1.5 and the CPI of B to 1.8. But the idea is so complex that the processor can only be implemented with a cycle time of 1.2 ns. Does Elaine's new processor out-perform Alex’s processor on program A? How about on program B?

Computers and Technology
1 answer:
BigorU [14]2 years ago
7 0

Answer:

attached below

You might be interested in
You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 54Mbps. In a
mariarad [96]

Answer:

The best choice is 802.11a.

Explanation:

The most common option, that is widely used in home internet is 802.11b, however, this only supports a max speed of 11Mbps.

802.11a supports up to 54Mbps and it has regulated frequencies that prevent interference from other devices, such as the wireless system that your client already has. This option is more expensive, and its signal has issues going through walls and rooms but still, it is the one that fits him the most.

4 0
3 years ago
To keep information beyond reach of unauthorized users, is to keep the information _____. Group of answer choices simple verifia
nasty-shy [4]

Answer:

Secure is the correct answer for the above question.

Explanation:

  • When any person wants that any information is not hacked by any user then he needs to secure the information with the help of any security mechanism. This security mechanism can be of any type that facilities the user to stop the information are being hacked.
  • The above question asked about the work which is needed to stop the message is being hacked. So there is a need to secure the information. so secure is the correct option while the other option is not valid because "simple, economical or verifiable" can not stop the message from accessed by the unauthorized user.
7 0
3 years ago
What isthe concept of packets, give example?
Oduvanchick [21]

Answer: Packets are the small unit of data that is sent from source to destination on a network.

Explanation: Packets are small packages that carry data in a packet form and is used from transferring it on internet or any kind of packet-switched network. They use the internet protocol (IP) for the transmission of data.

Example: packet radio is a sort of digital radio that uses the packet for transmission of data to other nodes by utilizing the AX-25 protocol.

6 0
2 years ago
Which of the following tasks is the project manager least likely to be involved in?
user100 [1]

Answer:

i think its d sorry if i am wrong

3 0
3 years ago
Read 2 more answers
After sending input in the Chinese language to an AI system, Nina got numerous translations in the English language. Which chall
ad-work [718]

Answer:

i think its translation complexity

Explanation:

8 0
3 years ago
Other questions:
  • Elisa and josh need to access general helps. Elisa will press the F1 key. josh will on ?. who will access general help
    15·1 answer
  • After an informative session, you find yourself with several pages of notes. For maximum retention and understanding, you should
    6·1 answer
  • The top-down approach is an appropriate strategy for most
    13·1 answer
  • Write a grammar for the language consisting of strings built only of the letters a and b. The strings may have any number of the
    6·1 answer
  • How do you change a account on an iPod generation 5
    10·1 answer
  • Select the antonym for given word freedom
    7·2 answers
  • 1. A database table can hold ??
    9·1 answer
  • Help me plzzzz ASAP T-T and it's Cyber Security but my last day of school is tomorrow and I'll graduate in June 24 so plzzzzz I
    12·1 answer
  • Make a list of five primary raw materials, for each one, indicate and industrial material that is created from it
    10·2 answers
  • How can knowing internal and external parts of computer help me
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!