1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kicyunya [14]
4 years ago
13

Another pitfall cited in Section 1.10 is expecting to improve the overall performance of a computer by improving only one aspect

of the computer. Consider a computer running a program that requires 250 s, with 70 s spent executing FP instructions, 85 s executed L/S instructions, and 40 s spent executing branch instructions.
Computers and Technology
1 answer:
Alexandra [31]4 years ago
8 0

Answer:

<u>note:</u>

<em><u>solution is attached in word form due to error in mathematical equation. furthermore i also attach Screenshot of solution in word due to different version of MS Office please find the attachment</u></em>

Download docx
You might be interested in
Which term is defined as an exploit that takes place before the security community or software developer knows about the vulnera
Natasha_Volkova [10]

Answer:

A zero-day attack.

Explanation:

A Zero-day vulnerability is a computer-software vulnerability that is unknown to, or unaddressed by, the security community or software developer or even the vendor of the target software. Until the vulnerability is mitigated, hackers can exploit it to adversely affect computer programs, data, additional computers or a network.

An exploit directed at a software with zero-day vulnerability & exploiting this vulnerability is called a zero-day exploit, or zero-day attack.

3 0
3 years ago
Suppose that bClass is a class. Which of the following statements correctly derives the class dClass from bClass? a. class dClas
DerKrebs [107]

Answer:

The answer to the given question is option "d".

Explanation:

In C++ programming language we use the (:) colon to perform inheritance in the class. The by default access modifier is used for inheritance that is "private". In the given options the option d is correct and other options are not correct that cab be described as:

  • In option, a, b we use the scope resolution operator (::) that is not used for inheritance.
  • In option, c we inherit drive class to base class that is not correct.  

That's why the answer to this question is option "d".

4 0
4 years ago
Why is graphics important in multimedia application <br>​
erastova [34]
Graphics are important in multimedia application this is because humans are visually oriented etc.
5 0
3 years ago
Describe personal computer skills using three adjectives?
Volgvan

Answer:

proficient with Microsoft word Excel and PowerPoint

Explanation:

compost and send over 150 images microsoftop creating and the formatting simple office budget speed sheets on Microsoft Excel Bros and its documents Microsoft word

5 0
2 years ago
Read 2 more answers
How old was the mummy where they found a wooden prosthetic toe on him?
White raven [17]

Answer:

950 Bc and 710 bc

Explanation:

They could of course have remained bare foot or perhaps have worn some sort of sock or boot over the false toe, but our research suggests that wearing these false toes made walking in a sandal more comfortable," she continued. The wood and leather toe was made for a woman that likely lived between 950 BC and 710 BC.Oct 2,

6 0
3 years ago
Other questions:
  • What is requirement analysis
    8·1 answer
  • Which of the following statements is false? Speaking to your computer is a form of input. Playing a video is an example of outpu
    10·1 answer
  • Your uncle spent most of his teen years in a hospital undergoing treatment for a severe physical illness. As an adult, he is rat
    10·1 answer
  • What is an allocation unit?
    10·1 answer
  • Electricity was seen as a mysterious force and began to creat a stir when people called​
    13·1 answer
  • What is an unknown network called
    6·1 answer
  • Need help with these
    8·1 answer
  • What is the minimum number of bits needed to store the decimal value 200?
    12·1 answer
  • What is binary ????????
    5·2 answers
  • Your development team is planning to host a development environment on the cloud. This consists of EC2 and RDS instances. This e
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!