1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
V125BC [204]
3 years ago
8

Which threading model is best for achieving true parallelism and how?

Computers and Technology
1 answer:
WITCHER [35]3 years ago
7 0

Answer:

The explantion of this question is given below in the explanation section.              

Explanation:

Parallelism means that an application is split into smaller subtasks that can be processed in parallel on multiple CPU at the same time. Parallelism is related to application handling individual tasks on multiple CPUs. To achieve true parallelism your application must have more than one thread running, schedule the task into other threads, graphics cards, and CPU, etc.  

It is noted that parallelism is a concept while multiple threading in computer programing is its implementation. Some operating systems provide a multiple threading that combined the user-level thread and kernel-level thread facility. In such a system, multiple threads within the same application can run in parallel on multiple CPU or processors

There are three types of Multithreading Model

• Many to many relationships.

• Many to one relationship.

• One to one relationship.

Many to many relationship

This model multiplexes any number of user threads onto an equal or smaller number of kernel threads. However, this model provides the best accuracy to concurrency. However, using this model, true parallelism can be achieved, if the system has multiprocessor.  

Many to One model

This model maps the user-level threads to one kernel-level thread and its management is done in userspace by the thread library. In this model, only one thread can access the Kernal at a time, so multiple threads are unable to run on multiple CPU in parallel.  

One to one relationship

This model provides one to one relationship between the user and kernel-level thread. This model is better than the many-to-one model. It allows another thread to execute when a thread makes a blocking system call. However, it supports multiple threads to execute in parallel on the microprocessor. This model provides true parallelism.  

                                                                  

You might be interested in
What is the basic body structure of html.
hodyreva [135]

Answer:

A line holding HTML version information, a declarative header section (separated by the HEAD element), and a body containing the document's actual content make up an HTML 4 page.

8 0
2 years ago
Read 2 more answers
What happens if you have you an image that has 6 bits-per-pixel and you change it to 12
Bingel [31]

Answer:I don't know

Explanation:

6 0
3 years ago
How will the health care professions be affected by all the computerized and technical advances concerning disabilities?
goldenfox [79]

Answer: Technology has placed at the disposal of the healthcare community various potent tools to improve patient care. Since EHRs are easily available to physicians, they can access complete medical histories of patients and make the most well-considered medical decisions.

Explanation:

4 0
3 years ago
. List 5 types of exploits from cybercrime and provide brief definition. (2.5 Marks)
Flura [38]

In cyber security, an exploit is a way attackers take advantage of certain vulnerabilities and gain malicious access to systems. There are very many types of exploits that exist in the cyber security world. However, I will mention those ones most commonly used.

DoS attacks – The denial of service attacks is very common. Hackers will gain access to servers and send so many packet requests at the same time. The servers become overwhelmed due to too much memory allocation and the huge amount of traffic ends up crashing the servers.

Unauthorized access – When an attacker has an illegal access to host machines

<u>Application Exploitation</u>

Code injection – This exploit can be used to maliciously inject invalid code into an application program or software and as a result change how the program behaves.

Cross-site scripting – Enable hackers inject malicious scripts on a website of a client. Once they have gained access, they will escalate their privileges and have more access to the site.

Clickjacking – A type of attack that tricks unknown victims into clicking links of a web page they believe are legitimate and end up revealing confidential information of themselves.

6 0
4 years ago
JAVA
ivolga24 [154]

import java.util.Scanner;

public class JavaApplication57 {

   

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       System.out.println("Enter two numbers:");

       int num1 = scan.nextInt();

       int num2 = scan.nextInt();

       while (num1 <= num2){

          if (num1 %2 == 0){

              System.out.print(num1+" ");

          }

          num1+=1;

       }

   }

   

}

I hope this helps!

6 0
3 years ago
Other questions:
  • What is a critique of the feature detector model of object recognition?​?
    8·1 answer
  • If an improvement creates no significant change in a product’s performance, then it is a(n) ? a0 design improvement.
    6·1 answer
  • Which of the below statements describes the nature of HTML elements - check as many as apply
    6·1 answer
  • There are several vehicles in a parking lot. Some of them are motorcycles
    8·2 answers
  • Write a method reverse( ) for OurLinkedList class. The method should return a new OurLinkedList object that is the reverse of th
    8·1 answer
  • Hello, please help write code in C++. Primary U.S. interstate highways are numbered 1-99. Odd numbers (like the 5 or 95) go nort
    12·1 answer
  • Which of the following is NOT a component of a DFD?
    8·1 answer
  • Jenny is the project manager and her company. She needs to break her current project into parts that her employees can work on.
    10·1 answer
  • When computing the cost of the basket of goods and services purchased by a typical consumer, which of the following changes from
    11·1 answer
  • List the difference between GIGO and bug ​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!