1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
V125BC [204]
3 years ago
8

Which threading model is best for achieving true parallelism and how?

Computers and Technology
1 answer:
WITCHER [35]3 years ago
7 0

Answer:

The explantion of this question is given below in the explanation section.              

Explanation:

Parallelism means that an application is split into smaller subtasks that can be processed in parallel on multiple CPU at the same time. Parallelism is related to application handling individual tasks on multiple CPUs. To achieve true parallelism your application must have more than one thread running, schedule the task into other threads, graphics cards, and CPU, etc.  

It is noted that parallelism is a concept while multiple threading in computer programing is its implementation. Some operating systems provide a multiple threading that combined the user-level thread and kernel-level thread facility. In such a system, multiple threads within the same application can run in parallel on multiple CPU or processors

There are three types of Multithreading Model

• Many to many relationships.

• Many to one relationship.

• One to one relationship.

Many to many relationship

This model multiplexes any number of user threads onto an equal or smaller number of kernel threads. However, this model provides the best accuracy to concurrency. However, using this model, true parallelism can be achieved, if the system has multiprocessor.  

Many to One model

This model maps the user-level threads to one kernel-level thread and its management is done in userspace by the thread library. In this model, only one thread can access the Kernal at a time, so multiple threads are unable to run on multiple CPU in parallel.  

One to one relationship

This model provides one to one relationship between the user and kernel-level thread. This model is better than the many-to-one model. It allows another thread to execute when a thread makes a blocking system call. However, it supports multiple threads to execute in parallel on the microprocessor. This model provides true parallelism.  

                                                                  

You might be interested in
What is the number reason for conflict on a team?
Viefleur [7K]

Answer:

jvphcrx8cctiit9t9t9t

5 0
3 years ago
13) What are the benefits and detriments of each of the following? Consider both the systems and the programmers’ levels. a. Sym
dsp73

Answer:

Automatic and Explicit Buffering.

In the case of explicit buffering, the length of the queue is provided while in automatic buffering the queue size needs to be indefinite. In automatic buffering there is no need to block the sender while coping the message. While in explicit buffering the sender is blocked for the space in queue.

No memory is being wasted in explicit buffering.

Send by Copy and Send by Reference.

By using the send by copy method, the receiver is not able to change the state of parameter while send by reference allow. The advantage of using the send by reference method is that it allows to change a centralized application to its distributed version.

Fixed-sized and Variable-sized Messages.

In fixed size messaging refers, the buffer size is fixed. This means only a particular number of messages can only be supported by the fixed size buffer. The drawback of the fixed size messages is that they must be a part of fixed size buffer. These are not a part of variable size buffer. The advantage of variable size message is that the length of the message is variable means not fixed. The buffer length is unknown. The shared memory is being used by the variable size messages.

Explanation:

5 0
3 years ago
Sandy's keyboard is not inputting data into her computer which key should she press to verify it is connected to her computer...
Ksivusya [100]

Answer:

Windows key,capslock key for verify connectivity

Explanation:

Sandy's can verify whether her keyboard is working or not by pressing the windows key. Caps Lock and Num lock key will turn on the light on keyboard and she shall see whether her keyboard is functioning or not. This method is being used everywhere to verify the keyboard connectivity.The light function can also be checked by using Caps Lock or Num lock key as well. Some keyboard offers the in built light, which can be turned on by pressing Alt+Space bar.

5 0
3 years ago
A large, closet-sized computer capable of simultaneously processing data for hundreds or thousands of users is most likely a ___
Feliz [49]

Answer:

The correct answer is <u>mainframe</u>

I hope this helps! ^-^

4 0
2 years ago
Have you ever been told sensitive or confidential information that made you uncomfortable? How did you deal with the situation?
Korvikt [17]
I would tell said individual to stop what they’re trying to tell me because if it’s not stuff I should know about or want to hear about then I don’t wanna hear any of it
7 0
3 years ago
Other questions:
  • Which was the first wiki based website
    15·2 answers
  • What is the accounting equation?
    12·1 answer
  • ​_____ was the first commercially successful computer. ​z3 ​eniac ​univac ​colossus
    13·1 answer
  • Working together, printer A and printer B would finish the task in 24 minutes. Printer A alone would finish the task in 60 minut
    8·1 answer
  • Explicit knowledge can be documented and codified, whereas tacit knowledge encompasses insights, judgment, creative processes, a
    9·1 answer
  • Which of the below statements describes the purpose of HTML 5 - check as many as apply
    9·1 answer
  • Write a program that allows the user to enter a time in seconds and then outputs how far an object would drop if it is in free f
    7·1 answer
  • NumA = 3 <br>numB = 2<br>Result = numA ** numB
    12·1 answer
  • What line of business (L'Oréa)?​
    8·2 answers
  • A web application with an SQL server database is found to be compromised by an attacker. On examination, the email IDs of the da
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!