1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artyom0805 [142]
3 years ago
13

A) Suppose a computer has an instruction pipeline with 4 phases. How many cycles (if there are no delays) would it take to compl

ete 80 instructions. How many cycles would it take if the processor were not pipelined?
b) Explain the problem caused by a conditional branch instruction in a pipeline.
c) Give 2 ways of dealing with the problem of conditional branching.
Computers and Technology
1 answer:
Reika [66]3 years ago
3 0

Answer:

Explanation:

(a) Given data:

Instruction pipeline with 4 phases.

80 instruction

The number of cycles if the processor were pipelined :

80-1 = (79) instruction takes only 1 extra cycle to complete.

So, cycles counts = 4 + (79) = 83 cycles.

The number of cycles if the processor were not pipelined.  

Each instruction takes 4 cycles to complete.  

So, cycle counts = 80 * 4 = 320 cycles.

(b) One of the main problems of conditional branching in pipelines is the delay it gives even after the branch target buffer.

In pipeline, conditional branches depend on the codes which are still in estimation.

(c) Two ways to deal with problem arising due to conditional branching are as follows :

1. Delayed Branching    

2. Multiple Condition Codes

You might be interested in
Hey friends,<br><br> What is a IT form?<br><br> thanks
ziro4ka [17]

Hi buddy, an IT form is for people who are applying at a TECH college.

Love u <3

Hope this helps

8 0
3 years ago
A database program helps to ____________.
Juliette [100K]
D. A database is software which is designed to store massive amounts of data and organize them in such a way that information can easily be worked on (added, deleted, moved, etc...).
8 0
3 years ago
Read 2 more answers
Which of the following is the single best rule to enforce when designing complex passwords?
saw5 [17]

Answer:

B. Longer passwords

Explanation:

If the password is longer, it requires more incorrect attempts to find it, so the system could identify a potential hacker attempt. Smaller but more complex passwords could be identified by mistype or forgotten passwords.

3 0
3 years ago
With ____ editing, word automatically displays a paste options button near the pasted or moved text.
lyudmila [28]

Answer:

With drag-and-drop editing, word automatically displays a paste options button near the pasted or moved text.

Explanation:

<u>Option A:</u> Cut and paste option is invalid because, cut and paste option does not provide paste symbol near the copied text. This option and cut and paste a selected text.

<u> Option C :</u> Inline is invalid in this context

<u>Option D: </u>Copy and Carry is not valid because the option “copy” is available where as carry is not available.

<u>Option B:</u> Drag and drop is the right answer because, it provides paste option by using this feature. A text can be drag and drop by selecting the text and dragging the mouse with the left click

8 0
3 years ago
Se que esto no tiene que ver con ninguna materia pero porque en instagram me sale por ejemplo que han visto 10 personas Y cuando
abruzzese [7]

Answer:

Bueno, realmente no entendí lo que dijiste, pero, ¿podrías decirlo donde puedo ayudarte?

7 0
3 years ago
Other questions:
  • What is a valence orbit?
    13·2 answers
  • Which subject area describes collecting and analyzing data from computer systems, networks, and storage devices, as part of an i
    7·1 answer
  • List and explain the error in the code
    14·1 answer
  • How many bits must be “flipped” (i.e., changed from 0 to 1 or from 1 to 0) in order to capitalize a lowercase ‘a’ that’s represe
    11·1 answer
  • You can install several printers on your machine, but at least one must be the _______ printer.
    6·1 answer
  • Chevening is looking for individuals with strong professional relationship building skills, who will engage with the Chevening c
    15·1 answer
  • The hardware to keep the output data when finished is a
    9·1 answer
  • What method is used to manage contention-based access on a wireless network?
    7·1 answer
  • Translate the following C++ program to MIPS assembly program. *Please explain each instruction of your code by a comment and sub
    5·1 answer
  • Which technology keeps track of heart rate during a workout? (3 points) bathroom scale calculator pedometer wrist monitor
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!