1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vaieri [72.5K]
3 years ago
10

A certain program takes 26.67 seconds to run on 3 processors and 16 s to run on 7 processors. Find the execution time on one pro

cessor, the fraction of the program that can be parallelized, the theoretical execution time on an infinite number of processors, and P1/2.
Computers and Technology
1 answer:
brilliants [131]3 years ago
5 0

Answer:

The explanation for the question is listed in the section below on Explanation.

Explanation:

The time needed for a program to execute in 26.67 seconds on 3 processors. Time expected to run the program, therefore, should be as follows:

The time to run on one processor = \frac{26.67}{3} = 8.89 seconds.

The time needed for a program to execute in 26.67 seconds on 7 processors, should be:

Time = \frac{16}{7} = 2.2857 seconds.

Whenever the amount of processors increases the performance or speed should increase.

The time is taken in percentage = \frac{26.67}{16}×100% = 170 %

As the number of processors increases from 3 to 7, the time required according to each processor increases by 70%.

In one processor the execution time should be as follows:

26.67+(26.67×0.7) = 45.339

                              = 45 seconds

Therefore. the execution period for a single processor is about 45 seconds.

The work is performed in parallel, whereas the program is already being parallelized. The overall function ought to be shared between the processor. The time is shortened to around half. Hence the duration taken will be 8 seconds after parallelization.

Theoretical execution time would be Tp > T infinity.

Thus, T infinity<45

The theoretical processing interval on processor count P1/2 would therefore be less than 8 seconds. Because, the time required during parallelization was just that.

You might be interested in
Jeremy Bridges is an executive for Green Web Designs, where his primary role is to ensure the security of business systems and d
klasskru [66]

Answer:

Chief Security Officer

Explanation:

According to the given statement in the question the Jeremy's role in the company is "Chief Security Officer (CSO)".

The chief Security officer has the role of developing and looking on to the strategies and policies that are required for maintaining the operational, strategic, financial and reputational security  of the  overall company.

6 0
3 years ago
A website wants to gives out detailed information to viewers about its upcoming conference and also provides a feature for searc
Alenkinab [10]

Answer: WIREFRAME

A website wireframe, also known as a page schematic or screen blueprint, is a visual guide that represents the skeletal framework of a website.[1]:166 Wireframes are created for the purpose of arranging elements to best accomplish a particular purpose. The purpose is usually being informed by a business objective and a creative idea. The wireframe depicts the page layout or arrangement of the website's content, including interface elements and navigational systems, and how they work together.[2]:131 The wireframe usually lacks typographic style, color, or graphics, since the main focus lies in functionality, behavior, and priority of content.[1]:167 In other words, it focuses on what a screen does, not what it looks like.[1]:168 Wireframes can be pencil drawings or sketches on a whiteboard, or they can be produced by means of a broad array of free or commercial software applications. Wireframes are generally created by business analysts, user experience designers, developers, visual designers, and by those with expertise in interaction design, information architecture and user research.

3 0
3 years ago
What is the difference of expository and reflexive documentary
spayn [35]
The reflexive documentary mode focuses on the relationship between the filmmaker and the audience. While expository documentaries set up a specific point of view or argument about a subject and a narrator often speaks directly to the viewer.
3 0
3 years ago
In order for an IT security framework to meet information assurance needs, the framework needs to include policies for several a
Ugo [173]

Answer:

(1) Protecting the privacy of personal data and proprietary information

(2) Proprietary Information

These two cannot be infringed on but below are the policies that must be taken in high esteem and can be infringed upon

(1) Disaster Recovery Policy

(2) Acceptable Use Policy

(3) Business Continuity plan

4 0
3 years ago
In the Dognition_aggregated_by_DogID data set, what is consistent about the relationship between breeding group and number of te
snow_tiger [21]

Answer:

Toy dogs

Explanation:

Tableau is an application used for statistically analyzing and visualizing data. It is very popular for its ecstatic data visualization figures and works with all dataset types to create a tableau data format.

The Dognition_aggregated_by_DogID dataset holds data for the different dog types, breeding, and tests done on them. The consistent relation between the breeding group column and tests completed is the toy dogs.

3 0
3 years ago
Other questions:
  • Assume that an int variable age has been given a value. Assume further that the user has just been presented with the following
    14·1 answer
  • John works for Internal Computer Specialists, which focuses on helping small business owners resolve MIS infrastructure issues.
    12·1 answer
  • From the standpoint of the governing bodies of .com, why is it important that owners of individual domains maintain authoritativ
    5·1 answer
  • Help pleaseeeeeeeeeeeee
    13·2 answers
  • The Cursor is blinking in a white area on the Screen. This area where text will appear in the ____.
    10·2 answers
  • Zoom meeting ID:987 6858 5587 Password:196133
    10·2 answers
  • Multiple Choice
    8·1 answer
  • Complete the steps for adding a recurring event.
    10·1 answer
  • Discuss the ways you can perform to prevent your computer/device and its data/contents from being stolen. Define two-facto authe
    7·1 answer
  • Another name of computer program is
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!