1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pochemuha
3 years ago
12

Does anyone know how I can make this return a double with 2 decimal places?

Computers and Technology
1 answer:
dolphi86 [110]3 years ago
8 0

hi :)   .,..............

Explanation:

You might be interested in
Consider two different implementations, M1 and M2, of the same instruction set. There are three classes of instructions (A, B, a
kkurt [141]

Answer:

(a) Calculate the average CPI for each machine, M1, and M2

Average CPI = Cycles per Instruction * Frequency of each  Instruction

                     = CPI * F

For Machine M1:

Cycles per Instruction/ Clocks per Instruction =  (60%)* 1 + (30%)*2 + (10%)*4

                                                                        = (0.60) * 1 + (0.30) * 2 + (0.10) * 4

                                                                          = 0.6 + 0.6 + 0.4

                                                                          = 1.6

For Machine M2:

Cycles per Instruction/ Clocks per Instruction=  (60%)*2 + (30%)*3 + (10%)*4

                                                                         = (0.60) *2 + (0.30) * 3 + (0.10) *4        

                                                                         = 1.2 + 0.9 + 0.4

                                                                          = 2.5

(b) Calculate the average MIPS ratings for each machine, M1 and M2.

MIPS rating can be found by using this formula

MIPS rating = Instruction Count / Execution Time * 10^6

                   = Instruction count  / IC X CPI * Clock cycle time * 10^6

                   = IC X Clock rate  / IC X CPI X 10^6

                   = Clock Rate/(CPI * 10^6)

MIPS rating for Machine M1:

The clock rate for M1 is 80 MHz and CPI calculated in (a) is 1.6 So:

MIPS rating = (80 * 10^6) / (1.6 * 10^6 )

                   =  80000000/ 1600000

                   =  50

MIPS rating for Machine M2:

The clock rate for M1 is 100 MHz and CPI calculated in (a) is 2.5 So:

MIPS rating = (100 * 10^6 ) / (2.5 * 10^6 )

                   =  100000000 / 2500000

                  =  40

(c) Which machine has a smaller MIPS rating?

  • M2 has a smaller MIPS rating which is 40.

Which individual instruction class CPI do you need to change, and by how much, to have this machine have the same or better performance as the machine with the higher MIPS rating.

Machine M1 has the higher MIPS rating than M2 and in order to make M2 perform better than M1, the CPI of instruction class A should be modified. Lets change the instruction class A CPI to 1 in place of 2.

Then:

Cycles per Instruction/ Clocks per Instruction= (60%)*1 + (30%)*3 + (10%)*4

                                                                       = (0.60 * 1) + (0.30 * 3) + (0.10 * 4)

                                                                       = 0.60 + 0.9 + 0.4

                                                                       = 1.9

Average MIPS rating = (100 * 10^6) / (1.9 * 10^6 )

                                   = 100000000 / 1900000

                                   =  52.6

Average MIPS rating is of M2 after changing instruction class A CPI is 52.6 which is better than the average MIPS rating of M1 which is 50.0

4 0
3 years ago
The Word feature that would allow you to insert fields from an Access database into multiple copies of a Word document is called
Arte-miy333 [17]

Answer:

Mail Merge.

Explanation:

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users type, format and save text-based documents.

Microsoft Access can be defined as a software application or program designed by Microsoft corporation to avail end users the ability to create, manage and control their database.

A Mail Merge is a Microsoft Word feature that avails end users the ability to import data from other Microsoft applications such as Microsoft Access and Excel. Thus, an end user can use Mail Merge to create multiple documents (personalized letters and e-mails) at once and send to all individuals in a database query or table.

Hence, the Word feature that would allow you to insert fields from an Access database into multiple copies of a Word document is called Mail Merge.

3 0
3 years ago
Is this correct? I say its B, but my friend says its D.
kari74 [83]

Answer:

b

Explanation:

4 0
3 years ago
Read 2 more answers
Sally needs to teach her class how to convert a decimal number to a binary number. What is the first step she should take to sta
Alborosie

<u>Answer:</u>

  • <em>A. divide the decimal number by the base value 2</em>
  • <em>C. note the remainder separately</em>
  • <em>D. divide by 2 until she gets 0 as the remainder</em>
  • <em>B. collect the digits in the reverse order</em>

<u>Explanation:</u>

When we want to convert decimal number to a binary number first we have divide the given number by 2. The next step is to note the reminder of the number in the side every division so that the reminder value is the binary value. Repeat this until an zero is encountered.

We have to collate all the remainders from last of first and then the collated number is the answer for the given problem.

<em>So the given option can be ordered as, </em>

  • <em>A</em>
  • <em>C</em>
  • <em>D</em>
  • <em>B</em>
6 0
4 years ago
julie was just hired to conduct a security assessment of dion training’s security policies. during her assessment, she noticed t
Tasya [4]

An Increase in individual accountability is the improvement that this recommended action will provide for the company.

<h3>What is the aim of the training’s security policies improvement?</h3>

In order to adequately provide accountability, the use of shared or group accounts should be disabled and this allows you to log and track individual user actions based on their individual user accounts.

Also, it will enables the organization to hold users accountable for their actions, too.

Therefore, the Increase in individual accountability is the improvement that this recommended action will provide for the company.

Read more about security policies

brainly.com/question/28165644

#SPJ4

3 0
1 year ago
Other questions:
  • What happens when a returntype, even void, is specified as a constructor in Java?
    14·1 answer
  • Explain the importance of determinism in an industrial LAN
    8·1 answer
  • The degree to which a firewall can impose user access restrictions is known as which of the following?Security assurancePrivileg
    8·1 answer
  • How much heat is needed to raise the temperature of 7g of water by 15oC?
    6·1 answer
  • 1) List two hardware methods that can be used to secure data
    11·1 answer
  • Write a function solution that, given an integer N, returns the maximum possible
    8·1 answer
  • Como se diseña y produce un material audiovisual
    5·1 answer
  • Assignment 2: room area <br>programming python in Project Stem​
    8·1 answer
  • What physical disk oriented performance counter should be used to determine the number of requests waiting to be processed by a
    9·1 answer
  • HC - AL-Career Preparedness
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!