1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lbvjy [14]
3 years ago
7

Suppose that a computer has three types of floating point operations: add, multiply, and divide. By performing optimizations to

the design, we can improve the floating point multiply performance by a factor of 10 (i.e., floating point multiply runs 10 times faster on this new machine). Similarly, we can improve the performance of floating point divide by a factor of 15 (i.e., floating point divide runs 15 times faster on this new machine). If an application consists of 50% floating point add instructions, 30% floating point multiply instructions, and 20% floating point divide instructions, what is the speedup achieved by the new machine for this application compared to the old machine
Computers and Technology
1 answer:
marishachu [46]3 years ago
6 0

Answer:

1.84

Explanation:

Operation on old system

Add operation = 50% = 0.5

Multiply = 30% = 0.3

Divide = 20% = 0.2

T = total execution time

For add = 0.5T

For multiplication = 0.3T

For division = 0.2T

0.5T + 0.3T + 0.2T = T

For new computer

Add operation is unchanged = 0.5T

Multiply is 10 times faster = 0.3T/10 = 0.03T

Divide is 15 times faster = 0.2T/15= 0.0133T

Total time = 0.5T + 0.03T + 0.0133T

= 0.54333T

Speed up = Old time/ new time

= T/0.54333T

= 1/0.54333

= 1.84

You might be interested in
Question 1<br> a node is.<br> •a sever<br> A Cell Phone<br> A Laptop<br> a device on a network
RSB [31]

Answer:

From Networkopoint of view, a node is a redistribution point or communication point or a connection point.

It can also mean devices or data points on a large network Such as laptop, phones, printers, etc

Explanation:

3 0
3 years ago
If a person is proactive, they do NOT have to be defensive.<br> True<br> False
Thepotemich [5.8K]
The answer is true for this question
6 0
3 years ago
Read 2 more answers
What port number is the web server listening on for the web request?
Veronika [31]
80 for HTTP, 443 for HTTPS
8 0
3 years ago
Which of the following are examples of IT
Advocard [28]

Answer:

Computer hardware engineer

Systems analyst

Database administrator

7 0
3 years ago
CAN SOMEONE PLEASE write about the evolution of music IN PETAL FORM PLEASE I NEED IT DUE TMR PLEASE I GIVE 15 POINTS AND BRAINLY
vitfil [10]

Answer:

Music can evolve by the process of natural selection, the same way species evolve in the natural world. They found that the loops quickly evolved into music attributable, in part, to the evolution of aesthetically pleasing chords and rhythms.

4 0
2 years ago
Other questions:
  • Linux distributions overview? information​
    7·1 answer
  • Which best explains why magnets can push on or pull other magnets without touching them?
    9·1 answer
  • Which style of leadership would be most helpful to Charles in the following situation? Charles has just started an internship at
    15·1 answer
  • If you're using the paintbrush tool and want to change the color of the paint being used what should you change
    6·1 answer
  • Why is charles babbage known as father of computer?​
    10·1 answer
  • To more easily incorporate methods into a program, it is common practice to store methods in their own classes and files. Then y
    6·1 answer
  • 1. Write a class for time objects that store three integer values for hour, minute, and second. Also, write a program to test th
    13·1 answer
  • What is the decrypted binary
    9·1 answer
  • You receive an email that appears to legitimately be from your Bank. The email indicates the need for verification of your infor
    15·2 answers
  • What year did polaroid introduce one-step photography with the SX-70
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!