1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Shalnov [3]
3 years ago
14

You are evaluating three branch prediction strategies: (1) predict always taken, (2) predict always not taken and (3) use the 2-

bit branch predictor. Experimentally, your measurements show that conditional branches account for 20% of all instructions and 70% of all branches are taken. The 2-bit predictor has an accuracy of 70%. Assuming that the penalty of a mis-prediction is 4 cycles and 0 cycles for a correct prediction, compute the average stall cycles per instruction of the three strategies.
Computers and Technology
1 answer:
Shkiper50 [21]3 years ago
6 0

Solution :

The penalty of the misprediction = 4 cycles

The conditional branches of instructions = 20%

The Branch taken is  = 70%

2-bit predictor accuracy is = 70%

1). The predict always taken

   The stall only for the conditional instruction for which branch is not taken.

    Stalls = $0.2 \times (1-0.7) \times 4$

             $= 0.2 \times 0.3 \times 4$

             = 0.24 cycles

2). The predict not always taken

   The stall only for the conditional instruction for which branch is taken.

    Stalls  $= 0.2 \times 0.7 \times 4$

             = 0.56 cycles

3). The 2- bit predictor

   The stalls $= 0.2 \times (0.7 \times 0.3\times 4+0.3 \times 0.3\times 4)$

                    = 0.2 x 1.2

                    = 0.24 cycles

You might be interested in
which two host names follow the guidelines for naming conventions on cisco ios devices? (choose two.)
vlabodo [156]

RM-3-Switch-2A4* and SwBranch799* are the two host names follow the guidelines for naming conventions on cisco ios devices. The correct options are 2 and 3.

<h3>What is a host name?</h3>

A hostname is a label assigned to a computer network connected device that is used to identify the device in various forms of electronic communication, such as the World Wide Web.

Hostnames can be simple single-word or phrase names, or they can be structured.

The two host names, RM-3-Switch-2A4 and SwBranch799, adhere to the guidelines for naming conventions on Cisco iOS devices.

Thus, the correct options are 2 and 3.

For more details regarding host name, visit:

brainly.com/question/13267319

#SPJ1

Your question seems incomplete, the missing part is attached below:

7 0
2 years ago
Question very important cause after my school is over at 5 'oclock I will be playing rocket league if anyone wants to play just
jarptica [38.1K]

Answer:

So can u tell me wut is ur question...It is not understandable

6 0
3 years ago
Which of the following examines the organizational resource of information and regulates its definitions, uses, value, and distr
hichkok12 [17]

Answer:C)Information management

Explanation: Information management is the technique through which the organization and handling of the the data/ information takes place.This technique is made for helping the organization and their business for the supporting the function and processes.

The facilities provided by the information management system is  development, management, designing, innovation etc.

Other options are incorrect because they are used for the coding process,technology and governing of the data, hence no management activity is done by them.Thus, the correct option is option(C).

4 0
4 years ago
What is systems integration?
valina [46]

Explanation:

In engineering, system integration is process of bringing various component subsystems together into one single system and also ensuring that these subsystems function as one system together.

In information technology, it is process of linking together various computing systems and various software applications functionally or physically, to act as coordinated whole.

System integrator integrates various discrete systems utilizing variety of techniques.

7 0
4 years ago
What would happen if computers only had input peripherals and a CPU
Wewaii [24]
It will overheat because it don't have gpu
8 0
3 years ago
Read 2 more answers
Other questions:
  • When computers connect to one another to share information, but are not dependent on each other to work, they are connected thro
    7·1 answer
  • What does Tristan need to do to add a row at the
    14·1 answer
  • Additional rows and columns are inserted into a table by using the _____ tab
    7·2 answers
  • Give the 16-bit 2's complement form of the following 8-bit 2's complement numbers: (a) OX94 (b) OXFF (c) OX23 (d) OXBCWhich of t
    7·1 answer
  • What kind of sampling does a quasi experiment use?
    11·1 answer
  • Consider the following code: x = 9 y = -2 z = 2 print (x + y * z) What is output? 9 13 14 5
    5·1 answer
  • Algorithms can be created in all the following ways EXCEPT:
    10·1 answer
  • PROGRAM LANGUAGE C
    5·1 answer
  • How do you think the blitz might have affected civilian morale in london
    15·1 answer
  • a company recently implemented a secure sockets layer/transport layer security (ssl/tls) version that supports secure hashing al
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!