1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nesterboy [21]
3 years ago
12

You upgrade a graphics workstation with a HyperThreading-enabled CPU core. You expect the programs on the desktop to run much fa

ster with the new technology, but you get little improvement. Why is this?
Computers and Technology
1 answer:
Citrus2011 [14]3 years ago
6 0

Answer:

The correct answer is the program on the desktop are not multithreaded software.

Explanation:

According to the given scenario, the multithread software is a software that contains more than one instructions set. In this it provides various excuetion threads that is compatible by the operating system

As it is mentioned in the question that you expect that the desktop could run faster as there is a new technology but there is a very little improvement this is because of the program that does not contain the multithreaded software

Hence, The correct answer is the program on the desktop are not multithreaded software.

You might be interested in
Open punctuation means that no punctuation follows the salutation or complimentary close. *
zloy xaker [14]

Answer:

True

Explanation:

When open punctuation is used, we do not expect the use of punctuation after salutation or complimentary close. It is a relatively new concept in business writing and we can rightly use this method in modified block letter style of writing.  

Some companies have developed business letter templates that are arranged in an open style, which permits the use of open punctuation in all aspect of business writings.  

7 0
3 years ago
An ISA specifies a word size of 8 bytes, byte addressability, and an address space of 256 K; it uses single-word instructions (i
VladimirAG [237]

Answer:

2 bytes

Explanation:

Size of the MAR ( memory address register )  = 18 bits = 2 bytes

Given that

address space = 256 K  = 2^8

number of address location= 2^8  * 2^10       ( where 1K = 2^10 )  

                                              = 2^18

Given the number of address location = 2^18 ;

Hence  18 bits are required to store the address of the instruction

6 0
3 years ago
6. assume there are three small caches, each consisting of four one-word blocks. one cache is fully associative, a second is two
sveticcg [70]

Answer:

Question: Assume there are three small caches, each consisting of four one word blocks. One cache is direct-mapped, a second is two-way set-associative, and the third is fully associative

Explanation:

Question: Assume there are three small caches, each consisting of four one word blocks. One cache is direct-mapped, a second is two-way set-associative, and the third is fully associative

6 0
2 years ago
On tablets and smartphones, what feature can be used that can erase the contents of the device if lost or stolen?
jok3333 [9.3K]
It all depends on the brand of phone to do it yourself but, you can call your cell company and they can do it for you through your account.
3 0
3 years ago
Blank is a type of drag and drop code to help beginner
lana [24]

Answer:

Scratch

Explanation:

7 0
3 years ago
Other questions:
  • Windows Hello supports multiple biometric authentication methods, including facial recognition. What is the failsafe method to a
    6·1 answer
  • Write the following function without using the C++ string class or any functions in the standard library, including strlen(). Yo
    8·1 answer
  • Give 5 uses of software and hardware.
    15·1 answer
  • Summary In this lab, you declare and initialize variables in a C++ program. The program, which is saved in a file named NewAge.c
    5·1 answer
  • What is similar software engineering, Hardware engineer, Network Architect, and Web developer?
    11·1 answer
  • What is a systems development life cycle?
    5·1 answer
  • A _____ attack is designed to generate a lot of activity on a network by flooding it with useless trafficenough traffic to overw
    14·2 answers
  • The greatest predictor of home Internet use is _____. income location race training
    5·2 answers
  • 2. Assuming that the bits in an integer are numbered from 0, from right (least significant) to left (most significant), write an
    15·1 answer
  • Mathematics and computer science share many concepts.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!