1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
QveST [7]
3 years ago
14

Assume an algorithm takes 5.6 seconds to execute on a single 1.9 GHz processor. 20% of the algorithm is sequential. Assume that

there is zero latency and that the remaining code exhibits perfect parallelism. How long (in seconds) should the algorithm take to execute on a parallel machine made of 3 1.9 GHz processors?
Computers and Technology
1 answer:
SVETLANKA909090 [29]3 years ago
5 0

Answer:

2.6 seconds

Explanation:

We first start by calculating the speed up

The formula is given as:

n/1+(n-1)F

We have n = 3 which is the number of processors

F = 20% = percentage of algorithm

When we put values into the formula

3/1+(3-1)0.20

= 3/1+2*0.20

= 3/1+0.4

= 3/1.4

Speed up = 2.14

From here we calculate the expected time

T/speedups

= 5.6/2.14

= 2.6

Therefore the expected time is 2.6 seconds

You might be interested in
Custodial workers that access the terminal area must have a fingerprint background check done and training unless they are escor
tensa zangetsu [6.8K]

Answer:

True they do. mark brainliest.!!!!! please

Explanation:

6 0
2 years ago
One way to protect against a security threat to a computer system is to __________. Avoid external links with inconsistent URLs
Makovka662 [10]

One way to protect against a security threat to a computer system is to Avoid external links with inconsistent URLs.

<h3>What is malware?</h3>

Malware is any programme that is purposely designed to disrupt a computer, server, client, or computer network, leak private information, obtain unauthorised access to information or systems, deny users access to information, or otherwise interfere with the user's computer security and privacy.

One way to protect against a security threat to a computer system is to Avoid external links with inconsistent URLs. The reason for this is that such links may contain malware or spyware.

Learn more about Malware:

brainly.com/question/14276107

#SPJ1

7 0
2 years ago
Absolute time would be most similar to :
Luda [366]
The absolute time would be most similar to a fact. It was theorised and in fact, approved by scientists as a scientific law which governs, according to Wikipedia, as a "<span>true and mathematical </span>time<span>, of itself, and from its own nature flows equably without regard to anything external, and by another name is called duration: relative, apparent and common </span><span>time."</span>
3 0
4 years ago
What is the name of the User-defined function that is mentioned in the code?
Marizza181 [45]

The name of the user defined function is: footballMatch

6 0
3 years ago
1. If you have the following device like a laptop, PC and mobile phone. Choose one device
ella [17]

Answer:

For this i will use my own PC.

OS - Windows 10

Storage Capacity - 512 GBs

Memory - 16 GB

Wi-Fi - Ethernet

Installed Application - FireFox

Explanation:

An OS is the interface your computer uses.

Storage capacity is the space of your hard drive.

Memory is how much RAM (Random Access Memory) you have

Wi-Fi connectivity is for how your computer connects the the internet.

An installed application is any installed application on your computer.

3 0
3 years ago
Other questions:
  • Which category of app does word processing software fall into? A. Productivity B. Entertainment C. Social networking D. Educatio
    14·2 answers
  • 7. What is the school campus’s setting<br> the school is sanford
    6·2 answers
  • What attack cracks a password or encryption key by trying all possible valid combinations from a defined set of possibilities (a
    12·1 answer
  • What is the term used to describe data sets are so large and complex that they become difficult to process using traditional dat
    12·1 answer
  • How can I change it to accepted file types: .ppt, .pptx, .xls, .xlsx, .doc, .docx, .zip, .pdf, .accdb, .msg on Inkscape?
    15·2 answers
  • You recently started working part-time in a retail store, and are learning about the reading devices your store uses. Your store
    10·1 answer
  • On which of the following pointing devices can you control the pointer by sliding your fingertip?
    11·1 answer
  • The breastbone or ________________ extends down the chest.
    5·1 answer
  • Write two cin statements to get input values into birthMonth and birthYear. Then write a statement to output the month, a dash,
    7·1 answer
  • In batch operating system three job J1 J2 and J3 are submitted for execution each job involes an I/O activity a CPU time and ano
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!