1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GuDViN [60]
2 years ago
7

In its simplest form, amdahl's law maintains that if a given program would take one hour to run to completion with one processor

, but 80 percent of the program had to run sequentially (and therefore could not be sped up by applying additional processors to it), then a resulting parallel program would run only a maximum of ____ percent faster.
Business
1 answer:
AlladinOne [14]2 years ago
4 0
<span>20% is the maximum speed up possible for this program. For this problem, let's assign the time of 1 for the task when using a single processor. Now let's assume that we have an infinite number of processors available to handle the portion of the program that can be executed in parallel so that the execution time for that portion will be 0. That means that the total execution time with an infinite number of processors will be 1 * (0.80 + 0) = 1 * 0.80 = 0.80 So at best, the parallel program will take 80% of the time for the single threaded version. So the speed increase will be (1 - 0.80) / 1 = 0.20/1 = 0.20 = 20%</span>
You might be interested in
Classify each of the following as a(n) Operating Activity, Investing Activity, or Financing Activity. 1. Issuance of bonds. sele
azamat

Answer:

1. Issuance of bonds

Cash-flow classification: Financing activity

2. Sale of equipment

Cash-flow classification: Investing activity

3. Amortization expense

Cash-flow classification: Operating activity

4. Purchase of treasury stock

Cash-flow classification: Financing activity

5. Receipt of dividends on investment

Cash-flow classification: Operating activity

6. Purchase of land

Cash-flow classification: Investing activity

6 0
2 years ago
Step 1: Review the case study below. Dewey, Cheatham, and Howe are partners in a law firm operated as a general partnership. Dew
3241004551 [841]

Answer:

do your own work serously

Explanation:

3 0
3 years ago
Bill Builder entered into a contract with Carl's Carpets to supply him with the carpeting he needed to complete the renovation o
pshichka [43]

Answer:

consequential damages

Explanation:

According to my research on different types of law suits, I can say that based on the information provided within the question Bill can recover the 900 he lost from Carl as consequential damages. These are damages have happened because of one party's failure to meet a certain deadline or contractual obligation and can be proven in court. Therefore since Bill can prove that he lost the 900 because of Carl's negligence he will most likely win that case.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

5 0
2 years ago
The overall responsibility of health information management professional is
Vadim26 [7]
<span>Ensuring the quality and accuracy of health information. Hope this helps!

</span>
8 0
3 years ago
What class of security risk represents an opportunity for hackers when they find an identified weakness in which necessary contr
kifflom [539]

A Security Vulnerability is a weakness, flaw, or error found within a security system that has the potential to be leveraged by a threat agent in order to compromise a secure network.

Vulnerability refers to "the great or country of being exposed to the opportunity of being attacked or harmed, either bodily or emotionally." A window of vulnerability (WOV) is a time frame inside which protection measures are faded, compromised, or missing. The expertise of social and environmental vulnerability, as a methodological technique, entails the analysis of the risks and assets of disadvantaged companies, which include the aged. The method of vulnerability in itself brings first-rate expectations of social coverage and gerontological planning. Varieties of vulnerability include social, cognitive, environmental, emotional or navy. When it comes to dangers and failures, vulnerability is an idea that links the relationship that people have with their environment to social forces and establishments and the cultural values that maintain and contest them.

Learn more about Vulnerability here

brainly.com/question/25633298

#SPJ4

7 0
1 year ago
Other questions:
  • Panamint Systems Corporation is estimating activity costs associated with producing disk drives, tapes drives, and wire drives.
    8·1 answer
  • The "Got Milk" campaign was intended to boost sagging milk consumption among Californians in the 1990s. The campaign ads highlig
    10·1 answer
  • Behaviors that are more common in your life make better reinforcers than behaviors that are less common. this is known as _____.
    7·1 answer
  • Demands by customers for companies to become more ethically and environmentally focused have placed added pressures on firms to
    8·1 answer
  • Eastport Inc. was organized on June 5, Year 1. It was authorized to issue 440,000 shares of $10 par common stock and 60,000 shar
    5·1 answer
  • Suppose that Karen deposits $500 into her checking account at the bank. The reserve requirement for Karen's bank is 12%. Assume
    6·1 answer
  • Assume that Congress recently passed a provision that will enable Barton's Rare Books (BRB) to double its depreciation expense f
    6·1 answer
  • Managers use job design when they suspect that the type of work employees are performing, or the characteristics of the work env
    11·1 answer
  • Conservative Bank offers loans at various interest rates, depending on the nature of the loan. Jake wants to borrow $200,000 for
    10·1 answer
  • In cash flow estimation, the existence of externalities should be taken into account if those externalities have any effects on
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!