1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Airida [17]
3 years ago
13

Designers are comparing performance between a multi-core processor equipped with 16 in-order cores and a dual-core superscalar p

rocessor. The dual-core superscalar processor has two identical Out- of-Order cores. Each core is a 4-issue superscalar. The multi-core processor has 16 in-order processor cores. Each in-order core of the multi-core processor can achieve about one third the performance of the OoO superscalar core. A benchmark program K includes both sequential codes that can only be executed on one CPU core and parallel codes that can be distributed to multiple CPU cores. For program K, execution of the sequential codes takes 30% of the total execution time.
Required:
Which processor would deliver faster performance for benchmark program K and show your calculations?
Computers and Technology
1 answer:
Nataly [62]3 years ago
5 0

Explanation:

it will be k because it process faster an it comsume less elecricity

You might be interested in
A=1/2h(a+b) solve for h
devlian [24]

A=1/2h(a+b)

1/2 can be said as 0.5

so

A=0.5h(a+b)

0.5h is being multiplied with (a+b), taking this expression of left hand side gives

A/0.5(a+b)=h

OR

h=A/0.5(a+b)

This is the final answer

8 0
3 years ago
Marco had a database that showed the first, second, and third favorite ice cream flavors for each person in his school. He used
Maksim231197 [3]

Answer:

B

turned data into information

7 0
3 years ago
Read 2 more answers
A document repository is down when you attempt to access it. which isa principle is being violated?
Tju [1.3M]
When a document repository is down when you attempt to access it, the ISA principle Authentication is being violated. The authentication method is done during the log on phase and is performed by the ISA server which requests certificate. <span>The client then needs to send the appropriate client certificate to the server in order to be authenticated and to have access to the document.</span>
3 0
3 years ago
1. Who was able to complete the puzzle the fastest in Trial 1?
KATRIN_1 [288]

Answer:

You...answered all of the questions.

Explanation:

All of them have a response!

8 0
3 years ago
Name the two types of control systems.<br> PLEASE HELP THIS WAS DUE HOURS AGOOOO
vodomira [7]

Answer:

Open loop control systems.

Closed loop control systems.

Explanation:

5 0
4 years ago
Read 2 more answers
Other questions:
  • A job application is a form used to make a job request.<br> True<br> False
    8·2 answers
  • What is one method that can be used to open the Microsoft Word application?
    8·1 answer
  • What expressions will initialize d with a random value such that all possible values for d are given by the inequality 1.5 ≤ d &
    8·1 answer
  • Gemima wants to order the different kinds of food alphabetically on the table. Which actions should she take? Check all that app
    8·2 answers
  • The add_prices function returns the total price of all of the groceries in the dictionary. Fill in the blanks to complete this f
    15·1 answer
  • What is the<br> binary code<br> for<br> "DMS"?
    8·1 answer
  • What makes a source credible?
    9·2 answers
  • Find out about the different technological solutions available for interconnecting LANs to from larger networks such as wide are
    5·1 answer
  • Below functions flatten the nested list of integers (List[List[int]]) into a single list and remove duplicates by leaving only t
    15·1 answer
  • for a given array of integers perform operations on the array return the resulting array after all operations have been applied
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!