1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anzhelika [568]
3 years ago
9

If reading or writing a cache line of size 64 bytes to Flash requires 2.56 μJ and DRAM requires 0.5 nJ, and if idle power consum

ption for DRAM is 1.6 W (for 8 GB), how long should a system be idle to benefit from hibernating? Assume a main memory of size 8 GB.
Computers and Technology
1 answer:
kumpel [21]3 years ago
8 0

Answer:

Total DRAM memory = 1.6 * 8 * 10^9 Bytes J/seconds = 12.8*10^9 J/s ---1

Total energy required to read or write cache-line to Flash and DRAM = 2*64*( 2.56 *10^-6+0.5 *10^-9) J = 3.277*10^-4 J---2

The time a system will be idle is 2/1 = 2.56*10^-14 seconds

Explanation:

Here, the 2 and 1 in the last step corresponds to the answers from equation equation 1 and equation 2.

You might be interested in
(--BRAINLIEST--)<br>Explain the types of secondary memory on the basis of data access.​
Nina [5.8K]

There are two types of secondary memories.

  1. RAM
  2. ROM

RAM:

  • RAM stands for random access memory .
  • It is expandable.
  • we can do multiple things in it.
  • Its erasable.

ROM

  • ROM stands for read only memory.
  • It is permanent .
  • We can only read in it.
  • Its permanent hence not removable.
8 0
3 years ago
Read 2 more answers
You receive an email from someone who claims to be a representative from your credit card company. the email asks you to clink o
larisa86 [58]
You should call the company that your credit card is in and ask if you were sent an email. tell the time it was sent. the date. everything.
8 0
3 years ago
A domestic air carrier airplane lands at an intermediate airport at 1815Z. The latest time it may depart without a specific auth
serious [3.7K]

Answer:

A domestic air carrier airplane lands at an intermediate airport at 1815Z. The latest time it may depart without a specific authorization from an aircraft dispatcher is <u>1915Z (1 hour)</u>.

Explanation:

Under the domestic operations, an airplane landed on intermediate airport can remain their for not more than one hour so the time would me 1 hour.

Here the time represented by 1815Z and 1915Z is in Zulu Time Zone as depicted from letter "Z". The first two digits represent the hour (0-24) and the next two represent the minutes (0-59).

  • Here the landing time is 6:15 pm while departing time is after one hour that is 7:15 pm (1915Z).

i hope it will help you.

6 0
3 years ago
Two numbers are given (numbers are entered from the keyboard). If both numbers are positive, then output their sum, if both numb
AleksAgata [21]

Answer:

The program in Python is as follows:

num1 = int(input())

num2 = int(input())

if num1 >=0 and num2 >= 0:

   print(num1+num2)

elif num1 <0 and num2 < 0:

   print(num1*num2)

else:

   if num1>=0:

       print(num1**2)

   else:

       print(num2**2)

Explanation:

This gets input for both numbers

num1 = int(input())

num2 = int(input())

If both are positive, the sum is calculated and printed

<em>if num1 >=0 and num2 >= 0:</em>

<em>    print(num1+num2)</em>

If both are negative, the products is calculated and printed

<em>elif num1 <0 and num2 < 0:</em>

<em>    print(num1*num2)</em>

If only one of them is positive

else:

Calculate and print the square of num1 if positive

<em>    if num1>=0:</em>

<em>        print(num1**2)</em>

Calculate and print the square of num2 if positive

<em>    else:</em>

<em>        print(num2**2)</em>

3 0
3 years ago
PLEASE HELP :(
belka [17]

Taking data and instructions from a user, processing the data as per instructions, and displaying or storing the processed data, are the four major functions of a computer. These functions are also known as the input function, process function, output function, and storage function, respectively.

5 0
3 years ago
Other questions:
  • What are advantages and disadvantages of developing a more robust Internet of Things and continuing to add more smart nodes?
    10·1 answer
  • Anyone free to inbox me plz....​
    6·2 answers
  • Which of the following is not considered format?
    8·2 answers
  • Explain how Steve Jobs created and introduced the iPhone and iPad.
    9·1 answer
  • Anyone wanna join zoo m???????​
    10·2 answers
  • Well the last week has been kind of terrible...
    9·2 answers
  • Please describe the role of games in modern society!
    5·2 answers
  • You are using a device that reads the physical addresses contained in incoming data that travels along network cables. Based on
    12·1 answer
  • _________ is the method used by password crackers who work with pre-calculated hashes of all passwords possible within a certain
    6·1 answer
  • with a ____ the traffic of a given enterprise or group passes transparently through an internet in a way that effectively segreg
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!