1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lesechka [4]
3 years ago
5

Consider the two computers A and B with the clock cycle times 100 ps and 150 ps respectively for some program. The number of cyc

les per instruction (CPI) for A and B are 2.0 and 1.0 respectively for the same program. Which computer is faster and how much? a) A is 1.33 times faster than B b) Bis 1.22 times faster than A c) A is 1.23 times faster than B d) B is 1.33 times faster than A
Computers and Technology
2 answers:
Kipish [7]3 years ago
7 0

Answer:

Option d) B is 1.33 times faster than A

Given:

Clock time, t_{A} = 100 ps

t_{A} = 150 ps

No. of cycles per instructions,  n_{A} = 2.0

n_{B} = 1.0

Solution:

Let I be the no. of instructions for the program.

CPU clock cycle, f_{A} = 2.0 I

CPU clock cycle, f_{B} = 1.0 I

Now,

CPU time for each can be calculated as:

CPU time, T = CPU clock cycle\times clock time

T_{A} = f_{A}\times t_{A} = 2.0 I\times 100 = 200 I ps

T_{B} = f_{B}\times t_{B} = 1.0 I\times 100 = 150 I ps

Thus B is faster than A

Now,

\frac{Performance of A}{Performance of B} = \frac{T_{A}}{T_{B}}

\frac{Performance of A}{Performance of B} = \frac{200}{150}

Performance of B is 1.33 times that of A

Afina-wow [57]3 years ago
3 0

Clock cycle times of Computer A  =100ps

Number of cycle per instruction (CPI) = 2

Time Required Per instruction = Clock times * CPI =100 * 2 = 200 ps

clock cycle times of Computer B =150ps

Number of cycle per instruction(CPI) = 1

Time Required Per instruction = Clock times * CPI 150 * 1 = 150 ps

Computer B requires less time than Computer A per instruction

So, Computer B is Faster

Computer B is Faster 200 - 150 = 50ps Faster Per instruction

You might be interested in
8.4 Lesson Practice <br> edhesive quiz
kow [346]

Answer:

1. 5

2. Because they let us quickly process the contents of an array, which have many values.

Explanation:

8 0
3 years ago
On the server side, the database environment must be properly configured to respond to clients' requests in the fastest way poss
Paraphin [41]

Answer:

<em>DBMS Performance </em>

Explanation:

Database tuning <em>defines a range of activities that are used to maximize and homogenize a database's output.</em>

This typically coincides with query tuning, but applies to database file layout, DBMS software selection, and database environment setup (operating system, CPU).

Database tuning helps to optimize the use of machine resources in order to carry out work as efficiently and quickly as possible.

Many systems are built to handle their use of system resources, but there is still plenty of space for enhancing their performance by tailoring their server and DBMS settings and configuration.

5 0
3 years ago
________ is the relative value, either in monetary terms or in overall impact, of the resource being protected by the access con
kherson [118]

Answer:

a. Asset value

Explanation:

Asset value is the value of a share in the company.

The asset value is calculated as

= [ Difference between the total of its assets and its liabilities ] ÷ [ The number of ordinary shares issued ]

The asset value may also be the equal as the book value or the it may be same as equity value of a business.

3 0
3 years ago
A security technician is configuring a new firewall appliance for a production environment. The firewall must support secure web
Zielflug [23.3K]

Answer:

Explanation:

Based on the information provided in the question, the best rules that the technician should add to the firewall would be the following

Permit 10.10.10.0/24 0.0.0.0 -p tcp --dport 443

Permit 10.10.10.0/24 192.168.1.15/24 -p udp --dport 53

This is because port 443 is used for "Secure webs services" while UDP port 53 is used for queries and domain name resolution. Both of which are the main configurations that the security technician needs to obtain.

8 0
3 years ago
A compound Boolean expression created with the _________ operator is true if either of its subexpressions is true.
lbvjy [14]
The answer for the question is butt
3 0
3 years ago
Other questions:
  • What are some consequences of internet addiction​
    9·1 answer
  • How assemblers and linkers work together?
    13·1 answer
  • What are some good job skills?
    12·1 answer
  • When you use a script to create all of the tables for a database, you must start with the tables that don't have _______________
    15·1 answer
  • Your traffic light changes to yellow as you approach an intersection. In most cases, what action should you take?
    15·2 answers
  • c++ You are given an array A representing heights of students. All the students are asked to stand in rows. The students arrive
    5·1 answer
  • What is the most common concern with using variable frequency drives?
    6·1 answer
  • What might happen if the internet use policies were broken at your school
    11·2 answers
  • Describe an energy problem a city in 2050 will face
    6·1 answer
  • Jason Chang is creating photos of his restaurant for a new website. Some of the photos of the staff have red eye, others are bad
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!