Suppose one machine, A, executes a program with an average CPI of 1.9. Suppose another machine, B (with the same instruction set and an enhanced compiler), executes the same program with 20% less instructions and with a CPI of 1.1 at 800MHz. In order for the two machines to have the same performance, what does the clock rate of the first machine need to be

Answers

Answer 1

Answer:

the clock rate of the first machine need to be 1.7 GHz

Explanation:

Given:

CPI of A = 1.9

CPI of B = 1.1

machine, B executes the same program with 20% less instructions and with a CPI of 1.1 at 800MHz

To find:

In order for the two machines to have the same performance, what does the clock rate of the first machine need to be

Solution:

CPU execution time = Instruction Count * Cycles per Instruction/ clock rate

CPU execution time = (IC * CPI) / clock rate

(IC * CPI) (A) / clock rate(A) =  (IC * CPI)B / clock rate(B)

(IC * 1.9) (A) / clock rate(A) = (IC * (1.1 * (1.0 - 0.20)))(B) / 800 * 10⁶ (B)

Notice that 0.20 is basically from 20% less instructions

(IC * 1.9)  / clock rate = (IC * (1.1 * (1.0 - 0.20))) / 800 * 10⁶

(IC * 1.9)  / clock rate =  (IC*(1.1 * ( 0.8))/800 * 10⁶

(IC * 1.9)  / clock rate =  (IC * 0.88) / 800 * 10⁶

clock rate (A) =  (IC * 1.9) / (IC * 0.88) / 800 * 10⁶

clock rate (A) =  (IC * 1.9) (800 * 10⁶) /  (IC * 0.88)

clock rate (A) = 1.9(800)(1000000)  / 0.88

clock rate (A) =  (1.9)(800000000)  / 0.88

clock rate (A) = 1520000000  / 0.88

clock rate (A) = 1727272727.272727

clock rate (A) = 1.7 GHz


Related Questions

What is the maximum number of VLANs that can be configured on a switch supporting the 802.1Q protocol? Why?

Answers

Answer:

4096 VLANs

Explanation:

A VLAN (virtual LAN) is a group of devices on one or more LAN connected to each other without physical connections. VLANs help reduce collisions.

An 802.1Q Ethernet frame header has VLAN ID of 12 bit VLAN field. Hence the maximum number of possible VLAN ID is 4096 (2¹²).  This means that a switch supporting the 802.1Q protocol can have a maximum of 4096 VLANs

A lot of VLANs ID are supported by a switch. The maximum number of VLANs that can be configured on a switch supporting the 802.1Q protocol is 4,094 VLANS.

All the VLAN needs an ID that is given by the VID field as stated in the IEEE 802.1Q specification. The VID field is known to be of  12 bits giving a total of 4,096 combinations.

But that of 0x000 and 0xFFF are set apart. This therefore makes or leaves it as 4,094 possible VLANS limits. Under IEEE 802.1Q, the maximum number of VLANs that is found on an Ethernet network is 4,094.

Learn more about VLANs from

https://brainly.com/question/25867685

How has the rise of mobile development and devices impacted the IT industry, IT professionals, and software development

Answers

Answer:

Throughout the interpretation section elsewhere here, the explanation of the problem is summarized.

Explanation:

The growth of smartphone production and smartphone apps and services, as well as the production of smartphones, has had a positive influence on the IT industry, IT practitioners, as well as the development of the technology. As normal, the primary focus is on smartphone apps instead of just desktop software. As we recognize, with innovative features, phone applications, and smartphones are all made, built, modernized every day, and always incorporated with either the latest technology.This has now resulted in far more jobs and employment for the IT sector, and therefore new clients for service-based businesses. It provided various-skilling the application production industry for IT experts including learning how to work on emerging technology. The demand for software production and software growth is evolving at a greater speed than it's ever been, so the increase of smartphone production and smartphones has had a very beneficial effect on perhaps the IT sector, IT practitioners, and business development.

B1:B4 is a search table or a lookup value

Answers

Answer:

lookup value

Explanation:

In a system where Round Robin is used for CPU scheduling, the following is TRUE when a process cannot finish its computation during its current time quantum? The process will terminate itself. The process will be terminated by the operating system. The process's state will be changed from running to blocked. None of the mentioned.

Answers

Answer:

B. The process will be terminated by the operating system.

Explanation:

When Round Robin is used for CPU scheduling, a time scheduler which is a component of the operating system is used in regulating the operation. A time limit is set for each of the processes to be run.

So, when a process fails to complete running before its time elapses, the time scheduler would log it off and return it to the queue. This queue is in a circular form and gives each of the processes a chance to run its course.

Based on the information given regarding CPU scheduling, the correct option is C. The process's state will be changed from running to blocked.

It should be noted that in a system where Round Robin is used for CPU scheduling, when a process cannot finish its computation during its current time quantum, the process's state will be changed from running to blocked.

It should be noted that a prices transition to a blocked state occurs when it's waiting for some events like a particular resource becoming available.

Learn more about CPU scheduling on:

https://brainly.com/question/19999569

(1) Prompt the user to enter a string of their choosing. Output the string.
Ex: Enter a sentence or phrase: The only thing we have to fear is fear itself. You entered: The only thing we have to fear is fear itself.
(2) Complete the GetNumOfCharacters() function, which returns the number of characters in the user's string. Use a for loop in this function for practice. (2 pts)
(3) In main(), call the GetNumOfCharacters() function and then output the returned result. (1 pt) (4) Implement the OutputWithoutWhitespace() function. OutputWithoutWhitespace() outputs the string's characters except for whitespace (spaces, tabs). Note: A tab is '\t'. Call the OutputWithoutWhitespace() function in main(). (2 pts)
Ex: Enter a sentence or phrase: The only thing we have to fear is fear itself. You entered: The only thing we have to fear is fear itself. Number of characters: 46 String with no whitespace: The only thing we have to fear is fear itself.

Answers

Answer:

See solution below

See comments for explanations

Explanation:

import java.util.*;

class Main {

 public static void main(String[] args) {

   //PrompT the User to enter a String

   System.out.println("Enter a sentence or phrase: ");

   //Receiving the string entered with the Scanner Object

   Scanner input = new Scanner (System.in);

   String string_input = input.nextLine();

   //Print out string entered by user

   System.out.println("You entered: "+string_input);

   //Call the first method (GetNumOfCharacters)

   System.out.println("Number of characters: "+ GetNumOfCharacters(string_input));

   //Call the second method (OutputWithoutWhitespace)

   System.out.println("String with no whitespace: "+OutputWithoutWhitespace(string_input));

   }

 //Create the method GetNumOfCharacters

   public static int GetNumOfCharacters (String word) {

   //Variable to hold number of characters

   int noOfCharactersCount = 0;

   //Use a for loop to iterate the entire string

   for(int i = 0; i< word.length(); i++){

     //Increase th number of characters each time

     noOfCharactersCount++;

   }

   return noOfCharactersCount;

 }

 //Creating the OutputWithoutWhitespace() method

 //This method will remove all tabs and spaces from the original string

 public static String OutputWithoutWhitespace(String word){

   //Use the replaceAll all method of strings to replace all whitespaces

   String stringWithoutWhiteSpace = word.replaceAll(" ","");

   return stringWithoutWhiteSpace;

 }

}

How does asymmetric encryption work?
A.
It uses only one key to encrypt and decrypt a message.
B.
A private key is used to encrypt the message and the public key is used to decrypt the message.
C.
Either the public key or the private key can be used to encrypt and decrypt a message.
D.
Public key is used to encrypt the message and private key is used to decrypt the message.

Answers

Answer:

i choose choice D

Explanation:

reason as to my answer public keys are simply input keys used to encrypt data into either a computer or any electrical device as private keys are out put used to either erase or edit

What is his resolution amount

Answers

I think it’s 92 I mean yh

A country, called Simpleland, has a language with a small vocabulary of just “the”, “on”, “and”, “go”, “round”, “bus”, and “wheels”. For a word count vector with indices ordered as the words appear above, what is the word count vector for a document that simply says “the wheels on the bus go round and round.”

Please enter the vector of counts as follows: If the counts were ["the"=1, “on”=3, "and"=2, "go"=1, "round"=2, "bus"=1, "wheels"=1], enter 1321211.
1 point

Answers

Answer:

umm that is a todler song

Explanation:

umm that is a todler song that they sing to them when there crying

A country, called Simpleland, has a language with a small vocabulary of just “the”, “on”, “and”, “go”, “round”, “bus”, and “wheels”. As per the given scenario, the vector of counts will be 2111211. The correct option is C.

What are the ways to count items in a vector?

C++ has a built-in function that counts the length of the vector. Size is the function's name ().

It returns the size or total number of elements of the vector that was utilized to create it. There is no need for debate.

The number of observations (rows) includes deleted observations as well. In an SAS data collection, there can be a maximum of 2 63-1 observations, or roughly 9.2 quintillion observations. For the majority of users, going above that limit is quite rare.

The vector of counts in the above scenario will be 2111211.

Thus, the correct option is C.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ2

Write a program that reads in 10 numbers from the user and stores them in a 1D array of size 10. Then, write BubbleSort to sort that array – continuously pushing the largest elements to the right side

Answers

Answer:

The solution is provided in the explanation section.

Detailed explanation is provided using comments within the code

Explanation:

import java.util.*;

public class Main {

//The Bubble sort method

public static void bb_Sort(int[] arr) {  

   int n = 10; //Length of array  

   int temp = 0; // create a temporal variable  

   for(int i=0; i < n; i++){  

         for(int j=1; j < (n-i); j++){  

           if(arr[j-1] > arr[j]){  

               // The bubble sort algorithm swaps elements  

               temp = arr[j-1];  

               arr[j-1] = arr[j];  

               arr[j] = temp;  

             }  

         }            

         }  

        }

 public static void main(String[] args) {

   //declaring the array of integers

   int [] array = new int[10];

   //Prompt user to add elements into the array

   Scanner in = new Scanner(System.in);

   //Use for loop to receive all 10 elements

   for(int i = 0; i<array.length; i++){

     System.out.println("Enter the next array Element");

     array[i] = in.nextInt();

   }

   //Print the array elements before bubble sort

   System.out.println("The Array before bubble sort");

   System.out.println(Arrays.toString(array));

   //Call bubble sort method

   bb_Sort(array);  

               

   System.out.println("Array After Bubble Sort");  

   System.out.println(Arrays.toString(array));

 }

}

the language is Java! please help

Answers

public class Drive {

   int miles;

   int gas;

   String carType;

   public String getGas(){

       return Integer.toBinaryString(gas);

   }

   public Drive(String driveCarType){

       carType = driveCarType;

   }

   public static void main(String [] args){

       System.out.println("Hello World!");

   }

   

}

I'm pretty new to Java myself, but I think this is what you wanted. I hope this helps!

A have a string, called "joshs_diary", that is huge (there was a lot of drama in middle school). But I don't want every one to know that this string is my diary. However, I also don't want to make copies of it (because my computer doesn't have enough memory). Which of the following lines will let me access this string via a new name, but without making any copies?

a. std::string book = joshs_diary;
b. std::string & book = joshs_diary; const
c. std::string * book = &joshs_diary;
d. std::string book(joshs_diary);
e. const std::string & book = joshs_diary;
f. const std::string * const book = &joshs_diary;
g. std::string * book = &joshs_diary;

Answers

Answer:

C and G

Explanation:

In C language, the asterisks, ' * ', and the ampersand, ' & ', are used to create pointers and references to pointers respectively. The asterisks are used with unique identifiers to declare a pointer to a variable location in memory, while the ampersand is always placed before a variable name as an r_value to the pointer declared.


A____server translates back and forth between domain names and IP addresses.
O wWeb
O email
O mesh
O DNS

Answers

Answer:

DNS

Explanation:

Hope this helps

DNS I thin hope that helps

What are two examples of items in Outlook?

a task and a calendar entry
an e-mail message and an e-mail address
an e-mail address and a button
a button and a tool bar

Answers

Answer:

a task and a calendar entry

Explanation:

ITS RIGHT

Answer:

its A) a task and a calendar entry

Explanation:

correct on e2020

Other Questions
Why did most people support the changes proposed by the National Assembly in France? Why should we be concerned about the disappearance of phytoplankton in the oceans What is one way to add oxygen to the atmosphere? Solving each proportions 10/8=n/10 what paragraph is within the arena of personal capabilities or company rules, and the ability to solve problems without the usual or obvious tools is a great strength. in? Given that 1 pound equals 16 ounces, how many pounds are in 116 ounce -) A) 6.75 pounds B) 7.25 pounds 7.5 pounds D) 7.75 pounds THIS IS IN FRENCH ONLY ANSWER IT IF U ARE FLUENT IN FRENCHChoose the correct spelling. Take out the wrong one, leave only the right spelling.1)Ma mere / mre / mre est partie en voyage (my mum has gone on holidays).2)Llphant / lphant /lphant vit en Afrique (the elephant lives in Africa).3)Je suis entirement / entirement / entirement daccord avec toi! (I totally agree with you).4)Il a eu une trrible / trrible / terrible peur! (He got very scared).5) la fin du match, il y avait galit / galit / galit. (At the end of the match, they drew).6)Ce procs / procs / procs a fait la une des journaux. (This trial was on every newspapers front page).7)Son texte contient beaucoup de rptitions / rptitions / rptitions. (Her text contains a lot of repetitions).8)Le mystre / mystre / mystre reste en entier. (It still is a mystery). Read the sentence carefully and choose the option that answers the question.Los voluntarios de la comunidad tiran o reciclan la basura para m.Which pronoun would you use to replace the indirect object in the sentence above?Remember: The indirect object pronoun answers the question "to whom or for whom" in the sentence. Le Las Les Me An airplane maintaining a constant airspeed takes as long to travel 925 mi with wind as it does to travel 775 mi against the wind. If the wind is blowing at 15 mph, what is the rate of the plane in still air Simplify the expression.x+3+5x A large hamburger (e.g., Whopper) sandwich contains 628 kcal and 36 grams of fat. Approximately what percentage of the total energy is contributed by fat? [tex]8x^2 +y^2=10[/tex]find dy/dx Wetlands are natural parts of watershed systems. Wetlands provide benefits many benefits. Which of these is a way that wetlands directly benefit humans?- provide nesting grounds for birds- decrease erosion along shorelines- reduce flooding in adjacent towns- increase biodiversity near the ocean round 99,830to the nearest thousands Victor runs 3 laps around the track every 5 minutes. How many laps does Victor run in 1 minute? Describe in 2-4 sentences how you would select a function. Why did Paul travel as a missionary? Read the excerpt from an adaptation of "To Build aFire."What is the central idea of the excerpt?The man is unobservant and fails to notice hissurroundings.The man is new to the area and does not knowanyone there.The man is practical, but he does not think carefullyabout his situation.The man knows how to dress for the weather, buthe forgot some supplies.But all this - the mysterious, far-reaching hair-line trail,the absence of sun from the sky, the tremendous cold,and the strangeness and weirdness of it all-made noimpression on the man. It was not because he wasused to it. He was a newcomer in the land, achechaquo, and this was his first winter. The troublewith him was that he was without imagination. He wasquick and alert in the things of life, but only in thethings, and not in the significances. He knew it wascold and uncomfortable, but the cold did not lead himto meditate upon his own frailty, or immortality, orman's place in the universe. Fifty degrees below zerostood for a bite of frost that hurt and that must beguarded against with mittens, ear-flaps, warmmoccasins, and thick socks. That there should beanything more to it than that was a thought that never entered his head. A. The man is unobservant and fails to notice his surroundings. B. The man is new to the area and does not know anyone there. C. The man is practical, but he does not think carefully about his situation. D. The man knows how to dress for the weather, but he forgot some supplies. GIVING BRAINLIEST PLS HELP 35 POINTSS Using these clues, make a quadilateral. Write the name and each side. What is the perimeter?1. rectangle with sides 7 feet2. 7feet3. 10 feet4. 10feet Name the slope of a line parallel to y = -3x -2