The following table shows the memory hierarchy for a 2 GHz processor with the following information: Memory Unit Name Access Speed L1 Cache 1 cycle L2 Cache 20 cycles Main Memory 200 cycles Part 1: What is AMAT on this machine (write your answer in terms of ns)? AMAT = ns Effective CPI = Cache Miss Rate 5% 2% None Part 2: Suppose a benchmark program consists of 20% of load and store instructions, what is the Effective CPI when you consider memory stall cycles? Suppose Base CPI = 1.
Q: Make brief notes about the following: 1. Thrashing 2. Monitor 3.The POSIX threads.
A: Thrashing:- Thrashing in computing is an issue caused when virtual memory is in use. It occurs when…
Q: Write down the values of Carry, Overflow, Zero, Sign, Auxiliary Carry, Parity flag after each…
A: When a particular Flag is set?? Carry Flag : It is set when the result is more than n bits Overflow…
Q: Which is an advantage of symmetric key encryption? Strength Speed Error correction Key management…
A: As I have read the guidelines I can provide answers to only 3 parts of the questions in case of…
Q: The reason why you subscribed the internet plan (the download and upload speed) and from which ISP.
A: The reasons to subscribe the internet plans with respect to download and upload speed and how is ISP…
Q: 2. Which command is used to list the attributes of a file? a) cp b) list c) Is d) attr
A: 2.Which command is used to list the attributes of a file? a) cp b) list c) Is d) attr Answer : c)…
Q: Create a program that has the following methods and corresponding usage. AreaCircle - compute…
A: Introduction: In this question, we are asked to write a C# programming to create the two methods :…
Q: Which of the 'if statements below is the correct one for the following problem statement? Adjust…
A: if employee salary is more than 11000 per month then we should increase salary by 2.5%, else we…
Q: Determine the time complexity function of the program snippet below, int f1(int n) { if (n <= 1)…
A: These re recursive functions and we have to find their time complexity by recurrence relation. We…
Q: What are the drawbacks of using passwords to restrict computer system access?Describe some…
A: Introduction: The user and the hardware are connected through the operating system, which acts as a…
Q: provide an understanding of a private cloud
A: As we know some things are private and the privacy must be maintained while storing our data also…
Q: Write the Fibonacci Function program with: Recursive and Iterative method respectively using the…
A: According to the information given:- we have to write Fibonacci Function program using Recursive…
Q: how to make a program in python to make a balanced tree with the characters of the lord of the rings
A: Balanced binary tree in python: Each node in a binary tree has two children, the left and right…
Q: Write code statements to create an array based on user values and determine if that array contains…
A: Start Accept the number of elements in the array Declare array with size Input array elements for(i…
Q: All the methods as well as the main method/tester statements must be written in one class. DO NOT…
A: In the given question we need to use python to : 1. Print elements of all the Nodes of a tree…
Q: Explain in detail how establishing a wireless network might be advantageous in a disaster recovery…
A: Introduction: In the case of a natural disaster like as an earthquake, tsunami, or tornado, the real…
Q: Describe how web caching will reduce the time it takes to get a request. Will web caching reduce the…
A: -Web caching is defined as the temporary storage of documents such as images, video files, and HTML…
Q: Consider the merits and cons of connectionless protocols as a potential substitute for…
A: Protocol: A protocol is a set of instructions for formatting and processing data in networking.…
Q: Write down the values of Carry, Overflow, Zero, Sign, Auxiliary Carry, Parity flag after each…
A: Auxiliary carry flag : The Auxiliary Carry Flag (AF) is one of the 8086 microprocessor's six status…
Q: Describe balanced DFD.
A: Balanced DFD: DFD (Data Flow Diagram) is said to be balanced DFD if the lower-level diagram has the…
Q: C# Password Generator: The program depicts a simple application of a password generator that…
A: It is defined as a general-purpose, object-oriented programming language. It is one of the most…
Q: What is the software development lifecycle?
A: Introduction: Software Development Life Cycle Within a software organisation, the SDLC is a…
Q: What is CGI? Why was CGI introduced? What are the disadvantages of an architecture using CGI…
A: Introduction In this question we will write about the CGI.
Q: A. What would be the answer to the following expression? 7 > 7 AND 8 < 4 ^ 2 Select one: a.7…
A: For the first question we have to first under stand what is AND and the ^ . Now let's understand…
Q: Give an example of a drawback of utilizing Flash on a website.
A: Introduction: Flash is a multimedia platform used to add animation, video, and interactivity. Flash…
Q: Find the PA of the memory location and its contents after the execution of the following assuming…
A: Given: DS=1512h. MOV AL, 99h MOV [3518], AL
Q: Write a program to draw a beautiful artboard
A: C programming is the object oriented programming languages that are used to create the web…
Q: b-Convert the following single-precision floating-point numbers into decimal numbers: 0 10000010…
A:
Q: Question 3 (File Handling) Assume you have the following text file (marks.txt) and storing a set of…
A: Python Source Code: file = open("marks.txt","r") #This line will open a the exixted file…
Q: 2.17 LAB: Convert from seconds People find it easier to read time in hours, minutes, and seconds…
A: Introduction: In a single hour, there are 3,600 seconds. Divide the total number of seconds by 3,600…
Q: This program will ask the user to input a number (suppose num). And that outputs the first num'th…
A: As no programming language is mentioned, it is solved using basic C++
Q: What does changing software configuration management policies imply?
A: Introduction: Software configuration management (SCM or S/W CM) is responsible for tracking and…
Q: Discuss Bluetooth protocol stack with neat schematic.
A:
Q: What exactly does wireless security entail?
A: Introduction: It is critical to comprehend the characteristics of such apps and assess the…
Q: Write pseudocode OR Python code that contains a While loop that asks the user to enter a number. The…
A: As per the question statement, We need to write python code.
Q: A theoretical framework for comprehending cybercrime Please give references for your claims.
A: Introduction: Many people, businesses, and nations are becoming more reliant on the Internet in…
Q: Create a new C# program then write a code equivalent to solve the problem given below. Create a…
A: 1. First create a take a input from user for January month. 2.Take input from user for February…
Q: A top property can never have a value of zero. Select one: True False
A: The top property influences the upward position of a situated component. This property significantly…
Q: Write down the values of Carry, Overflow, Zero, Sign, Auxiliary Carry, Parity flag after each…
A: When a particular Flag is set?? Carry Flag : It is set when the result is more than n bits Overflow…
Q: Size of the memory =Number of Wordsx Number of bits per word
A: The answer is
Q: Explain why it is important to ask the user about his or her data backup availability before…
A: Data backup is fundamental for making your business when you lost the dat from principal server So,…
Q: Private keys, p=241 and q-887. Choose an appropriate encryption exponent e and send me an RSA-…
A: Below I have provided the handwritten solution of the given question:
Q: Define the terms retention and loyalty. If there are any differences, discuss them briefly
A: Introduction: Retention advertising understand the distinction between client loyalty and client…
Q: Why does a field in a database represent something? Why is it crucial?
A: Data field A data field indicating a quality or function named as an Entity A database attribute…
Q: Write a program to draw a beautiful artboard
A: Actually, program is an executable software that runs on a computer.
Q: Write pseudocode OR Python code that contains a While loop that asks the user to enter a number. The…
A: Given: Python code that contains a While loop that asks the user to enter a number. The loop should…
Q: You have a lot of users who don’t delete or clean up their files and folders. You’ve been asked to…
A: # This script will examine a file path and its subfolders to produce three reports for the user: #10…
Q: Write a sub that creates an array day of size 7 and then populates it with the days of the week…
A: The question is asking to solve in VBA code as we have to create sub. The complete VBA Code is…
Q: I need ideas for a Python programming project that includes the handling of an input file (data or…
A: Python programming for handling input file
Q: Explain the distinction between template functions and template classes with an example.
A: Template class When used in a program, acts as a predefined class. Class template is used when a…
Q: Please select file(s) Q8 Pointer heaven 10 Points Below is some code. You need to (1) show what the…
A:
1.3
Trending now
This is a popular solution!
Step by step
Solved in 2 steps with 2 images
- How does pipelining improve CPU efficiency? What’s the potential effect on pipelining’s efficiency when executing a conditional BRANCH instruction? What techniques can be used to make pipelining more efficient when executing conditional BRANCH instructions?Processor R is a 64-bit RISC processor with a 2 GHz clock rate. The average instruction requires one cycle to complete, assuming zero wait state memory accesses. Processor C is a CISC processor with a 1.8 GHz clock rate. The average simple instruction requires one cycle to complete, assuming zero wait state memory accesses. The average complex instruction requires two cycles to complete, assuming zero wait state memory accesses. Processor R can’t directly implement the complex processing instructions of Processor C. Executing an equivalent set of simple instructions requires an average of three cycles to complete, assuming zero wait state memory accesses. Program S contains nothing but simple instructions. Program C executes 70% simple instructions and 30% complex instructions. Which processor will execute program S more quickly? Which processor will execute program C more quickly? At what percentage of complex instructions will the performance of the two processors be equal?Assume that every 18 months, the number of cores in a new generation of processors doubles. How much additional off-chip memory bandwidth will be required for a three-year-old processor to maintain the same level of per-core performance?
- Let's say that the number of cores that can be used increases by one with each new generation of CPUs that comes out every 18 months. What percentage of additional off-chip memory bandwidth will be required in three years for a central processing unit to maintain the same level of per-core performance as it does today?Assume that every 18 months, the number of cores available on a new generation of CPUs is doubled. How much extra off-chip memory bandwidth will be required in three years to maintain the current level of per-core performance?3. The table below shows instruction-type breakdown for different programs. Using this data, you will be exploring the performance trade-offs for different changes made to an MIPS processor. Compute Load Store Branch Total Program1 600 600 200 50 ? Program2 900 500 100 200 ? a. Assuming that computes take 1 cycle, loads and store instructions take 10 cycles, and branches take 3 cycles, find the execution time for both the programs on a 3 GHz Processor. b. Assuming that computes take 1 cycle, loads and store instructions take 2 cycles, and branches take 3 cycles, what is the speedup if the number of compute instruction can be reduced by one-half?
- Suppose you have a processor with a base CPI of 1.0, and two caches (L1 and L2). You have the following specifications Clock rate= 5 GHz. Access time to L2 Cache = 6 ns Access time to Main memory = 100 ns Miss rate per instruction at the L1 cache is 2.5%. Miss rate per instruction at the L2 cache is 0.7%. A program contains 3000 instructions, 600 of them are memory access instructions. Taking into consideration the stalls on Data cache only, find the total average CPI. a.2.63 b.None of them c.1.16 d.1.45 e.2.13Assume that every 18 months, the number of CPU cores accessible is doubled. How much more off-chip memory bandwidth will be necessary for a CPU to maintain the same level of per-core performance in three years?Assume that each new generation of CPUs offers twice as many cores as the previous one does after every 18 months. How much extra off-chip memory bandwidth will be required for a CPU that will be introduced in three years if it is to achieve the same level of performance when measured on a per-core basis?
- Let's say that the number of cores that are included on each new generation of central processing units (CPUs) increases by a factor of two every 18 months. How much more off-chip memory bandwidth will be needed for a CPU that is launched in three years if the per-core performance is to remain the same?. Consider a system that has multiple processors where eachprocessor has its own cache, but main memory is shared among allprocessors.1. a) Which cache write policy would you use?2. b) The cache coherency problem. With regard to the systemjust described, what problems are caused if a processor has acopy of memory block A in its cache and a second processor,also having a copy of A in its cache, then updates mainmemory block A? Can you think of a way (perhaps morethan one) of preventing this situation, or lessening itseffects?Assume a 3GHz processor executes three classes of instructions(A, B, C).i. Calculate the average CPI for this sequence of program.ii. Calculate the execution time for this sequence of program.iii. If we use a system with four same processors, there will bespeed up by a factor of 4 for classes A and C, but class B willremain unaffected. Calculate the new execution time for thissystem. What is the overall speed up? Class A B C CPI for class 4 2 10 IC in sequence 100 200 300