answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SSSSS [86.1K]
2 years ago
10

Consider an unpipelined or single-stage processor design like the one discussed in slide 6 of lecture 17. At the start of a cycl

e, a new instruction enters the processor and is processed completely within a single cycle. It takes 2,000 ps to navigate all the circuits in a cycle (including latch overheads). Therefore, for this design to work, the cycle time has to be at least 2,000 pico seconds. What is the clock speed of this processor? (5 points) What is the CPI of this processor, assuming that every load/store instruction finds its instruction/data in the instruction or data cache? (5 points) What is the throughput of this processor (in billion instructions per second)? (10 points)
Computers and Technology
1 answer:
pantera1 [17]2 years ago
6 0

Answer:

a. Clock Speed of Processor = 0.5 GHz

b. Cycles per Instruction (CPI) = 1 Clock per Instruction

c. Throughput = 1 billion Instruction per Second

Explanation

Given Data

Time Take to complete the single Cycle = 2000ps = 2000 x 10⁻¹²

To Find

a. Clock Speed of Processor = ?

b. Cycles per Instruction (CPI) = ?

c. Throughput = ?

Solution:

a. Clock Speed of Processor = ?

Clock Speed = 1/Time to complete the cycle

                      = 1/2000 x 10⁻¹²  Hz

                      =  0.0005 x 10¹²  Hz

                      =  0.5 x 10⁹  Hz                             as   10⁹ = 1 Giga   so,

                      = 0.5 GHz

b. Cycles per Instruction (CPI) = ?

It is mentioned that, each instruction should start at the start of the new cycle and completely processed at the end of that cycle so, we can say that Cycles per Instruction (CPI) = 1

for above mentioned processor.

c. Throughput = ?

Throughput = CPI x Clock Speed

where

CPI = 1 cycle per instruction

Clock Speed = 1 billion Instructions per Second

as

Clock Speed = 1 billion Cycles per Second

Throughput = 1 cycle per instruction x 1 billion Cycles per Second

Throughput = 1 billion Instruction per Second

                         

You might be interested in
Explain why E-mail A is inappropriate for the workplace and revise it to be appropriate.
cluponka [151]

Answer:

its not there mate

Explanation:

4 0
2 years ago
Read 2 more answers
A laptop gets replaced if there's a hardware issue. Which stage of the hardware lifecycle does this scenario belong to?
Ilya [14]

Answer: Maintenance. This is the stage where software is updated and hardware issues are fixed if and when they occur. Retirement. In this final stage, hardware becomes unusable or no longer needed and it needs to be properly removed from the fleet

Explanation:

3 0
2 years ago
Emulated drivers provide enhanced drivers for the guest OS and improve performance and functionality for IDE and SCSI storage de
Vikki [24]

Answer:

The answer is "Option 2".

Explanation:

  • All the other drivers replicate even existing technical embedded devices. These systems have optimistic, and they are commonly accessible to inbox operators as most web browsers. It is an Imitated device, that performance problems because of all the emulator is the workload.
  • Integration Services  is a program package, which is created on a guest OS of a VM, that provides enhanced guest OS drivers and improves accuracy, functionality for IDE and SCSI storage systems, networking interfaces, and monitor and multimedia devices, that's why it is incorrect.

8 0
2 years ago
1. Consider a client and a server connected through one router. Assume the router can start transmitting an incoming packet afte
mezya [45]

Answer:

As the total bytes are L, when h bytes out of L are sent from client to router the router immediately send these h bytes forward to next router. Thus simultaneously another set of h bytes reaches the router and therefore many actions are being performed in a simultaneous way.  

Explanation:

For finding end to end delay, calculations are done and briefed.

All the paper work along with explanation is attached for better understanding.

5 0
2 years ago
You learn that in a previous security breach at GearUp, a disgruntled employee destroyed the encryption key that had been used t
lukranit [14]

Answer:

The data can be safeguarded using key escrow procedure.

Explanation:

Key escrow basically means to store the cryptographic key in an "escrow" by a reputable trusted third party. The copy of the encryption key is kept with the third party. In case the cryptographic key gets lost or destroyed, then the key escrow service helps to access the encrypted data. It also manages the access control to the key in case the key gets lost. So this way in case of security breach at GearOn the key escrow service can be used to re-implement or access the key easily.

6 0
2 years ago
Other questions:
  • A chemical found in the synaptic vesicles , which , when released . has an effect on the next cell is called a?
    10·1 answer
  • What is the term for a web site that uses encryption techniques to protect its data?
    12·1 answer
  • True or false? The largest component of a database is a field.
    12·2 answers
  • A domain's ____ settings must be configured correctly so that the mail transfer agent (mta) can establish a connection with a re
    15·1 answer
  • A network design engineer has been asked to design the IP addressing scheme for a customer network. The network will use IP addr
    6·1 answer
  • Print "userNum1 is negative." if userNum1 is less than O. End with newline Convert userNum2 to 0 if userNum2 is greater than 8.
    10·1 answer
  • Doctors discovered a tumor in Amanda’s brain and used robotic surgery to remove it. Which best describes the role a worker in th
    15·2 answers
  • You should see an error. Let's examine why this error occured by looking at the values in the "Total Pay" column. Use the type f
    14·1 answer
  • Write a MATLAB function named lin_spaced_vector with two inputs and one return value. The first input will be a single real numb
    7·1 answer
  • I have a variable and set it equal to 5. 1 then send it as an argument to a function that adds 5 to the variable passed in. Outs
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!