answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vera_Pavlovna [14]
1 year ago
15

Ld' is the instruction with the longest latency on the CPU from Section 4.4 (in RISC-V text). If we modified ld and sd so that t

here was no offset (i.e., the address to be loaded from/stored to must be calculated and placed in rs1 before calling ld/sd), then no instruction would use both the ALU and Data memory. This would allow us to reduce the clock cycle time. However, it would also increase the number of instructions, because many ld and sd instructions would need to be replaced with ld/add or sd/add combinations.
(a) What is the primary factor that influences whether a program will run faster or slower on the new CPU?
(b) Do you consider the original CPU a better overall design; or do you consider the new CPU a better overall design? Why?

Computers and Technology
1 answer:
antiseptic1488 [7]1 year ago
8 0

Answer:

See explaination

Explanation:

a)

The primary factors that influence the program's speed on a new CPU are given as:-

CPU Clock speed where the speed of the process instructions is being measured.

Multi-core which is when the transistors work faster than respective CPU.

Cache which helps to note that the transition of data is smooth and fast.

b)

So, there are two CPUs suppose the old one as 'A' and the modified one as 'B'.

'A' has following features---

It takes more time to execute program as it has more clock cycle time or we can say it has low clocking rate or low speed in terms of MHz or GHz. Clock rate is the inverse of Clock Cycle Time. When you will increase the clocking rate of CPU, it will get faster and then Clock Cycle Time will get reduced.

It has less instructions provided.

'B' has following features----

It takes less time to execute program as it has less clock cycle time or we can say it has high clocking rate or high speed in terms of MHz or GHz.

It has more instructions provided.

The performance of CPU depends upon 2 factors:

The number and types of instructions that are executed by the CPU

How fast the CPU can execute those instructions?

So, overall CPU B is better as it has less execution time than CPU A but the performance will always depend upon the number and type of instructions executed by the CPU so it may vary.

Please refer to attachment for instructions and formulas.

You might be interested in
Suppose a computer has 16-bit instructions. The instruction set consists of 32 different operations. All instructions have an op
Kazeer [188]

Answer:

2^7= 128

Explanation:

An instruction format characterizes the diverse part of a guidance. The fundamental segments of an instruction are opcode and operands. Here are the various terms identified with guidance design:  Instruction set size tells the absolute number of guidelines characterized in the processor.  Opcode size is the quantity of bits involved by the opcode which is determined by taking log of guidance set size.  Operand size is the quantity of bits involved by the operand.  Guidance size is determined as total of bits involved by opcode and operands.

6 0
2 years ago
Jannette has been experiencing slow performance on her computer. Today she received an error message saying that an update to he
Marysya12 [62]

Answer: ur never going to get your answer!!!!

ExpElanation: hahahahaha ( pls 5 star pls pls. Shhhh)

3 0
2 years ago
Read 2 more answers
Describe different types of intrusions such as SQL PL/SQL, XML, and other injections.
Finger [1]

<em>Intrusion means unauthorized and harmful activities happening in your system. Any irregularities in the system is considered as intrusion and therefore monitored by administrators and can be detected using Intrusion Detection System. </em>

<em>Examples of Intrusion attacks in a network are: </em>

  • <em>Denial of Service (Dos) - denial of service means flooding the system causing it to crash and unable to respond to a service request. Normally, a DoS attack is facilitated by numbers of hosts sending enormous request to a victim computer. The requests can be in a form of code that would flood the system and making it to unresponsive.  </em>
  • <em>Man in the Middle Attack (MiM) - a hacker would be in the middle of the communication between a client computer and a server computer. The hacker can mimic IPs within the network and steal information then sends it to the intended receiver.  </em>
  • <em>SQL Injection - For websites that runs database like SQL, a code by the hacker can be added to the website and making him gained access to the database information successfully.</em>
8 0
1 year ago
Kendall receives an email stating that a leading computer company is giving away free computers, asking her to forward the email
gavmur [86]

Explanation:

Kendall should report the email as scam and delete email instead of forwarding it. She should also run her virus protection software as these kind of emails on the Internet are mostly Fraud and can contain virus so the user should avoid them.

8 0
2 years ago
At age 16, Cheyenne just got her driver's license. She loves to drive and is thinking of becoming a truck driver, because she he
Ivenika [448]
<span> the answer would be: Does she have or can she develop the strengths needed for this type of work?</span><span />
6 0
1 year ago
Read 2 more answers
Other questions:
  • Computer design software requires __________________ to be used properly and successfully by architects.
    9·2 answers
  • Which statement regarding dialogues in multiplayer games is true? Dialogues are based only on players’ actions.
    7·2 answers
  • Steps in creating a folder
    12·1 answer
  • Jane's organization recently experienced a security incident that occurred when malware set to trigger on the chief executive of
    13·1 answer
  • Use the image below to answer this question.
    14·1 answer
  • Produce a list named prime_truths which contains True for prime numbers and False for nonprime numbers in the range [2,100]. We
    11·1 answer
  • array of String objects, words, has been properly declared and initialized. Each element of words contains a String consisting o
    11·1 answer
  • Write a program that calculates an adult's fat-burning heart rate, which is 70% of 220 minus the person's age. Complete fat_burn
    13·1 answer
  • Ishaan is confused between the terms webpage and website help him in understanding the difference between both​
    11·1 answer
  • What web 2.0 features allows users to subscribe to a data plan that charges for the amount of time spent on the internet?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!