Performance equation of computer system, Computer Engineering

Performance Equation of computer system:

Following equation is frequently used for expressing a computer's performance ability:

1190_Performance Equation.png

The CISC approach tries to minimize the number of instructions per program, sacrificing the number of cycles per instruction. RISC does the conflicting, reducing the cycles per instruction at the price of the number of instructions per program.

 

 

 

Posted Date: 10/13/2012 3:52:09 AM | Location : United States







Related Discussions:- Performance equation of computer system, Assignment Help, Ask Question on Performance equation of computer system, Get Answer, Expert's Help, Performance equation of computer system Discussions

Write discussion on Performance equation of computer system
Your posts are moderated
Related Questions
Q. Explain Sample Instruction Format of MIPS instruction? All MIPS instructions are of same size and are 32 bits long. MIPS designers chose to keep all instructions of same len

Question 1 Explain briefly the process of matching production rules against working memory 2 Explain Simplification, Conjunction and Transportation in propositional logic by

The field SY-STEPL refers to The index of the screen table row that is presently being processed.  The system variable SY-stepl only has a meaning within the confines of LOOP.

Write a program to find the area under the curve y = f(x) between x = a and x = b, integrate y = f(x) between the limits of a and b. The area under a curve between two points can b

An HTML document can be created by using any HTML editor or text editor such as notepad etc. STEPS FOR CREATING A SIMPLE HTMLPROGRAM   1. Go to Start -> Programs->A

Explain the term middleware in context of RPC. A variety of commercial tools have been urbanized to assist the programmer in constructing client- server software. These tools a

T he complexity of adding two matrices of order m*n is mn

its language base assignment

The mercantile process model consists of which of the pahase(s): The pre-purchase phase. Purchase consummation phase. Post-purchase Interaction phase.

Explain the techniques used for protection of user files. This is easier to protect against accidental than malicious misuse. Protection of user files implies that file owne