Compute the average number of machine cycles per instruction

Assignment Help Computer Engineering
Reference no: EM1328461

A certain microprocessor requires either 2, 4, 8, 12, or 16 machine cycles to perform various operations. Seventeen and one-half (17.5.) percent of its instructions require 2 machine cycles, 12.5% require 4 machine cycles, 35% require 8 machine cycles, 20% require 12 machine cycles, and 15% require 16 machine cycles.

a. What is the average number of machine cycles per instruction for this microprocessor?
b. What is the clock rate (machine cycles per second) required for this microprocessor to be a "1 MIPS" processor?
c. Suppose this system requires an extra 16 machine cycles to retrieve an operand from memory. It has to go to memory 30% of the time. What is the average number of machine cycles per instruction for this microprocessor, including its memory fetch instructions?

Reference no: EM1328461

Questions Cloud

Show operations management and supply chains : Operations Management and Supply Chains - How do hardware companies such as True Value or Wal-mart or Home Depot process their work according to Operations Management and supply chains method.
Explain ebusiness- key informaiton : Explain EBusiness- key informaiton and Choose one site you feel does an excellent job on all the aspects of an effective site and create a presentation
Investigating organization where teams are utilized : Select and investigate an organization where teams are frequently utilized.
Finding future or present value of bill shaffer : Bill Shaffer wishes to have $200,000 in a retirement fund 20 years from now. He can create the retirement fund by making a single lump sum deposit today. What is the maximum annual withdrawal he can make over the following 15 years?
Compute the average number of machine cycles per instruction : assume this system requires an extra 16 machine cycles to retrieve an operand from memory. It has to go to memory 30% of the time. What is the average number of machine cycles per instruction for this microprocessor, including its memory fetch ins..
Illustrate what is the price elasticity of demand : Illustrate what is the price elasticity of demand. From the price elasticity elucidate the new rates be for 2009 if the demand increases at the same rate.
Show optimal level of product availability in organization : What are the basic factors affecting the optimal level of product availability in manufacturing organization? Give practical examples to show how technology can help the inventory manager to improve the balance between the costs of over- and under..
Connecticut v/s griswold and carhart vs/ gonzales : Consider Justice Black's dissent in Griswold v. Connecticut. Is it consistent with his views in Adamson v. California (see Chapter 9)? Katz v. United States ? Discuss.
Processes and techniques that a risk manager would take : Processes and techniques that a risk manager would take to investigate, prevent, and control these types of events now and in the future

Reviews

Write a Review

Computer Engineering Questions & Answers

  What are the reasons why systems fail

What must be management's role in the system development life cycle.

  Describing the ttl

Support that a security-aware caching resolver accepts a DNS RRset at time t0 with signatures on it which will expire at time t1 (where t0

  Designing program

Write down a Program that lets the user enter an amount as a float value representing a total in the dollars and cents.

  Cbc-mode encryption

Let a variant of CBC-mode encryption in which the sender simply increments the IV by 1 each time a message is encrypted in place of choosing the IV at random each time.

  Write down a user-defined function

Write down a user-defined function

  What is the state of it systems development

What is the current state of IT systems development? How do systems development approaches affect  business?

  What restrictions must be imposed

Free Speech Online Some feel that there is too much objectionable material allowed on the Internet, whereas others argue that the Internet must be completely censored.what restrictions must be imposed.

  Determining average degree of vertex

For the random geometric graph, G(n, r), determine the average degree of the vertex: At least distance r from the boundary,

  Find minimal cover and identify all possible candidate keys

Find minimal cover and identify all possible candidate keys - Functional Dependencies

  Write a program takes two randomly generated parallel arrays

The random number generation for both arrays would be done in a method, both when the arrays are first populated and when they have to be repopulated.

  Integrated services architecture

Explain how has the integrated services architecture is being provided a solution to growing variety and volume of traffic experienced within the Internet and Intranets? Describe in scholarly detail.

  Interviewing for chief information officer

XYZ is interviewing candidates for position of Chief Information Officer (CIO). They are inquiring the candidates to explain briefly how they could satisfy their requirements as described above. State how would a successful candidate respond to th..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd