Cs433: computer architecture

Assignment Help Basic Computer Science
Reference no: EM1352576

Problem 0

Choose the correct answer for the following multiple-choice questions:

0.0) You are offered old homework solutions by a student who formerly took this class. You should:

                 a. Accept the solutions because no one will ever know.

                b. Not even look at the solutions because that is the honor code set for this class.

                 c. Accept the solutions because you don't really want to learn anything in this class.  You are simply taking it to fulfill a requirement.

0.1) While working with a partner on a homework assignment, one of your classmates asks if he/she can also work with you.  You should:

                 a. Tell the other student that you already have a partner for this homework assignment.

                b. Agree to work with the other student, but only on the portion of the homework you have not yet completed.

                 c. Apologize for having found a partner too early and offer to send the other student a completed copy of your homework.

 

0.2) Suppose you and your partner are overwhelmed with work at the time the homework is due.  You should:

                 a. Have your partner do half the problems, you do the other half, and combine your solutions.

                b. Complain about your course load to everyone you meet.

                 c. Think ahead and email Professor Adve for an extension within 48 hours of when the homework is handed out.

0.3) You and your partner have discussed all the problems and their solutions. You then independently finish writing up your solutions for submission. Your partner texts you that s/he is running out of time to write up her/his solutions because there is a midterm the next day and asks you for your writeup as an aid. You should:

a.       Give your partner your writeup. After all, you already discussed the solutions with her/him earlier.

b.      Not give your writeup because the honor code requires both partners to independently write the solutions.

c.       Not give your writeup, but be available to help your partner as she/he writes up her/his submission.

Problem 1

Part (A)  Assume a new execution mode called "enhanced mode" provides a 1.5x speedup to the sections of programs where it applies. What percentage of a program (measured by original execution time) must run in enhanced mode for an overall speedup of 10%? 

Part (B)  For the program identified in Part (A), what is the maximum possible speedup with an ideal enhanced mode (i.e. the identified percentage of the program is sped up infinitely)? 

Part (C) Two enhancements are proposed: one that can enhance 40% of execution time with a speedup of 1.5, and another that can enhance a different 25% of execution time with some greater speedup value.  Only one of these two can be implemented.  How much of a speedup is necessary in the second enhancement to give a better enhancement than the first?

Problem 2

Consider a 2.16 cm2 die for a 64-bit processor manufactured from a 30cm-diameter wafer costing $5,000. Assume a wafer yield of 98%. Use the defect model from the text with 0.04 defects per cm2 and α=11.5. What is the expected cost per die (before testing)? Ignore edge effect correction.

Problem 3

Suppose a processor uses 95W of power while operating at 3GHz, of which 3/4 is dynamic power. Suppose we want to run the same processor at a higher frequency which requires increasing the operating voltage proportionally as well. If the dynamic power consumption increase of up to 78% can be tolerated, by how much can the processor frequency be sped up?

Problem 4 

Consider a server farm of 10,000 identical components where a single failure causes the entire system to crash. If each component has an MTTF of 350 days, what is the MTTF of the entire farm? Assume an exponential distribution for component time to failure.

Reference no: EM1352576

Questions Cloud

What is the yearly demand for coffee by us consumers : The yearly demand for coffee by U.S. consumers is given by the demand curve QD=250-10P, where Q is quantity.
Representing information by predicate-calculus sentences : Represent this information by predicate-calculus sentences in such a way that you can represent the question Is there a member of the alpine club
Determine the magnitude and direction of the resultant : A crate with a mass of 171.5 kg is suspended from the end of a uniform boom with a mass of 80.3 kg. The upper end of the boom is supported by a cable attached to the wall and the lower end by a pivot (marked X) on the same wall. compute the tensio..
Pipelined machine versus the single cycle machine : What is the speedup of the pipelined machine versus the single cycle machine assuming there are no stalls?What is the speedup of the pipelined machine versus the single cycle machine if the pipeline stalls 1 cycle for 30% of the instructions?
Cs433: computer architecture : CS433: Computer Architecture - Spring  2014,  Assume a new execution mode called "enhanced mode" provides a 1.5x speedup to the sections of programs where it applies. What percentage of a program (measured by original execution time) must run in en..
Define and explain the various forces that affect market : Define and explain the various forces that affect in international markets and What are the advantages and disadvantages of trade protectionism?
What would the largest cardholder fee that tuan will pay : what would the largest cardholder fee that Tuan will pay. If the rental store has a constant marginal cost of $2, which strategy is more profitable?
Whether attribution biases can be positive : Explain whether or not attribution biases can be positive and why.
Estimation of organizations financial performance : Estimate your selected organization's financial performance over the past two years using financial ratios. Calculate the following ratios for each year

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Describe retail events in terms of pci compliance standard

You visit retail establishment, shop around, and ultimately carry several products to one of the point of sale. Document each main events just explained and describe them in terms of PCI compliance standard.

  Values for the items in the risk register

Recommend reasonable values for items in risk register for this asset and threat, and give justifications for your choices.

  Feature set of free helix forensics cd

Visit Helix web site and read about feature set of free Helix forensics CD. Note that documentation for Helix is not on CD, to keep it down to ~700MB.

  Finding content of ac and memory word at specified address

What are the content of the AC and the memory word at address 103 when the computer halts.

  Determine subgame-perfect equilibrium

Targeting again one of the surviving gangsters. Survivors split money equally. Determine subgame-perfect equilibrium.

  Variety of web-based applications of google account

Google presents a variety of web-based applications/products through accessing Google account from any computer with internet connection.

  Explaining formal risk assessment of desktop systems

As apart of a formal risk assessment of desktop systems in small accounting firm with limited IT Support, you have identified asset "integrity of customer and financial data files on desktop systems" and threat.

  Explaining downtick in project success rates of it projects

What is the likely reason or reasons for the downtick in project success rates of IT projects and what recommendations would you make to improve the success rates? Be specific.

  Monitoring performance of it acquisition projects

Who is or should be responsible for monitoring the performance of IT acquisition projects and taking action that may result in cancelling the project?

  Storing and compiling a large amount of data

Because information systems are able to store and compile a large amount of data, many people worry that, their private data will end up in the wrong hands. Explain your position.

  Circuit diagram-truth table for half subtractor-full adder

Illustrate the circuit diagram of the following circuit and create truth table for half subtractor and full adder. Full subtractor and Half adder.

  Explaining resulting scheme is not ind-cpa-secure

Let a variant of CBC-mode encryption where sender simply increments the IV by 1 each time a message is encrypted. Illustrate that resulting scheme is not IND-CPA-secure.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd