Suppose it would take 100 hours in execution

Assignment Help Computer Engineering
Reference no: EM1331260

For a certain program, 1% of the code accounts for 50% of the execution time. Compare the following strategies with respect to programming time and execution time. Assume that it would take 100 man-months to write it in C, and that assembly code is 10 times harder to write and four times more efficient. Also assume it would take 100 hours in execution if entire program is written in C.

a. Entire program in C.
b. Entire program in assembly.
c. First in C, then the key 1% rewrite in assembly.

Reference no: EM1331260

Questions Cloud

The ada related issues in the casey martin decision : What were the ADA-related issues the court addressed in the Casey Martin decision?
Describing the institutional abuse : These may be from your own experience or from the media. State how you see the rights and duties of the parties have not been met and the results.
Intercollegiate athletic risk management policy : Intercollegiate athletic risk management policy
Explain about ebusiness and despite the difficulties : What resources does an International Internet retailer need other than merely a storefront on the Internet? Does it require fewer physical, financial, and human resources than a traditional retailer, or just as many? Explain.
Suppose it would take 100 hours in execution : For a certain program, 1% of the code accounts for 50% of the execution time. evaluate the following strategies with respect to programming time and execution time.
Legal problems in use of advance directives : Can you please explain the purposes, and any legal problems you see inherent in the use of advance directives.
Calculate is which step of planning a database : Which of the following is not one of the database objects present in the Access database window.
Explain the social responsibility : In your own words and perspective (NO Quotes) explain what social responsibility is about.
Necessity of guardianship : What procedures are involved and why these are important and discuss any abuses or problem areas you see within this area.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Program on bst

Program on BST

  Addressing and naming model

Sketch a plan for development of the addressing and the naming model in an environment of following given scenario: Ten (10) departments in the 1,000-employee organization. Equal separation by geography

  Write down a c program that has a declaration in main()

Modify this restaurant() function to alter the address in message. usage the expression *menu rather than *(menu + i) to retrieve the correct element.

  Security devices for protection against different attack

Describe two or more attacks for which the routers (layer 3 devices) are vulnerable. Explain how these attacks are detected and prevented by the security devices.

  Designing an erd

xplain why all this normalization stuff is so significant?" he asks. "The old system worked “OK” most of time, and now you're telling me we require all these special rules. Why is this essential?" Develop the ERD in MS Visio.

  Protecting against the attack

Major corporations, governments, and the other organizations are hacked every week, mostly by the means of phishing the attacks. Explain how users and IT organizations must arm themselves against these attacks.

  Write down an application that reads 3 integers

Write down an application that reads 3 integers

  Handling of disclosure of companys information

A company find out that some of its proprietary information has been unveiled within the Internet chat rooms.It asks ISPs to disclose actual identities of these people. Should the ISPs comply along with this request? Describe your reasoning.

  Find access time for this system is how many clock cycles

imagine that a certain cache-based system experiences a cache hit rate of 98%. A cache access requires 2 clock cycles, and main-memory access requires 40 clock cycles.

  How to use a sorting algorithm

Prompt the user for name and age of a group of people. The group's size is unknown at first , so the program must keep asking the user if they want to enter more data.

  Services commonly supported by a server

explain five services commonly supported by a server and address security mechanisms and devices that are used to support client/server functions.

  Encrypt and decrypt the message using the caesar cipher

The cipher that Caesar used is simple technique to replace each letter of alphabet with the another letter further down the alphabet for lowercase and uppercase. Encrypt and decrypt the message using the Caesar cipher with (K=3) in Java.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd