Total number of clock cycles

Assignment Help Basic Computer Science
Reference no: EM131192186

1. A program containing twenty million instructions is executed on a system with a fixed clock cycle time of 250 pico-seconds. All instructions are executed one at a time and each instruction requires a integral number of clock cycles. The divide instruction on this machine requires 12 clock cycles and accounts for 10% of the total number of instructions executed in the program. The other 90% of the instructions in the program require an average of 5 clock cycles per instruction.

a) The clock rate for this machine is

b) The total number of clock cycles consumed by the entire program is

c) What speedup (expressed to two decimal places) would be obtained for this program by making the divide instructions twice as fast? Speedup=

2. A certain program contains multiply instructions as well as other types of instructions. The CPI for each instruction in the program is 4. The fixed cycle time for the processor on which the program runs is C nano-seconds. The total number of instructions in the program is IC.

a) An improvement is made to the multiply instruction such that after the improvement the CPI for the multiply instruction is reduced to 3. The multiply instruction accounts for N% of the total instructions in the program. Prior to the change the running time for the program was 2.85 seconds. After the change the running time for the program is 2.28 seconds. What is the corresponding value for N? That is, to what percent of the total number of instructions does the multiply instruction correspond? Express your answer to two decimal places.

b) As a different case, suppose that the multiply instruction had a CPI of 12 before the improvement and accounts for 22% of the total number of instructions in the program. All instructions other than the multiply have a CPI of 4. What speedup factor would be provided for the program by reducing the CPI for the multiply instruction from 12 to 3? Express your answer to two decimal places.

Reference no: EM131192186

Questions Cloud

Write a program in java that reads integers : Part 1: Write a program in Java that reads integers into an array list until end-of-file, then prints the array. Part 2: Modify the program to insert the value 99 before the index 5 position.
What would you describe as j and js primary concern : What would you describe as J&J's primary concern related to the proposed guidance?-  From what perspective are they raising this concern?
Next major phase in software development life cycle : The next major phase in software development life cycle (SDLC) is testing. Quality assurance methods and testing help support this phase. Investigate the library and Internet for information on the various tests that should be performed at differen..
Write a java program that solves the problem for the farmers : Write a complete Java program in a source file to be named Assignment1.java, that solves the problem for the farmers who are trying to decide ahead of time how many completely filled jars they need.
Total number of clock cycles : a) The clock rate for this machine is b) The total number of clock cycles consumed by the entire program is c) What speedup (expressed to two decimal places) would be obtained for this program by making the divide instructions twice as fast? Speedu..
Calculating the codewords for all possible combinations : Using the CRC generator G, construct a code table by calculating the codewords for all possible combinations of the 3-bit dataword, respectively. The code table defines an (n, k) CRC code. Determine the values of n and k respectively and explain t..
Types of data transmission methods : Using examples and providing application areas of each, describe the two types of data transmission methods
Types of data transmission methods : Using examples and providing application areas of each, describe the two types of data transmission methods?
How the theories might help us overcome weaknesses : Be sure to identify at least two different theories from your reading that support your presentation. Discuss the theories in terms of how they can help people understand strengths and weaknesses in visual processing and how the theories might hel..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Follow-up actions for making decisions

What are the things you should consider in making this decision, and based on your choice, what would be your follow-up actions?

  Compare and contrast the us health care system with that

compare and contrast the u.s. health care system with that of another country. what are some of the major advantages

  Operating system supported

To learn more about e-mail client programs, perform the following actives: Open a browser and search the Web for free E-mail client programs. Visit several of the home pages associated with these programs and make note of the following informatio..

  What exactly active directory folders purposes

Active Directory folders (not shared folders) are unique objects in Active Directory.

  A network engineer to install

A network engineer to install and configure a network for a small company

  Staffing level requirements for project team

Describe in scholarly detail how you would use WBS as aid to finding staffing level requirements for project team?

  Explain the importance of business rules in database design

How would you explain the importance of business rules in database design? What tables would you create, and what would be the entity names and attribute names? What are the business rules that must be considered in this design?

  Write expressions for the speedup and efficiency

Write expressions for the speedup and efficiency.

  Do an equilibrium analysis to explain your answer

The rope is used to tow the refrigerator. In order to prevent yourself from slipping while towing, is it best to pull up as shown, pull horizontally, or pull downwards on the rope? Do an equilibrium analysis to explain your answer

  What is cyber warfare

Summarize What is cyber warfare? What are the potential targets? What types of cyber weapons and tactics do intruders use?

  Indicate any errors that might have been introduced frame

Indicate any errors that might have been introduced into the frame.

  How to do electronic configuration

How to do electronic configuration

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd