What required to execute a particular benchmark program is

Assignment Help Computer Engineering
Reference no: EM1326536

Computer performance is characterized by the amount by the amount of useful work accomplished by a computer system compared to the time and resources used. Depending on the context, good computer performance may involve one or more of the following: short response time, high throughput, low utilization of computing resource, high availability of the computing system or application, fast data compression and decompression, high bandwidth/short data transmission time. These are called metrics.

The performance of any computer system can be evaluated in measurable technical terms using one or more of the metrics. This was the performance can be compared relative to other systems or the same system before/after changes. It can also by defined in absolute terms.

There are a number of technical performance metrics that indirectly affect overall computer performance. The total amount of time (t) required to execute a particular benchmark program is

t = N * C/f

or

P = I * f/N

Where

P = 1/t is the performance in terms of time-to-execute

N is the number of instructions actually executed.

f is the clock frequency in cycles per second

C = 1/I is the average cycles per instruction

Reference no: EM1326536

Questions Cloud

Business ethics-policy statement : Select Dell Inc. as your business and develop the environmental policy statement for that organization. The policy statement must have the following components below:
Case study: family violence : The police finally caught up with Robert. They arrested him, charged him with aggravated assault with the intent to kill and child sexual assault, and, given the publicity in the case, held him without bond.
Transformational leadership and transactional leadership : As a leader what would you say is the most important difference between transformational leadership and transactional leadership?
Explain about logical data modeling : Logical Data Modeling - What arguments would you put forth to support your case?
What required to execute a particular benchmark program is : The performance of any computer system can be evaluated in measurable technical terms using one or more of the metrics. This was the performance could be compared relative to other systems or the similar system before/after changes. It can also by..
Explain security of website : Explain Security of website and please post a response to the Discussion Board and comment on other postings
Explaining role of personality in a leader : Do you feel it is beneficial to consider the role of personality or would you rather divide work evenly and set a list of standards and deadlines for everyone to follow?
Findout the number of hours of skilled labor : Findout  the number of hours of skilled labor also the number of hours of unskilled labor which minimized the price of doing the project.
Step-by-step answer to information systems : Step-by-step answer to Information Systems - Financial information systems can serve many functions in a business.

Reviews

Write a Review

Computer Engineering Questions & Answers

  C++ questions

Define an enum type, bookType, along with the values CSC, MATH, ENGLISH, HISTORY, PHYSICS, and PHILOSOPHY. Declare a variable book of type book Type.

  What is the idea to observe multiple print queues

What is the idea to observe multiple print queues

  Compare the two non-sequential file structure models

What advantages does first one have over the second and what advantages does the second have over the first? What would be your criteria for choosing one over the other for different applications.

  Routers

Discuss in detail why the differentiated services (DS) domain comprises of the set of contiguous routers? Also explain how the boundary node routers are different from interior node routers in the DS domain.

  Analysis of network

You are a $10 million consulting company responding to the Request for Proposal for a prospective client. The client seeks an analysis of its existing network in the anticipation of a large merger.

  Exploring web for security education

Explore the Web for security education and the training programs within your area. Keep down a list and examine which of the category has most examples.

  Describe software construction

Describe software construction

  Program that displays information about a family member

Program that displays information about a family member

  How to produce a wired and wireless network plan

How to produce a wired and wireless network plan

  Estimating the average memory access time

Every data reference which misses in L1 has the 60% chance of hitting in L2. A miss in L1 followed by the hit in L2 has a latency of 10 cycles. Explain the average memory access time for the load data reference within this new con?guration?

  Write down an account class

Write down an Account Class.

  Distributed scheduling algorithms

The receiver initiated the distributed scheduling algorithms assumed task pre-emption at sender site. Devise an approach, that is receiver-initiated however non pre-emptive.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd