What is system speed up when the 8-core cpu is used

Assignment Help Computer Engineering
Reference no: EM132143365

Question :

Suppose a task consists of 40% CPU access, 20% memory access and 40% disk access. A CPU with 8 cores provides an effective speedup of only 4 over a singlecore CPU.

What is system speed up (as defined by Amdahl's law) when the 8-core CPU is used in place of the single core CPU?

Reference no: EM132143365

Questions Cloud

Determine the possible total amounts you can form : Determine the possible total amounts you can form using these gift certificates. Prove your answer using strong induction.
What is the one-way propagation delay between a and b : Suppose that each switch has a 20-bit processing delay in addition to a store-and-forward delay. At what time, in seconds, is A's packet delivered at B?
Find the probability that there are more than 20 users : Find the probability that there are more than 20 users transmitting simultaneously. (You need to calculate the exact value, not just the formula.)
What is the total elapsed time and effective throughput : Suppose I am transferring a 1024 byte file from my laptop to a server on my very slow circuit-switched, start-topology local area network.
What is system speed up when the 8-core cpu is used : What is system speed up (as defined by Amdahl's law) when the 8-core CPU is used in place of the single core CPU?
How many computers are needed for this system : What hardware is needed to have a web-site and client to browse the properties on that web-site?
List at least one advantage for this new system : What hardware is needed to have a web-site and client to browse the properties on that web-site? How many (n-tired) computers are needed for this system?
Online banking using the python programming language : You are tasked with creating an application that uses a GUI that simulates a simple banking interface similar to an ATM / online banking using the Python 3
Explain how you could implement the stack adt : Explain how you could implement the stack ADT using Q1 and Q2. Your answer should provide pseudocode algorithms for the stack operations.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Show an example of the vulnerability of rsa

Show an example of the vulnerability of RSA to selective forgery when the values of p and q are small. Use p.= 19 and q = 3.

  Determine the higher heat transfer rate of cylinder

Consider a cylinder with a length of 15 cm and a diameter of 10 cm. The cylinder has a surface temperature of 43°C, while the room air temperature is 17°C.

  Estimate how long the same algorithm running on the same

Suppose that an algorithm takes 30 seconds for an input of 224 elements (with some particular, but unspecified speed in instructions per second).

  Application showing sizes of two files and their ratio

Build a file which consists of your favourite movie quote. Make a use of a text editor like Notepad and save file as Quote.txt. Copy contents of the file and paste them into the word-processing program like Word. Save file as Quote.doc. Write down..

  How to illustrate decision table to represent treatment

How to illustrate decision table to represent treatment? Create a structured English version based on the following dialogue obtained by the Systems Analyst from the client interview below.

  Create classes for each of object type that need to be store

Create Classes for each of the object types that need to be stored, as indicated above. (See Note #3 in Programming Notes below.)

  Assuming that your group is in the testing phase of the

imagine that you are the head of the design team for a new video game concept.assuming that your group is in the

  Who should be liable for lapses in security

The FDA has recently issued guidelines for medical device security, but they are not mandatory and have no enforcement mechanism.

  What is the unusual feature of the for loop that you used

Display the processes in the system every 30 seconds five times using a while loop. What is the unusual feature of the for loop that you used?

  Discuss briefly different methods to capture design intent

List and discuss briefly the different methods to capture design intent. List and discuss briefly the different methods to document design intent.

  Create an odbc data source name also named stocktracker-two

Make a copy of the Stock Tracker database and name it, StockTracker2. Create an ODBC data source name, also named StockTracker2, that references this database.

  Evaluate the risks and potential consequences associated

What are the most significant security concerns related to email security? First, evaluate the risks and potential consequences associated

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd