Which computer and compiler would you purchase

Assignment Help Computer Engineering
Reference no: EM132092906

Performance assessment.

Consider two different implementations, M1 and M2 , of the same instruction set. There are three different classes of instructions (A, B, and C) in the instruction set. Implmentation M1 has a clock rate 6Ghz, and M2 has a clock rate of 3GHz. The average number of cycles for each instruction class on M1 and M2 is given in the table below.

The table also contains a summary of average proportion of instruction classes generated by two different compilers, C1 and C2.

Assume that each compiler uses the same number of instructions for a given program but that the instruction mix is as described in the table.

(a) If you purchase M1, which compiler would you use?

(b) If you purchase M2, which compiler would you use?

(c) Which computer and compiler would you purchase if all other criteria were identical, including cost.

Show the decision procedure.

Class of instructions

CPI on M1

CPI on M2

C1 usage

C2 usage

A

2

1

50%

40%

B

3

2

25%

20%

C

5

2

25%

40%

Reference no: EM132092906

Questions Cloud

Which of philosophical position on the question of human : Which of philosophical position on the question of human freedom do you find most persuasive, which do you find least persuasive? Why?
At what phase of the software development process should : At what phase of the software development process should risk analysis be performed?
Creating a new website advertising your new lawn care : Installing a new server running Windows Server 2012 R2... this will function as an upgrade to your existing printserver that hosts 15 network printers.
Describe the exception error : The exception err0r can be one that you have encountered or one you find on the Internet. Describe the exception err0r and explain potential implications.
Which computer and compiler would you purchase : Which computer and compiler would you purchase if all other criteria were identical, including cost.
Find two ways to change the mac address on your computer : Perform a little research to find two ways to change the MAC address on your computer. Clearly explain why this is valuable knowledge to have.
Create a coin toss simulation program : A no-arg constructor, which randomly determines the side of the coin, that is facing up ("heads" or "tails") and initializes the sideUp field accordingly.
How frequently should the key be changed : What attack is more likely to succeed if a key has been used frequently? How frequently should the key be changed?
Update the credit hours and classification : Update the credit hours, classification, and the GPA, taking into account the current GPA and grades in the courses the student is currently enrolled in.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Find the deciphering map and then decipher the message

MA3626 - Find the number of possible encryption exponents and Find the deciphering map and then decipher the message - Find the largest possible value

  How information technology influences

Information technology influences the behavior of organizations. give Name one effect of IT implementation and long-term usage you assume having a positive contribution and one having a negative consequence.

  Set up a password policy enforcing use of complex passwords

Set up a password policy enforcing use of complex passwords. Setup a password policy on both systems to enforce the use of complex passwords.

  Write a class that encapsulates a deck of cards

Write a class (and a client class to test it) that encapsulates a deck of cards. A deck of cards is made up of 52 cards. You should have three instance variables.

  Identify the different types of malware

In this discussion, you will identify the different types of malware and the popularity of each type. Choose two types of malware that were discussed.

  Prepare a maintenance plan to install windows updates

The hospital needs to display a HIPPA warning reminding employees of patient confidentiality requirements to all employees when they log on - Several teams need access to local printers which will be shared among the group.

  Find the nines and tens complement of the decimal numbers

Find the nines and tens complement of the following decimal numbers.

  Encode the same sequence using run-length

Encode the following bit sequence using run-length encoding with 4-bit codes.

  Use the driver log erd found on the huffman

Using Microsoft Access, create the preliminary (no keys and no relationships) database tables for the Huffman Trucking Driver Log. Use the Driver Log ERD found on the Huffman Intranet site, Information Technology page for guidance.

  Questionaccept a pseudocode for following programming

questionaccept a pseudocode for following programming exercise-fat gram calculatorplan a program that asks for the

  How does the accuracy of the model change

Experiment with the effects of outliers on linear regression. How does the accuracy of the model change as we reduce the size and number of parameters?

  How do you determine the hop limit in flooding

How do you determine the hop limit in flooding? What can be done to protect a centralized routing network if the computer hosting central routing table fails?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd