Define about hyper-threading technology, Computer Engineering

Assignment Help:

Q. Define about Hyper-threading technology?

Hyper-threading technology enables a single microprocessor to behave as two separate threaded processors to operating system and application program which use it.

Hyper-threading requires software that has multiple threads and optimizes speed of execution. A threaded program executes rapidly on hyper threaded machine. Though it must be noted that not every program can be threaded.

The other architecture that has gained popularity over last decade is power PC family. These machines are called as Reduced set instruction computer (RISC) based technologies. RISC technologies are finding their application because of simplicity of Instructions. The IBM made an alliance with Apple and Motorola who has used Motorola 68000 chips in their Macintosh computer to make POWER PC architecture. A number of the processors in this family are:

602_Define about Hyper-threading technology.png

Figure: Power PC Family


Related Discussions:- Define about hyper-threading technology

What is core dump, Raises when accessing an unassigned memory location acce...

Raises when accessing an unassigned memory location accessing a null pointer

Illustration of an instruction cycle, Q. Illustration of an instruction cyc...

Q. Illustration of an instruction cycle? Instruction cycle displayed in given figure comprises subsequent stages: First address of the subsequent instruction is calculat

Dbms, What are the disadvantages of file processing system?

What are the disadvantages of file processing system?

Explain interface, What is an Interface? An interface is not a class. I...

What is an Interface? An interface is not a class. It is an entity that is explained by the word Interface. An interface has no implementation; it only has the signature or in

Explain token ring, Explain Token Ring. Token Ring: A token ring is ...

Explain Token Ring. Token Ring: A token ring is a collection of single point -to-point links, which arise from a circle. In a token ring a special bi t pattern, termed as th

State about dynamic modelling and its inputs, State about Dynamic modelling...

State about Dynamic modelling and its inputs Dynamic modelling is elaborated further by adding concept of time: new attributes are computed, as a function of the attribute chan

Boiler troubles, Differences between internal and external treatment in boi...

Differences between internal and external treatment in boiler

Branch (control) hazards in computer architecture, Branch (control) hazards...

Branch (control) hazards in computer architecture : Branching hazards (also called control hazards) take place when the processor is told to branch -for example, if a defin

Fact finding techniques on banking system, what are the questionnaries and ...

what are the questionnaries and observation of work site for banking system?

What are the disadvantages of a vpn implementation, What are the Disadvanta...

What are the Disadvantages of a VPN implementation The greatest disadvantage of a VPN implementation is its non-flexibility to accept unknown locations. VPN works extremely wel

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd