subject

A program spends 30% of its time performing I/O operations, 25% of its time doing encryptions, and the remaining 45% of its time doing general computations. The user is considering purchasing one of three possible enhancements, all of which are of equal cost: (a) a new I/O module which will speed up I/O operations by a factor of 2, (b) adding encryption hardware which will cut the encryption time by 70%, and (c) a faster processor which will reduce the processing time for both general computations and encryptions by 40%. Which of these three enhancements will provide the best speedup? Hint: This is an application of Amdahl’s Law.

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 02:30
Your boss wants you to configure his laptop so that he can access the company network when he is on the road. you suggest a vpn connection to him. he is very concerned about security and asks you how secure vpn is. what do you tell him?
Answers: 1
question
Computers and Technology, 22.06.2019 09:30
My mom and i are moving and we don’t have wifi for the next week, i want to know if using a using a hotspot with unlimited data is better than using regular wifi. i’m considering cost, speed, and data sacrifices.
Answers: 1
question
Computers and Technology, 22.06.2019 10:00
Which of the following is true of operations within a spreadsheet program’s built-in functions? a. operations within parentheses, then multiplication and division, and then addition and subtraction are computed. b. operations within parentheses, then addition and subtraction, and then multiplication and division are computed. c. multiplication and division, then addition and subtraction, and then operations within parentheses are computed. d. addition and subtraction, then multiplication and division, and then operations within parentheses are computed
Answers: 2
question
Computers and Technology, 23.06.2019 10:00
Install and use wireshark program ( send back screen shots and other vital information) case project 3-2: decode a tcp segment in a wireshark capture in this chapter, you walked through tcp segment to interpret the data included in its header. in this project, you use wireshark to capture your own http messafes, examine the tcp headers, and practice interpreting the data you'll find there. 1. open wireshark and snap the window to one side of your screen. open a browser and snap that window to the other side of your screen so you can see both windows.
Answers: 2
You know the right answer?
A program spends 30% of its time performing I/O operations, 25% of its time doing encryptions, and t...
Questions
question
Mathematics, 27.09.2021 17:30
question
English, 27.09.2021 17:30
question
Mathematics, 27.09.2021 17:30
question
Health, 27.09.2021 17:30
Questions on the website: 13722363