Share
Explore BrainMass

CPU Utilisation

CPU stands for 'central processing unit' and is, in the most basic terms, the part of the computer that makes things happen - its heart. CPU time is an important measure for any machine as it shows the user the amount of their CPU's computational power that is being used and how it is being shared among all the programs they may have running. It is measured either in clock 'ticks' or 'seconds' (people often speak of CPU clock cycles) or via the percentage of the CPU's maximum capacity which is in use at the given time.

Intel Sandy Bridges CPU core circa 2009

CPU time is how long a CPU took in the actual processing of a computer program's instructions, not including the time taken up waiting to input and receive output for operations. In cases where a machine is running multiple processors simultaneously using a parallel processing schedule, this measure is calculated over the total CPU time used between them by the program.

Elapsed real time is how long a computer program takes from its initial state to the end, including waiting for input and output as well as any interrupts and other waits. This is measure using time from an ordinary clock and is always at least equal to CPU time (though often larger).

CPU utilisation can be an excellent measure of the performance of a piece of code you have written. The less percentage of the total CPU capacity a a program uses, the more efficient it is in terms of both power and processor use. A program may take up slightly different CPU times on different machines due to architect discrepancies but a huge increase on one machine may indicate a bug.

 

Photo credit Eric Gaba

Microcomputer Applications

1. Visit Web sites for companies that sell computer peripherals. Compile a list that contains as many types of input and output devices as you can locate on these Web sites. After compiling this list, be sure to document the Web sites you viewed to complete this assignment. 2. Prepare a paper, which should be no more than two

Reduced Instruction Set Computing

What is NOT of the RISC guideline: a) increased number of instructions b) fixed length, fixed format instruction word c) limited and simple instruction set d) register-oriented instructions e) limiting memory access

Fetch-Execution Cycle

The fetch-execution cycle is: a) significantly influences the cost of CPU manufacturing b) the basis for every capability of a computer c) the basis for most capabilities of a computer d) one of many important factors determining the capability of ALL computers e) one of many important factors determining the capabil

Replacing or Upgrading a Computer Power Supply

Describe the process necessary to properly install and/or replace the computer power supply in a computer. This solution gives students the resources and tips necessary to properly specify the procedure to replace a computer's power supply.

CPU Utilization

Consider a demand-paging system with the following time-measured utilizations: CPU utilization 20% Paging disk 97.7% Other I/O devices 5% For each of the following say, whether it will (or is likely to) improve CPU utilization. Explain the answer. a. Install a faster CPU. b. Install a bigger paging disk. c. In

TDMA cellular system, Power efficiency and spectral efficiency for a modulation scheme, Propagation index, Multipath, Fast fading, Direct sequence spread spectrum, Outgoing traffic intensity

I need the answers to the questions so that my study group can have the correct information in preparation for a group assignment. This is just for reference and will not be submitted for a grade to any school. Answer the following questions. Explain your answer and show your work in a logical manner. Use any needed formula

Spam affecting the Internet as a whole prevention

What is your experience with Spam? How is spam affecting the Internet as a whole? What is the best way to prevent it? Does it matter who is sending the spam, for example a non-profit organization might send out multiple emails for a fund-raiser?

CPU Flags as a Result of Addition of Two 8-bit Numbers

If the last operation performed on a computer with an 8-bit word was an addition in which the two operands were 00000010 and 00000011, what would be the value of the following flags? Carry Zero Overflow Sign Even parity Half-carry

Information Technology

Would you recommend security information software for your present/former workplace? Why or why not? Reason Why DOES THIS SLOW A LAN? WhaT is Your SOLUTION? RAM in workstations CPU in workstations Increase in traffic and loading. Upgrades in applications (e.g., upgrade database)

Troubleshoot Linux Problem

A user calls and tells you that the system is running slow. You run the "top" command to see if the system is excessively loaded. Based on the attached screenshot, what can you tell about the condition of the system?

Computers and Software

Treat each of the questions individually and in the order given below. The focus of your answers should be on answering the 'why' questions posed below and your explanations for your recommendations. This is not a formal paper and APA guidelines do not need to be followed. You should identify the question you are answering an

C+ Programing Declaration

2. Given the following declaration and definition of a structure: struct computer { float cost; int year; int cpu_speed; char cpu_type[16]; } model; Write a program to display the initial values held by the structure (you must use a structure) on the screen. 3. When you enter the following data: Enter the

Technology Paper

Prepare a (Technology) paper explaining the following: ? Accuracy of data input is important. What method of data input would be best for each of the following situations and explain why: ? Printed questionnaires ? Telephone survey ? Bank checks ? Retail tags ? Long documents ? Convenience and quality of output are impo

Various Multimedia Questions

1. What is the bit rate for uncompressed full-color XGA running at 25 frames per second? Can a data stream at this rate come off an Ultra Wide SCSI disk? 2. Can uncompressed black-and-white television be sent over fast Ethernet? If so, how many channels at once? 3. HDTV has twice the horizontal resolution of regular TV (

Network Activity Monitoring / Security

This solution provides the learner with an understanding of network activity monitoring. In particular, this solution provides a discussion oon potential management plans fo monitoring network activities and maintaining security of the network.

Motherboard Testing in Computers

A.Suppose you want to test a motherboard used in an installation before you proceed too far into the installation. From the devices listed below, select the minimum devices that you must install before you can boot the system to confirm that the motherboard BIOS starts POST: Mouse Computer case and power supply Monitor H

Computer Devices Situation

What situations are correct for the following: hard disk, floppy disk, RAM, CD ROM, tape, and Flash/jump drive? What is the role of: RAM, clock speed, data on hard disk, data on CD ROM, and data on floppy disk?

Execution Sequence of Main Program and Interrupts on CPU

Given the following sequence of events, show which routines the CPU is executing from time 0 to 100ns. Each handler routine with its interrupt request takes 20 ns to complete. Time Action 0 ns Start of main program 10ns IRQ4 20ns IRQ6 45ns IRQ1 60ns IRQ3.

1 processor/IO bound programs

If run by itself, an I/O bound program spends more time waiting for I/O than using the processor and vice versa for the processor-bound. Given a short-term scheduling algorithm favoring those programs that have used little processor time in the recent past. Explain why this algorithm favors I/O bound programs and yet does not

Size of Program Counter and the Instruction Register

A 32-bit microprocessor has 32-bit instructions with 2 fields, 1st field: 1 byte, contains the opcode 2nd field: operand or operand address How many bits are needed for the program counter and the instruction register?

Email/database server

The email database server is designed to accept multiple incoming requests via a socket in order to locate a specific message and return it to the client email browser (such as Outlook Express). Why the server may launch a thread to handle each incoming request. What benefit does the threading operation provide for process

I/O operation & Internet security

1.A process is said to be I/O-bound if it requires a lot of I/O operations, whereas a process that consists of mostly computations within the CPU/memory system is said to be compute-bound. If both a compute-bound process and an I/O-bound process are waiting for a time slice, which should be given priority? Why? 2. Identify a

Process States

Please provide insight regarding the attached diagram and questions. Please provide references. Please explain the concept of process states and how you draw your conclusions for the three questions. The following diagram indicates process states. The arrows between the boxes indicate state transitions. (See attachment for

Study Questions 4,5,6,7

4. Distinguish between the Internet, intranets, extranets. (Three paragraphs or less.) 5. What is e-Commerce? How can e-Commerce businesses be categorized? What are three major issues facing e-Commerce? 6. Over time computers have evolved from room-sized machines to hand-held devices. What has been the impact of th

Network Security is examined.

1.Suppose we are using Lamport's hash, and Bob's system crashes before receiving Alice's reply to a message. Further suppose an intruder, Trudy, can eavesdrop and detect that Bob crashed (maybe Trudy can even cause Bob to crash). This would create a situation where Trudy has Alice's reply (which Bob did not receive) and which Tr

Processing packets CPU

A CPU in a router can process 2 million packets/sec. The load offered to it is 1.5 million packets/sec. If the route from source to destination contains 10 routers (having no additional traffic), how much time is spent being queued and serviced by the CPUs. Assume Poisson arrivals and departures at each router.

General Questions about ATM Networks

1. ATM networks use a token bucket scheme to regulate traffic (traffic shaping). A new token is put into the bucket every 1 usec so ATM cells can be sent during this period. The data payload of ATM cells is 48 bytes. What is the maximum sustainable net (or effective) data rate? 2. A bridge between an 802.3 LAN and an 802.4

Two real-time processes

Two real-time processes are running on a computer. The first one runs every 25 msec for 10 msec. The second one runs every 40 msec for 15 msec. What is the utilization of the CPU for the given two processes?