Answer:
(a)The CPU B should be selected for the new computer as it has a low clock cycle time which implies that it will implement the process or quicker when compared to the CPU A.
(b) The CPU B is faster because it executes the same number of instruction in a lesser time than the CPU A
.
Explanation:
Solution
(a)With regards to the MIPS performance metric the CPU B should be chosen for the new computer as it low clock cycle time which implies that it will implement the process or quicker when compared to the CPU A and when we look at the amount of process done by the system , the CPU B is faster when compared to other CPU and carries out same number of instruction in time.
The metric of response time for CPU B is lower than the CPU A and it has advantage over the other CPU and it has better amount as compared to CPU A, as CPU B is carrying out more execution is particular amount of time.
(b) The execution can be computed as follows:
Clock cycles taken for a program to finish * increased by the clock cycle time = the Clock cycles for a program * Clock cycle time
Thus
CPU A= 5*10^6 * 60*10^-9 →300*10^-3 →0.3 second (1 nano seconds =10^-9 second)
CPU B= 3 *10^6 * 75*10^-9 → 225*10^-3 → 0.225 second
Therefore,The CPU B is faster as it is executing the same number of instruction in a lesser time than the CPU A
My response to this suggestion would be that the number of shards exceeds the number of instances because a single worker can process an infinite number of shards.
<h3>What is AWS?</h3>
AWS is an acronym for Amazon Web Service and it can be defined as a web-based service that is saddled with the responsibility of providing on-demand cloud computing and application programming interface (API) to individuals, governments, and business firms on a metered basis.
<h3>What is
Amazon Kinesis?</h3>
Amazon Kinesis can be defined as an Amazon Web Service (AWS) which is designed and developed to enable an end user to ingest, buffer, and process large-scale data streams from multiple services in real-time.
In this scenario, my response to this suggestion would be that the number of shards exceeds the number of instances because a single worker can process an infinite number of shards.
Read more on Amazon Kinesis here: brainly.com/question/28115685
#SPJ4
Answer:
BlueBorne Attack
Explanation:
If you're using a Bluetooth enabled device, whether it's a smartphone, laptop, smart TV, or any other IoT device, you risk malware attacks that can be remotely performed to take over your device, even without requiring any interaction from your side.
Security researchers have just discovered a total of 8 zero-day Bluetooth protocol vulnerabilities affecting more than 5.3 billion devices - from Android, iOS, Windows and Linux to the Internet of devices (IoT) - using technology short-range wireless communication
Using these vulnerabilities, security researchers at IoT security firm Armis created an attack, called BlueBorne, which could allow attackers to completely take over Bluetooth-enabled devices, spread malware, or even establish a “man” connection. -in-the-middle ”to gain access to device critical data and networks without requiring any victim interaction.
Answer:
No possibly way of doing this
If the device isn't functioning but is turned on
On android: Hold the power button and either the volume up or down keys at the same time till the screen goes black
On IPhone/IPad/Ipod: hold down the home key and the power button till the screen goes blank
On Newer Apples with no home button, just hold down the power key till the screen goes blank
On PC: Hold the power button on the pc thill the screen goes black
On tablet: Use the steps for android listed above.