Answer:
The answer to this question is given below in the explanation section.
Explanation:
CPU benchmarks are used to picking the best CPU. If you want to pick the best CPU for the kind of work you do is easier if you research some performance benchmarks.
As you know, CPU benchmarks are measurements used to compare performance between processors. These benchmarks are the measure to know the performance of CPU.
These CPU Benchmarks are generated by running software programs specifically designed to push the limits of CPU performance.
<em><u>Answer</u></em>
5 hours
<em><u>Explanation</u></em>
The two working together can finish a job in

Also, working alone, one machine would take one hour longer than the other to complete the same job.
Let the slower machine working alone take x hours. Then the faster machine takes x-1 hours to complete the same task working alone.
Their combined rate in terms of x is

This should be equal to 20/9 hours.

Multiply through by;





Factor to get:


It is not feasible for the slower machine to complete the work alone in 4/9 hours if the two will finish in 20/9 hours.
Therefore the slower finish in 5 hours.
Answer:
The Update statement in the DML is used for changing existing data in a table.
Explanation:
Their are following Sql statement in the DML.
Insert
This SQL statement is used for inserting data into the table.
select
This SQL statement is used for retrieving data from database
update
This SQL statement is used for updating data in a table.
delete
This SQL statement is used for delete data from database .
The "UPDATE" SQL statement in DML is used for Modify the data in the existing table .
Following are the syntax of Update SQL query
Update tablename
set column1=value1,column2=value2............column N=valueN
Where condition;
Example :Suppose we have student table and (rollno,name,age and add) are the field for that table we have to change the address of rollno 105
Then we use update query like that
UPDATE STUDENT
SET add='kalam nagar'
where rollno=105;
Answer:
The answer is "Need-To-Know Access Control Principle"
Explanation:
There are three types of access control methods such as Role-Based Access Control, Discretionary Access Control and Mandatory Access Control.
The access control principle that limits/blocks the user from gaining access to a folder/information/procedure within the system is called "Need-To-Know Access Control Principle".
I hope this answer helps.