If your CIO asks such a stupid question run for the hill, he should not hold that title.
Every company, small, medium or large should have Firewalls, Intrusion Detection, Managed Virus Protection Software at the very least. Windows is the most deployed OS in the world and of course the main target of hackers i.e Viruses. MAC's to a lesser extent and Unix while probably the least vulnerable are still not immune to Viruses/Trojan and other Malware.
Users can still be the victims of trojan horses, phishing scams, and other online fraud. There<span> is no such thing as a 100% safe computer, a </span>Mac<span>, Windows, and even Linux are all capable of being infected with a </span>virus<span> or other malware.
</span>
Lastly, physical access to any computer that is not encrypted is vulnerable.
A. the order of events...
hope this helps!
Answer:
1 PROCESSOR :
(1 × 2.56 × 10^9) + (12 × 1.28 × 10^9) + (5 × 2.56 × 10^8) / 2 GHz = 9.6 s
2 PROCESSORS :
(1×2.56×10^9)+(12×1.28×10^9)/0.7×2 + (5 × 2.56 × 10^8) / 2 GHz = 7.04 s
Speed -up is 1.36
4 PROCESSORS :
(1×2.56×10^9)+(12×1.28×10^9)/0.7×4 + (5 × 2.56 × 10^8) / 2 GHz = 3.84 s
Speed -up is 2.5
5 PROCESSORS :
(1×2.56×10^9)+(12×1.28×10^9)/0.7×8 + (5 × 2.56 × 10^8) / 2 GHz = 2.24 s
Speed -up is 4.29
Explanation:
The following formula is used in this answer:
EXECUTION TIME = CLOCK CYCLES / CLOCK RATE
Execution Time is equal to the clock cycle per clock rate
<span>31 2/8 minus 29 3/8
( 31 + 2/8 ) minus ( 29 + 3/8 )
2 plus ( 2/8 - 3/8 )
</span><span>2 minus 1/8
1 7/8 answer</span>