It says you’ve only answered 11, but yeah it you’re account CAN be hacked
Explanation:
A.)
we have two machines M1 and M2
cpi stands for clocks per instruction.
to get cpi for machine 1:
= we multiply frequencies with their corresponding M1 cycles and add everything up
50/100 x 1 = 0.5
20/100 x 2 = 0.4
30/100 x 3 = 0.9
CPI for M1 = 0.5 + 0.4 + 0.9 = 1.8
We find CPI for machine 2
we use the same formula we used for 1 above
50/100 x 2 = 1
20/100 x 3 = 0.6
30/100 x 4 = 1.2
CPI for m2 = 1 + 0.6 + 1.2 = 2.8
B.)
CPU execution time for m1 and m2
this is calculated by using the formula;
I * CPI/clock cycle time
execution time for A:
= I * 1.8/60X10⁶
= I x 30 nsec
execution time b:
I x 2.8/80x10⁶
= I x 35 nsec
Answer:
Secure Authentication involves a combination of the following three information
Explanation:
Generally, it is important that users have access to secure sources of information or data. These data will be used by the users to get access to their platform such as account details. The user should also be the only person that has access to his or her vital information. This should not be disclosed to any other person.
The area that holds all the instructions the computer needs to start up when it is powered on is b) ROM
Further Explanation:
RAM and ROM are the types of memory. RAM is the active memory. The data can be read and written from RAM. While ROM is read only which meas that data or instructions on ROM cannot be changed.
The files or instructions that are needed to start up a computer are usually unchangeable as they always have to be the same. These type of instructions are stored in ROM. When he computer is turned on, the instructions needed to start the computer are loaded into the main memory from the ROM.
Hence, ROM is the correct answer.
Learn more at:
#LearnwithBrainly
Answer:
B: Hacker
Explanation:
literally anything else aren't even real things besides hacker.