Answer:
Check the explanation
Explanation:
CPI means Clock cycle per Instruction
given Clock rate 600 MHz then clock time is Cー 1.67nSec clockrate 600M
Execution time is given by following Formula.
Execution Time(CPU time) = CPI*Instruction Count * clock time = 
a)
for system A CPU time is 1.3 * 100, 000 600 106
= 216.67 micro sec.
b)
for system B CPU time is 
= 333.33 micro sec
c) Since the system B is slower than system A, So the system A executes the given program in less time
Hence take CPU execution time of system B as CPU time of System A.
therefore
216.67 micro = =
Instructions = 216.67*750/2.5
= 65001
hence 65001 instruction are needed for executing program By system B. to complete the program as fast as system A
Tables are used to display information in a more arranged and organized manner.
Various ways of adding a row in an already existing table are:
1) By drawing a row in the table using the draw option.
2) By using the insert option under the Table Tools tab.
3) By designing the table with an added row using the Design tab.
<u>Explanation:</u>
In the insert option, go to the extreme right corner. There appears an option of Draw Table. Draw another row and it gets added.
This tab contains two tabs, Design and Layout that enable you to rapidly arrange your table, embed or erase lines and sections, set the arrangement for cells, and organization the typography of the content in your table.
Thus, a table and its capacity are built up from here on and open for designing.
Answer:
Following are the code to this question:
please find the attached file.
Explanation:
In this code, four class "novels, magazines, technical journals, and textbooks", is defined, in which it holds their respective default constructor and the get and set method to hold the string and integer value, and in the book class the main method is defined, that creates its object and a switch to for search value and print its value.
Answer: (A) full backup
Explanation: A backup strategy is a term used to describe the various effective approach engaged in creating a backup for data or information.
A FULL BACK UP IS THE VARIOUS APPROACH AND SYSTEMS PUT IN PLACE BY A COMPUTER USER OR AN INFORMATION TECHNOLOGY EXPERT IN ORDER TO CREATE AN ADDITIONAL SAMPLE OR COPY OF AN INFORMATION OR A DATA IN S SINGLE BACKUP.
Answer:
To establish the BYOD policy is the correct answer to the following question.
Explanation:
<u>Implementation of the BYOD(Bring Your Own Device)</u>:
- Firstly, set you objectives and establish it.
- Then, you have to decide and tell your employees that what types of devices are only allowed in your organization.
- Then, establish your security policies related to the BYOD policy.
- Then, give good training by you or by the IT professionals to your employees.
- Finally, if the employee are leaving your organization then, you have to remove those employees from the BYOD policy by which they cannot access your company's informations.