1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marrrta [24]
3 years ago
11

What is processing requirement in computer?

Computers and Technology
1 answer:
andreev551 [17]3 years ago
5 0

The following table displays the hardware specifications for Processing workers. These requirements are determined by the number of workers needed to achieve a specified range of throughput (# of GB/day).

Worker Specifications

CPU 8 core (physical)

RAM 16 GB

Network 1 Gbps

Storage Windows Temp SSD recommended

Server Physical recommended *

Expected throughput 100-150 GB/day **

* The primary reason for using physical workers is for performance. The overhead from virtualization can cause degradation in performance, particularly during text extraction and other CPU-intensive operations. If you do choose to virtualize your workers, beware of over-committing resources on the host. If you have hyper-threading enabled on the host, you may need to allocate 16 vCPUs to each worker to achieve results similar to those in the Processing performance baselines.

You might be interested in
research about the various models of intel processors from the last decade focusing on their speed and cost​
Likurg_2 [28]

The Intel announced the eighth- generation chips will offer up to 40 percent speed boost  over the previous generation.

Explanation:

The most popular Intel processors are the core i3, i5, and i7 product lines. The core i3 is entry level and core i7 processors are the powerful hyper-threaded quad-core options.

The CPU does good job in understanding and completing single tasks. A clock speed of 3.5 GHz to 4.0 GHz is considered a good clock speeding for gaming. It is useful for having good single thread performance.

Intel's prior series of 8086,80186, 80386 and 80486 microprocessors, the first P5 based microprocessor released as original Intel Pentium.

8 0
3 years ago
Two numbers are given (numbers are entered from the keyboard). If both numbers are positive, then output their sum, if both numb
AleksAgata [21]

Answer:

The program in Python is as follows:

num1 = int(input())

num2 = int(input())

if num1 >=0 and num2 >= 0:

   print(num1+num2)

elif num1 <0 and num2 < 0:

   print(num1*num2)

else:

   if num1>=0:

       print(num1**2)

   else:

       print(num2**2)

Explanation:

This gets input for both numbers

num1 = int(input())

num2 = int(input())

If both are positive, the sum is calculated and printed

<em>if num1 >=0 and num2 >= 0:</em>

<em>    print(num1+num2)</em>

If both are negative, the products is calculated and printed

<em>elif num1 <0 and num2 < 0:</em>

<em>    print(num1*num2)</em>

If only one of them is positive

else:

Calculate and print the square of num1 if positive

<em>    if num1>=0:</em>

<em>        print(num1**2)</em>

Calculate and print the square of num2 if positive

<em>    else:</em>

<em>        print(num2**2)</em>

3 0
3 years ago
What is a malicious actor essentially looking for when attempting a network attack?
ahrayia [7]

Answer:

information of personnel

Explanation:

4 0
3 years ago
Which type of firewall policy calls for a firewall to deny all traffic by default?
charle [14.2K]
Restrictive policy is a kind of policy calls for a firewall to contradict all traffic by default. The first rule denies all traffic on any service and using any port. To permit a specific type of traffic, a new rule must be placed ahead of the deny all rule. A firewall should enforce the overall policy recognized by the network administrator. Enforcement is controlled mainly over setting up packet filtering rules which is a rule base comprises a set of these rules. 
3 0
3 years ago
Which one of these choices best describes what exec() does:a) It replaces the current process with a new oneb) It executes a new
Dimas [21]

Answer:

Option b It executes a new process, which runs at the same time as the parent

Explanation:

The exec is one of the Java Runtime methods which is used to create a new process and run it as an separate process. Exec method executes the string command that we place inside the bracket. For example,

Process proc = Runtime.getRuntime().exec("Notepad.exe");

The statement above offers a convenient way to open the another computer software such as Notepad when running the program.  

3 0
3 years ago
Other questions:
  • Which cloud computing service model gives software developers access to multiple operating systems for testing?
    5·1 answer
  • A custom date format set for a date/time field that contains the symbols mmm/dd/yy would display the date as ____.
    12·1 answer
  • There is no way to track your smartphone once you lost it, true or false?
    15·2 answers
  • Somebody who is good at this stuff, please halp meh ;-;
    6·1 answer
  • Describe how asymmetric encryption is used to send a message from User A to User B that assures data confidentiality, authentica
    9·1 answer
  • 10 points!
    12·1 answer
  • What games do you play?<br><br><br> Be sure not to report any answers!
    5·1 answer
  • In binary, the second digit from the right is multiplied by the first power of two, and the _____ digit from the right is multip
    10·2 answers
  • Assume we are using the simple model for floating-point representation as given in this book (the representation uses a 14-bit f
    7·1 answer
  • A __________is a software program that appears to be a physical computer and executes programs as if it were a physical computer
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!