Answer:
3.1 ns ; 1.25 ; 3.097
Explanation:
Given :
IF, 3 ns;
ID, 2.5 ns;
EX, 2 ns;
MEM, 3 ns;
WB, 1.5 ns.
Use 0.1 ns for the pipelineregisterdelay
maximum time required for MEM = 3 ns
Pipeline register delay = 0.1 ns.
Clock cycled time of the pipelined machine= maximum time required + delay
3ns+0.1 ns = 3.1 ns
2.) for stall after every 4 instruction :
CPI of new machine :
(1 + (1 /4)) = 1 + 0.25 = 1.25
3.)
The speedup of pipelined machine over the single-cycle machine is given by :
Average time per instruction of single cycle ÷ average time per instruction of pipelined
Clock time of original machine = 12ns
Ideal CP1 = 1
CPI of new machine = 1.25
Clock period = 3.1 ns
(12 * 1) / (1.25 * 3.1) = 12 / 3.875
= 3.097
D. Speed up will equal the number of stages in the machine
Answer:
Honeytoken
Explanation:
Honeytokens (aka honey traps or honeypots) may be described as bogus or dummy IT resources which are created or placed in a system or network for the sole purpose of attracting the attention of cyber-criminals and being attacked. These might be servers, applications, complete systems or datasets which are placed online (via the public internet, or a public-facing gateway to a private network), in order to attract cyber-attackers.
Honeytokens may be specifically defined as pieces of data which on the surface look attractive to potential attackers, but actually have no real value – at least, not to the attacker. For the owners of the tokens (i.e. the people who set the trap), they can be of great value, as they contain digital information which is monitored as an indicator of tampering or digital theft.
Answer:
Used the command syntax; awk -F":" '{ print "username: " $<number location> "\t\tuid:" $<number location> }' <target folder>
Explanation:
Linux operating system is a fast open-source computer platform for programmers and network administrators. Its system is arranged in a hierarchical tree structure with the root represented as "/" (for absolute path).
The passwd is a folder in the Linux OS that holds the login details of all users in the system network. The 'awk' is one of the commands used to get information from a file in a folder. It prints out the result by specifying the location of the values (like the username and user id) as a variable (with prefix '$') and then the target folder.
Computational thinking- the thought processes involved in formulating a problem and expressing its solution(s) in such a way that a computer—human or machine—can effectively carry out. Computational Thinking is an iterative process based on three stages.
Problem solving process- The process of working through details of a problem to reach a solution. Problem solving may include mathematical or systematic operations and can be a gauge of an individual's critical thinking skills.
Data- facts and statistics collected together for reference or analysis.
Information- facts provided or learned about something or someone.
Algorithm- a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
Aggregate data- aggregate data are data combined from several measurements. When data are aggregated, groups of observations are replaced with summary statistics based on those observations. In a data warehouse, the use of aggregate data dramatically reduces the time to query large sets of data.
Discovery Data- in the context of IT, is the process of extracting actionable patterns from data. The extraction is generally performed by humans or, in certain cases, by artificial intelligence systems.