1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Valentin [98]
3 years ago
5

Write down a scratch program which:

Computers and Technology
1 answer:
antoniya [11.8K]3 years ago
4 0
What computer language?
You might be interested in
Consider two different implementations, M1 and M2, of the same instruction set. There are three classes of instructions (A, B, a
kkurt [141]

Answer:

(a) Calculate the average CPI for each machine, M1, and M2

Average CPI = Cycles per Instruction * Frequency of each  Instruction

                     = CPI * F

For Machine M1:

Cycles per Instruction/ Clocks per Instruction =  (60%)* 1 + (30%)*2 + (10%)*4

                                                                        = (0.60) * 1 + (0.30) * 2 + (0.10) * 4

                                                                          = 0.6 + 0.6 + 0.4

                                                                          = 1.6

For Machine M2:

Cycles per Instruction/ Clocks per Instruction=  (60%)*2 + (30%)*3 + (10%)*4

                                                                         = (0.60) *2 + (0.30) * 3 + (0.10) *4        

                                                                         = 1.2 + 0.9 + 0.4

                                                                          = 2.5

(b) Calculate the average MIPS ratings for each machine, M1 and M2.

MIPS rating can be found by using this formula

MIPS rating = Instruction Count / Execution Time * 10^6

                   = Instruction count  / IC X CPI * Clock cycle time * 10^6

                   = IC X Clock rate  / IC X CPI X 10^6

                   = Clock Rate/(CPI * 10^6)

MIPS rating for Machine M1:

The clock rate for M1 is 80 MHz and CPI calculated in (a) is 1.6 So:

MIPS rating = (80 * 10^6) / (1.6 * 10^6 )

                   =  80000000/ 1600000

                   =  50

MIPS rating for Machine M2:

The clock rate for M1 is 100 MHz and CPI calculated in (a) is 2.5 So:

MIPS rating = (100 * 10^6 ) / (2.5 * 10^6 )

                   =  100000000 / 2500000

                  =  40

(c) Which machine has a smaller MIPS rating?

  • M2 has a smaller MIPS rating which is 40.

Which individual instruction class CPI do you need to change, and by how much, to have this machine have the same or better performance as the machine with the higher MIPS rating.

Machine M1 has the higher MIPS rating than M2 and in order to make M2 perform better than M1, the CPI of instruction class A should be modified. Lets change the instruction class A CPI to 1 in place of 2.

Then:

Cycles per Instruction/ Clocks per Instruction= (60%)*1 + (30%)*3 + (10%)*4

                                                                       = (0.60 * 1) + (0.30 * 3) + (0.10 * 4)

                                                                       = 0.60 + 0.9 + 0.4

                                                                       = 1.9

Average MIPS rating = (100 * 10^6) / (1.9 * 10^6 )

                                   = 100000000 / 1900000

                                   =  52.6

Average MIPS rating is of M2 after changing instruction class A CPI is 52.6 which is better than the average MIPS rating of M1 which is 50.0

4 0
3 years ago
A company has a main office and 12 branch offices. The users and computers are within a single domain. All servers are Windows S
LenaWriter [7]

Answer:

The answer to this question can be given as:

To access the server, the administrator must Configure L2TP with IPsec and MS-CHAPv2.

Explanation:

In this question, the user doesn't access the server by the User name and password. The User wants to access the server by the computer-level authentication. To access the server successfully user must Configure L2TP with IPsec and MS-CHAPv2. where L2TP with IPsec stands for Layer 2 Tunneling Protocol or it is also known as Virtual private network. It is a communications protocol that allows us to move data from one network to another in the encrypted form that is used by the IPsec. MS-CHAPv2 stands for Microsoft Challenge-Handshake Authentication Protocol that is developed by Microsoft. In computing, the CHAP provides the authentication to the user or network host entity. For example, this entity may be an internet service provider. And v2 stands for security.

So to access the server successfully, the administrator must Configure L2TP with IPsec and MS-CHAPv2.

8 0
3 years ago
Compare and contrast the various options that exist for acquiring software.
Softa [21]

Answer:

   The various options that exist for acquiring software are:

  •  By developing a various custom applications so that, they can satisfied the requirements in an organization.
  •  By purchasing various software application or packages for modify the software to meet the specific requirements.
  •  Used the open source software for developing the specific information system so that, the system are acquired.
  •  Developed the in-house capabilities and skills of employee, this is the main advantage for acquiring the software.  
6 0
3 years ago
1. From where you can access save command?
Alja [10]

Answer:

1 no. ans

none of above

this ans is not 100% correct but also it help may help you

4 0
3 years ago
You are the security administrator for a bank. The users are complaining about the network being slow. It is not a particularly
bulgar [2K]

Answer:Denial of service

Explanation:Denial of service is the type of attack that is caused to the computer attacks. These attacks basically cause the circumstances such as difficulty in accessing of the website or resource, accessing particular computer system , creation of the traffic in network, This attack occurrence stops or create difficulties for the legal person to access the network .

Therefore, there is the occurrence of the Denial of service(DoS) in the bank's computer network.

3 0
3 years ago
Other questions:
  • What are two reasons for using layered protocols? what is one possible disadvantage of using layered protocols?
    13·1 answer
  • When starting a new job, the form you complete to determine how much tax to withhold from your paycheck is called the
    9·1 answer
  • How do you make a 'does not equal' symbol on the computer? you know the equal sign with a line through it..?
    6·1 answer
  • Which educational qualification would help a candidate get a job as a computer systems engineer? a.certificate
    6·1 answer
  • 50 POINTS & A FOLLOW!
    11·2 answers
  • If you created a variable called name, what data type would that value be?
    15·2 answers
  • Consider the following method, which is intended to return the number of local maximum values in an array Local maximum values a
    6·1 answer
  • How do these ideas connect?
    8·1 answer
  • ___1. my1st JavaProgram<br> A. valid <br> B. invalid
    13·1 answer
  • E. Write an algorithm to show 'How to prepare a cucumber sandwich?". ​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!