Answer:
a) the average CPI for machine M1 = 1.6
the average CPI for machine M2 = 2.5
b) M1 implementation is faster.
c) the clock cycles required for both processors.52.6*10^6.
Explanation:
(a)
The average CPI for M1 = 0.6 x 1 + 0.3 x 2 + 0.1 x 4
= 1.6
The average CPI for M2 = 0.6 x 2 + 0.3 x 3 + 0.1 x 4
= 2.5
(b)
The average MIPS rate is calculated as: Clock Rate/ averageCPI x 10^6
Given 80MHz = 80 * 10^6
The average MIPS ratings for M1 = 80 x 10^6 / 1.6 x 10^6
= 50
Given 100MHz = 100 * 10^6
The average MIPS ratings for M2 = 100 x 10^6 / 2.5 x 10^6
= 40
c)
Machine M2 has a smaller MIPS rating
Changing instruction set A from 2 to 1
The CPI will be increased to 1.9 (1*.6+3*.3+4*.1)
and hence MIPS Rating will now be (100/1.9)*10^6 = 52.6*10^6.
Answer:
log base 3a= -0.631.log a/3 base 3
Now, -log m= log 1/m
hence,
log base 3a= 0.631.log 3/a base 3
log base 3a/log 3/a base 3 =0.631
log base 3 ( a.3/a) =.631 since, log m/logn =log n(m)
log base 3 3=0.631
Hence, answer is log base 3 3=0.631
Explanation:
Please check the answer section.
Answer
1. Assemble his team
2. Find reason for breach
3. Evaluate what was lost
4. Ensure password change
Explanation:
In case of a suspected breach, the Chief information security officer should first of all assemble his incidence response team. This team should have representatives from all areas of the organization.
Then the reason for the breach and how access was gained has to be found out. An evaluation of what has been lost in the breach would be carried out and it's likely impact on the company.
In case credentials were stolen the CISO has to ensure that the employees change passwords. Also he has to notify all the necessary parties about the breach.
The CISO has to ensure that all employees are trained properly on security and they comply to security policies.
The first one is problem solver, the second one is Innovative, and the third one is logical.