Answer:
System calls = 500000
Explanation:
Instructions that a computer can execute = 1 billion instructions/sec
Instructions that a system call takes including the trap and context switching = 1000 instructions
When half of the CPU time is on application, n system calls can be executed in 1 second.
Therefore we'll get an equation as following.
1000 * n = 0.5 * 1000000000
n = 0.5 * 1000000000 / 1000
n = 500000
System calls = 500000
Answer:
<u>D. In DMA, interrupt is sent when the task is completed</u>
Explanation:
Note, the term Direct Memory Access simply refers to a computer feature that allows hardware subsystems to directly access the main system memory of a computer, without any the aid of the central processing unit (CPU).
It is a fact that while the transfer process is ongoing, an interrupt (interrupt signal) is not sent until when the task is completed.
Answer:
count_p = 0
count_n = 0
total = 0
while True:
number = int(input("Enter an integer, the input ends if it is 0: "))
if number == 0:
break
else:
total += number
if number > 0:
count_p += 1
elif number < 0:
count_n += 1
print("The number of positives is: " + str(count_p))
print("The number of negatives is: " + str(count_n))
print("The total is: " + str(total))
print("The average is: " + str(total / (count_p + count_n)))
Explanation:
Initialize the variables, count_p represens the number of positives, count_n represents the number of negatives, and total represents the total of the numbers
Create a while loop iterates until the user enters 0. If the number is not 0, then add it to the total. If the number is greater than 0, increase count_p by 1. If the number is smaller than 0, increase count_n by 1.
When the loop is done, print the count_p, count_n, total, and average
Answer:
a) Generate a new public and private key
Explanation:
You encrypt a message using the recipient's public key and the recipient decrypts the message using his own private key. Only the public key can be known by an external agent. The private key is for the individual and is not expected to be shared. In the event that the recipient cannot decrypt the message, it is unsafe to send one's private key to him. He does not even need one's private key to decrypt the message, he needs his own private key.
The best thing to do is to generate another means of security by generating new public and private key so that the sender encrypts the message with the new public key and the receiver decrypts it using his new private key.
Option B is wrong because, if the encryption is removed, the aim, which is to secure the message from intruders is not achieved.