1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anzhelika [568]
3 years ago
9

If reading or writing a cache line of size 64 bytes to Flash requires 2.56 μJ and DRAM requires 0.5 nJ, and if idle power consum

ption for DRAM is 1.6 W (for 8 GB), how long should a system be idle to benefit from hibernating? Assume a main memory of size 8 GB.
Computers and Technology
1 answer:
kumpel [21]3 years ago
8 0

Answer:

Total DRAM memory = 1.6 * 8 * 10^9 Bytes J/seconds = 12.8*10^9 J/s ---1

Total energy required to read or write cache-line to Flash and DRAM = 2*64*( 2.56 *10^-6+0.5 *10^-9) J = 3.277*10^-4 J---2

The time a system will be idle is 2/1 = 2.56*10^-14 seconds

Explanation:

Here, the 2 and 1 in the last step corresponds to the answers from equation equation 1 and equation 2.

You might be interested in
The most serious security threat to Bluetooth-enabled devices is ____, which occurs when a hacker gains access to the device and
Semmy [17]

The most serious security threat to Bluetooth-enabled devices is \sf\purple{bluebugging}, which occurs when a hacker gains access to the device and its functions without the owner's consent.

\large\mathfrak{{\pmb{\underline{\orange{Happy\:learning }}{\orange{.}}}}}

6 0
3 years ago
By definition, what is the process of reducing security exposure and tightening security controls?
saw5 [17]

Hardening is the technique of reducing security exposure and tightening security controls of software and network devices.

Security is a major concern, when connecting over a network. Through hardening, security of a network is protected from vulnerable activities. Hardening reduces exposures associated with security and provides tight controls for it.

Hardening is typically a collection of tools and techniques that are used to decrease vulnerability in computer software, applications, network devices and infrastructure. The main goal of hardening is to protect security by identifying and eliminating superfluous programs, applications, permissions and access, which in turn, reduces the chances that attackers and malware will gain access over the network ecosystem.

You can learn more about hardening at

brainly.com/question/27912668

#SPJ4

7 0
2 years ago
Application software can run without the presence of system software true or false ​
sesenic [268]

Answer:

false

...........

.....

8 0
3 years ago
Joe always misspelled the word calendar what function corrects the word
Lostsunrise [7]

Answer: Auto correct

6 0
4 years ago
Read 2 more answers
HELP ME ILL GIVE BRAINLY Input 50 numbers and then output the average of the negative numbers only. Write in pseudocode!
Mumz [18]

Answer:

The explanation is for 10 inputs though. You'd have to follow these steps to find input 50 numbers.

Explanation:

This is how I wrote it in the Plain English programming language which looks like pseudo-code but compiles and runs (to save you all the rest of the steps):

To run:

Start up.

Write "Enter 10 numbers separated by spaces: " on the console.

Read a reply from the console.

Loop.

If the reply is blank, break.

Get a number from the reply.

Add 1 to a count.

Add the number to a total.

Repeat.

Write "The total is: " then the total on the console.

Put the total divided by the count into an average.

Write "The average is: " then the average on the console.

Refresh the screen.

Wait for the escape key.

Shut down.

3 0
3 years ago
Other questions:
  • Paulene is using this table in Word,and she started with the cursor in the box that read “Flavor”. she then hits Alt+End,The the
    7·1 answer
  • Why is it a mistake to put e-mail address of people who don't know each other in the "to:" field
    9·2 answers
  • To display measurements on the ruler while changing column widths, hold down the ________ key while dragging the marker.
    13·1 answer
  • A company wants a recruiting app that models candidates and interviews; displays the total number of interviews each candidate r
    6·1 answer
  • Without entering into the internet cloud or intranet cloud, how many icons in the topology represent endpoint devices (only one
    6·1 answer
  • Which of the following is a technique used by hackers to identify unsecured wireless network locations to other hackers?A. Blues
    10·1 answer
  • 6 external parts of computer
    10·2 answers
  • 30 points) Suppose you are given a string containing only the characters ( and ). In this problem, you will write a function to
    14·1 answer
  • Rewrite each condition below in valid Java syntax (give a boolean expression): a. x > y > z b. x and y are both less than
    7·1 answer
  • Answer the following question in 3-4 complete sentences. Define the following terms: - registration - press - keyblock.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!