Answer: B. hummer
Explanation:
Given the array :
Given the arra
("explorer", "testa", "hummer", "corvette", "civic", "mustang")
Array indexing usually begins from 0
That is ; the first element in the array is indexed as being in position 0
Using the given array as an example :
Index ____ element
0 ______ explorer
1 _______ tester
2 _______hummer
3 _______ corvette
4 _______ civic
5 _______ mustang
Hence, element in index 2 of the array is hummer
Answer:
A. Static IP address have been configured.
Explanation:
A network is an interconnection of network devices for communication to occur. A network comprises of end devices and intermediate network devices.
End devices are the sources and destinations of data transmission, while intermediate devices are the devices that makes communication of data possible like routers and switches. Examples of end devices are servers and workstations (computers, smartphones etc.).
A server in a network is a device that provides special services to workstations or clients. The IP addresses of servers must be known, that is, a static IP address must be configured on a server. Examples of server protocols are DNS, TFTP, FTP, DHCP etc.
Answer:
a) the average CPI for machine M1 = 1.6
the average CPI for machine M2 = 2.5
b) M1 implementation is faster.
c) the clock cycles required for both processors.52.6*10^6.
Explanation:
(a)
The average CPI for M1 = 0.6 x 1 + 0.3 x 2 + 0.1 x 4
= 1.6
The average CPI for M2 = 0.6 x 2 + 0.3 x 3 + 0.1 x 4
= 2.5
(b)
The average MIPS rate is calculated as: Clock Rate/ averageCPI x 10^6
Given 80MHz = 80 * 10^6
The average MIPS ratings for M1 = 80 x 10^6 / 1.6 x 10^6
= 50
Given 100MHz = 100 * 10^6
The average MIPS ratings for M2 = 100 x 10^6 / 2.5 x 10^6
= 40
c)
Machine M2 has a smaller MIPS rating
Changing instruction set A from 2 to 1
The CPI will be increased to 1.9 (1*.6+3*.3+4*.1)
and hence MIPS Rating will now be (100/1.9)*10^6 = 52.6*10^6.
Answer:
yo! but I'm a ex-mobile legends
Answer:
The "service password-encryption" global configuration command encrypts passwords configured before and after the command is issued.
Explanation:
A switch is an intermediate network device that is used to transfer frames to nodes on its collision domain. It operates in the Data-link layer of the OSI model.
Switches uses media address control (MAC) table, containing the MAC addresses of the nodes in the network, to determine the destination of nodes.
In the global configuration mode in a switch, the password and other protocols are configured. The service password-encryption command in the global execution mode encrypts passwords configured before and after the command.