Answer:
The answer is "Option c".
Explanation:
Computer simulation, use of a machine to simulate a system's vibration signals by another modeled system's behaviors. A simulator employs a computer program to generate a mathematical model or representation of a true system. It usually gives a lot of simplifications concerning the physical image or system that is modeled, so this statement describes the limitation of using a computer simulation in modeling a real-world object or process.
Clock rate is simply the number of clock cycles a computer can perform in a second
Computer B should be designed to have a clock rate of 4GHz
The given parameters are:
--- time on computer A
--- computer A clock
--- time on computer B
Start by calculating the period of computer A
So, we have:
Rewrite as:
So, we have:
Next, we calculate the required number of clocks on computer A
So, we have:
Computer B requires 1.2 times as many clock cycles as A.
So, we have:
This gives
The clock period of computer B is:
So, we have:
Lastly, the clock rate of computer B is:
Express in gigahertz
Hence, computer B should be designed to have a clock rate of 4GHz
Read more about clock rates at:
Answer:
4 GHz
Explanation:
Time taken for computer A to execute the program is = 10 secs
Given frequency of the clock for computer A is = 2 GHz
We know Clock period = 1 / frequency = 1 / 2 * 109 = 0.5 ns
Number of clocks requried to execute the program in computer A is
= Total Execution time / clock period = 10 / 0.5 * 10-9 = 20 * 109 clocks
Given Time taken for computer B to execute the program is = 6 secs
Given computer B requries 1.2 times as many clocks as computer A
implies number of clocks to execute program in computer B = 1.2 * 20 * 109 = 24 * 109
Here clock period of computer B = Total execution time / number of clocks
= 6 secs / 24 * 109
= 0.25 ns
Hence clock rate = frequency is = 1 / clock period = 1 / 0.25 ns = 4 GHz.
Answer and Explanation :
A man middle attack is the attack which takes place when there is a communication between the two system. This mostly happen whenever there is online communication between two systems it may be anything as email chatting etc.
It is very difficult to protect from a man middle attack but there is a technology
known as PKI technology which is used for protection from man middle attack
access buffer
output buffer
transmission buffer
none of the above
Answer: Output buffer
Explanation:
Each packet switches contain multiple links which are attached to it and for individually attached link the output buffer basically store packets. Then, the router send these packets into multiple links.
In output buffer, if the packets are transmitted into the links but it finds that the link is busy with the another packet for transmission. Then, that particular packet needs to be wait in output buffer.
Therefore, the output buffer is the correct option.
Answer:
customer-serious orientation
Explanation:
Customer-serious orientation can be defined as the willingness to put a customer’s needs above ones own needs and to go beyond a job description to achieve customer satisfaction.
This ultimately implies that, a customer-serious oriented business firm or company puts the needs, wants and requirements of its customers first without considering their own needs in a bid to satisfy and retain them.
Hence, customer-serious orientation requires the employees working in an organization to show and demonstrate positive attitudes and behaviors at all times.
Answer:
He should remove any removable devices from the PC , change the boot device to USB or CD drive and insert the installation disk or a created ISO USB file to install
Explanation:
The advantages and the disadvantages of the communication with the used of the technology are: Quickly communicate and the lack of privacy.
The term communication refers to the exchange of thoughts, ideas, and messages that are shared between two or more people. Without language, a person can survive, but without communication, no one can survive. Communication is divided into two categories, such as interpersonal and intrapersonal.
Advantages of the communication with the used of the technology are:
Disadvantages of the communication with the used of the technology are:
Hence, the significance of the communication are the aforementioned.
Learn more about on communication, here:
#SPJ2
Answer:
ADVANTAGES:
First, the evolution of technology is beneficial to humans for several reasons. At the medical level, technology can help treat more sick people and consequently save many lives and combat very harmful viruses and bacteria.
2-Technology has also increased the productivity of almost every industry in the world. Thanks to technology, we can even pay with bitcoins instead of using banks
DISADVANTAGES:
1-Lack of Privacy. You might think that a quick text or IM offers more privacy than a telephone call in a crowded room. ...
2-Distraction from Real Life. ...
3-Potential for Misunderstanding. ...
4-Decline of Grammar and Spelling...
5- Near people are far and far people are near through communication technology. we have no time to sit with our relatives but constantly communicate far away people . I think this is biggest disadvantage
Explanation: