web pages with personal or biograpic information are called ​

Answers

Answer 1

Answer:

Web pages with personal or biographic information are called. a. Social Networking sites. c.

Explanation:


Related Questions

(Find the number of days in a month) Write a program that prompts the user to enter the month and year and displays the number of days in the month. For example, If the user entered month 2 and year 2012, the program should display that February 2012 has 29 days. If the user entered month 3 and year 2015, the program should display that March 2015 has 31 days.

Answers

it would be a table program. you can add a table and put your data into the table

Which of the following is an example of joint problem solving?

Answers

Explanation:

There is a high degree of informality to these relationships, which are focused on information sharing, joint-problem solving and joint operations.

A hallmark of most of these processes is their informality, whether through information sharing, joint problem solving or joint operations.

Global joint problem-solving team. In addition to requesting a division of labour, the Global Task Team recommendations called upon the World Health Organization (WHO), UNICEF, the United Nations Population Fund (UNFPA), the United Nations Development Programme (UNDP), the World Bank, the UNAIDS Secretariat and the Global Fund to take the lead in and establish the joint United Nations system-Global Fund problem-solving team by July # in order to support efforts that address implementation bottlenecks at the country level

Probability of theft in an area is 0.03 with expected loss of 20% or 30% of things with probabilities 0.55 and 0.45. Insurance policy from A costs $150 pa with 100% repayment. Policy with B, costs $100 pa and first $500 of any loss has to be paid by the owner. Which data mining technique can be used to choose the policy?

Answers

Answer:

Decision trees

Explanation:

Decision trees mainly include categorization and estimation. It is often used as a measure of selection. This also encourages the usage and choice of particular data within the overall structure.

In the given situation, we should choose Policy A has cost $150 as it has 100% repayment while on the other hand Policy B has cost $100 and the first $500 of loss would be paid by the owner

So for choosing the policy,  we use the decision tree data mining technique as we have to take the decision with respect to minimizing the cost

Data mining technique which can be used to choose the policy is decision tree.

The data mining technique that can be used are as follows,

Categorization and estimate are the two major functions of decision trees,Decision tree frequently used as a selection criterion. This promotes the use and selection of specific data within the broader framework.

According to given data,

We should pick Policy A, which costs $150 and has a 100% payback rate.Whereas, the owner would be responsible for the first $500 of loss under Policy B, which costs $100.

Here choosing the correct policy, decision tree is used.

Learn more: brainly.com/question/15247828

is brainly down? Cant search anything

Answers

You need to have WIFI

Identify a logical operation (along
with a corresponding mask) that, when
applied to an input string of 8 bits,
produces an output string of all 0s if and
only if the input string is 10000001.​

Answers

Answer: Provided in the explanation section

Explanation:

The Question says;

Identify a logical operation (along

with a corresponding mask) that, when

applied to an input string of 8 bits,

produces an output string of all 0s if and

only if the input string is 10000001.​

The Answer (Explanation):

XOR, exclusive OR only gives 1 when both the bits are different.

So, if we want to have all 0s, and the for input only 10000001, then we have only one operation which satisfies this condition - XOR 10000001. AND

with 00000000 would also give 0,

but it would give 0 with all the inputs, not just 10000001.

Cheers i hope this helped !!

Two of the most fundamental functions for dealing with interprocess communication are read() and write(). Consider the following otherwise valid C program:int r, pipeFDs[2];
char message[512];
pid_t spawnpid;

pipe(pipeFDs);
spawnpid = fork();

switch (spawnpid)
{
case 0:
close(pipeFDs[0]); // close the input file descriptor
write(pipeFDs[1], "hi process, this is the STUFF!!", 21);
break;

default:
close(pipeFDs[1]); // close output file descriptor
r = read(pipeFDs[0], message, sizeof(message));
printf("Message received from other: %s\n", message);
break;
}

Select each of the following answers that is correct. CAN BE MULTIPLE CHOICES...
(1) The read() call may block until data becomes available
(2) When the read() call returns, this one call will return all of the data that was sent through the pipe, which is different behavior than if this was a socket
(3) If the read() call blocks, the process will be suspended until data arrives
(4) The write() call will return before all of the data has been written, if the corresponding read() call blocks mid-transfer
(5) Pipes can fill, which will cause the write() call to block until the read() call is able to read data from the pipe

Answers

Answer: Provided in the explanation section

Explanation:

int r, pipeFDs[2];

char message[512];

pid_t spawnpid;

pipe(pipeFDs);

spawnpid = fork();

switch (spawnpid)

{

case 0:

close(pipeFDs[0]); // close the input file descriptor

write(pipeFDs[1], "hi process, this is the STUFF!!", 21);

break;

default:

close(pipeFDs[1]); // close output file descriptor

r = read(pipeFDs[0], message, sizeof(message));

printf("Message received from other: %s\n", message);

break;

}

Observation of the program:

The read() call may block until data becomes available If the read() call blocks, the process will be suspended until data arrives Pipes can fill, which will cause the write() call to block until the read() call is able to read data from the pipe

⇒ Therefore,Option 1,3 and 5 correct

Cheers i hope this helped !!!

Maya wrote a program and forgot to put the steps in the correct order. Which step does Maya need to review? Pattern following Planning Segmenting Sequencing

Answers

Answer:

Sequencing

Explanation:

Answer:

SEQUENCING

Explanation:

Chapter 15 Problem 6 PREVENTIVE CONTROLS Listed here are five scenarios. For each scenario, discuss the possible damages that can occur. Suggest a pre-ventive control. a. An intruder taps into a telecommunications device and retrieves the identifying codes and personal identification numbers for ATM cardholders. ( The user subsequently codes this information onto a magnetic coding device and places this strip on a piece of cardboard.) b. Because of occasional noise on a transmission line, electronic messages received are extremely garbled. c. Because of occasional noise on a transmission line, data being transferred is lost or garbled. d. An intruder is temporarily delaying important strategic messages over the telecommunications lines. e. An intruder is altering electronic messages before the user receives them.

Answers

Answer: seen below

Explanation:

There are various solution or ways to go about this actually. In the end, curtailing this is what matters in the end.

Below i have briefly highlighted a few precise way some of this problems can be solved, other options are open for deliberation.

A. Digital encoding of information with the calculation being changed occasionally, particularly after the frameworks advisors have finished their employments, and the framework is being used.

Which can also mean; The money could be withdrawn form the ATM. preventive Control is password to be changed periodically and regularly.

B. Noise on the line might be causing line blunders, which can bring about information misfortune. Reverberation checks and equality checks can assist with recognizing and right such mistakes.

C. If information is being lost, reverberation checks and equality checks ought to likewise help; notwithstanding, the issue might be that an intruder is blocking messages and altering them. Message arrangement numbering will assist with deciding whether messages are being lost, and in the event that they are maybe a solicitation reaction strategy ought to be executed that makes it hard for gatecrashers to dodge.

D. In the event that messages are being postponed, a significant client request or other data could be missed. As in thing c, message arrangement numbering and solicitation reaction methods ought to be utilized.

E. Messages modified by intruders can have an extremely negative effect on client provider relations if orders are being changed. For this situation, information encryption is important to keep the gatecrasher from perusing and changing the information. Additionally, a message succession numbering strategy is important to ensure the message isn't erased.

cheers i hope this was helpful !!

write the following function so that it returns the same result, but does

not increment the variable ptr. Your new program must not use anysquare brackets, but must use an integer variable to visit each double in the array. You may eliminate any unneeded variable.

double computeAverage(const double* scores, int nScores)

{
const double* ptr = scores;
double tot = 0;
while (ptr != scores + nScores)

{
tot += *ptr; } ptr++;

}
return tot/nScores;

b. Rewrite the following function so that it does not use any square brackets (not even in the parameter declarations) but does use the integervariable k. Do not use any of the functions such as strlen, strcpy, etc.

// This function searches through str for the character chr.
// If the chr is found, it returns a pointer into str where
// the character was first found, otherwise nullptr (not found).

const char* findTheChar(const char str[], char chr)

{
for(intk=0;str[k]!=0;k++)
if (str[k] == chr)

}

return &str[k];
return nullptr;
}

c. Now rewrite the function shown in part b so that it uses neither square brackets nor any integer variables. Your new function must not use any local variables other than the parameters.

Answers

Answer:

Explanation:

a.  

// Rewriting the given function without using any square brackets

double computeAverage(const double* scores, int nScores)

{

const double* ptr = scores;

double tot = 0;

int i;//declaring integer variable

for(i=0;i<nScores;i++)

{

//using an integer variable i to visit each double in the array

tot += *(ptr+i);

}

return tot/nScores;

}

b.

// Rewriting the given function without using any square brackets

const char* findTheChar(const char* str, char chr)

{

for(int k=0;(*(str+k))!='\0';k++)

{

if ((*(str+k)) == chr)

return (str+k);

}

return nullptr;

}

c.

//Now rewriting the function shown in part b so that it uses neither square brackets nor any integer variables

const char* findTheChar(const char* str, char chr)

{

while((*str)!='\0')

{

if ((*str) == chr)

return (str);

str++;

}

return nullptr;

}

Universal Containers (UC) is currently live with Sales Cloud and in the process of implementing Service Cloud. UC wants to create a sandbox to test its Service Cloud implementation with real Sales Cloud data. Which three Sandbox types can be used to accomplish this? Choose 3 answersA. Administrator SandboxB. Partial Copy SandboxC. Full SandboxD. Developer k Pro SandboxE. Test Sandbox

Answers

Answer:

B. Partial Copy Sandbox

C. Full Sandbox

D. Developer k Pro Sandbox

Explanation:

In this scenario Universal containers wants to implement a service cloud and test with real Sales Cloud data.

Service cloud is defined a system that allows automation of various customer service functions. It can listen to customers via different social media platforms and direct customers to agents that can solve their problems.

Sandbox is a testing environment that is isolated and allows for running of programs without affecting the application.

To test service cloud implementation with real data we use the following 3 sandboxes:

- Partial copy sandbox: copies only relevant data to test configurations with real data.

- Full Sandbox: makes a replica of data by copying all data such as attachments, metadata, and object records.

- Developer K pro sandbox: is used by developers to test software in an isolated environment and can use large data sets. It includes configuration data (metadata)

Managers can use __ software to discuss financial performance with the help of slides and charts

Answers

Answer:

presentation

Explanation:

Software like Google Slides and Microsoft Powerpoint can be utilized to present financial performances through the use of slides and charts.

Consider a load-balancing algorithm that ensures that each queue has approximately the same number of threads, independent of priority. How effectively would a priority-based scheduling algorithm handle this situation if one run queue had all high-priority threads and a second queue had all low-priority threads

Answers

Answer and Explanation:

Consider giving greater priority to both the queue contains the national priority comment section as well as, therefore, first method the thread throughout this queue.If the item from either the major priority queue becomes decoupled, if the balancing between some of the number of comments in some of these two queues becomes disrupted, instead decouple one thread from either the queue comprising the low-value thread as well as position that one in the queue with the highest - priority loop to match the number of connections in such 2 queues.Whenever a new thread arrives with some kind of proper description, a friendly interface could've been introduced to just the queue contains fewer threads to achieve stability.

Therefore, the load-balancing requirements for keeping about the same number of threads would be retained and the meaningful matter of top priority thread would also be retained.

Based on the information given, it is important to give higher priority to the queue that contains the high priority thread.

Also, once an element from the high priority queue is dequeued, then dequeue one thread from the queue containing low priority thread and this will be enqueued into the queue having high priority thread in order to balance the number of threads.

Since the priority queue automatically adjusts the thread, hence the removal of the thread from one priority queue to another is not a problem.

Learn more about threads on:

https://brainly.com/question/8798580

Suppose that class OrderList has a private attribute double cost[100] which hold the cost of all ordered items, and a private attributes int num_of_items which hold the number of items ordered. For example, if num_of_items is 5, then cost[0], cost[1], ..., cost[4] hold the cost of these 5 items. Implement the member function named total_cost which returns the total cost of this OrderList.

Answers

Answer:

OrderList.java

public class OrderList {    private double cost[];    private int num_of_items;        public OrderList(){        cost = new double[100];    }    public double total_cost(){        double total = 0;        for(int i=0; i < num_of_items; i++){            total += cost[i];        }        return total;    } }

Main.java

public class Main {    public static void main(String[] args) {        OrderList sample = new OrderList();        double totalCost = sample.total_cost();    } }

Explanation:

Firstly, define a class OrderList with two private attributes, cost and num_of_items (Line 1-3). In the constructor, initialize the cost attribute with a double type array with size 100. Next, create another method total_cost() to calculate the total cost of items (Line 9-15). To implement the total_cost member function, create an OrderList instance and use that instance to call the total_cost() and assign it to totalCost variable.

In the lab, you defined the information systems security responsibility for each of the seven domains of a typical IT infrastructure. In which domain are you most likely to find service provider service level agreements (SLAs), managed security services, monitoring, and reporting?

Answers

Answer:

LAN/WAN domain

Explanation:

This is the boundary between trusted adn untrusted zones. All SLA's, managed security services, their monitoring and reporting is done by this domain.

In 1987, Congress passed the Computer Security Act (CSA). This was the first law to address federal computer security. Under the CSA, every federal agency had to inventory its IT systems. Agencies also had to create security plans for those systems and review their plans every year.
A. True
B. False

Answers

Answer:

A.) True is the answer hope it helps

The Nigerian 4-6-9 scam refers to a fraudulent activity whereby individuals claiming to be from a foreign country will promise a victim large sums of money for assisting them in secretly moving large sums of money.

a. True
b. False

Answers

Answer:

b. False

Explanation:

The system of fraud is called 4-1-9 scam. And yes, victims are always promised large sum of money to secretly help in moving a large sum of money.

When law enforcement becomes involved, the need may arise to freeze systems as part of the evidence. There is also the likelihood that the incident will become known publicly. Do you think these issues play a significant part in the decision to involve law enforcement? Why or why not? Can you name some situations in which you believe that large organizations have decided not to involve law enforcement?

Answers

Answer:

Costs will cover a need for more customer data. The further explanation is given below.

Explanation:

It's the greatest problem for almost every company to provide the data with security. This is possible for highly trained practitioners and the technical staff to take charge of it. Complicated technologies would have been going to run together again to withstand these types of jobs.Such problems play a major part in the decision-making process affecting the law enforcement authorities to locate the suspects to strengthen the organization.To do something like this, there seem to be a lot of other good initiatives out there doing it.

There have been some cases in which major corporations have chosen not to include law enforcement:

There are many more electronic corruption going on, including money robbery, asset fraud, as well as machine assaults. In such a bigger case, numerous institutions, such as large-scale ones, have gone through these circumstances to evaluate law enforcement to come to terms with cybersecurity.

Seth would like to make sure as many interested customers as possible are seeing his business’s website displayed in their search results. What are a few things he could pay attention to in order to achieve this?

Answers

Answer:

Hi! Make sure that the website has a few things. Proper Keywords, the pages have the proper tags, a form on the website, contact information, CIty State, Etc., Then a phone number. Social media icons that link properly to the social media pages.

Explanation:

What is a large public computer network through which computers can exchange information at high speed?​

Answers

Answer:

Server

Explanation:

The Question is vauge, but I believe a Server is the word you're looking for. Computer Network could mean various things, in this case im going to assume that by Network, its saying Server. As a server is what allows for high speed interactions between a host computer and a client computer.

Write an INSERT statement that adds these rows to the Invoice_Line_Items table:
invoice_sequence: 1 2
account_number: 160 527
line_item_amount: $180.23 $254.35
line_item_description: Hard drive Exchange Server update
Set the invoice_id column of these two rows to the invoice ID that was generated
by MySQL for the invoice you added in exercise 4.

Answers

Answer:

Insertion query for first row :

INSERT into Invoice_Line_Items (invoice_sequence, account_number, line_item_amount, line_item_description) Values (1, 160, '$180.23', "Hard drive Exchange");

Insertion query for second row :

INSERT into Invoice_Line_Items (invoice_sequence, account_number, line_item_amount, line_item_description) Values (2, 527, '$254.35', "Server update");

Explanation:

* In SQL for insertion query, we use INSERT keyword which comes under DML (Data manipulation Language).

* Statement is given below -

INSERT into Table_name  (column1, column2, ....column N) Values (value1, value2, .....value N);

* With the use of INSERT query we can insert value in multiple rows at a same time in a table which reduces our work load.

A/an ____ file saves a workbook as a comma-delimited text file for use on another windows operating system??

A. XPS
B. TXT
C. ODS
D. CVS

Answers

Answer:

The correct option is D

D) CVS

Explanation:

A CVS file saves a workbook as a comma-delimited text file for use on another windows operating system. It ensures that line breaks, tab characters and other characteristics are interpreted correctly.

A CVS file stands for Comma Separated Value file, which basically allows the data to be saved in tabular format. However they differ from other spreadsheet file types because you can only have a single sheet in a file. Moreover, you cannot save cell, column or row in it.

Paul has opened a bespoke tailoring shop. He wants to work online to keep a database of all his customers, send emails when garments are ready, create designs, and maintain financial records using software. Which productivity suite should he consider?

a. Prezi, G suite
b. G suite, Zoho
c. OpenOffice, G suite
d. Zoho, Apple iWork

Answers

Answer:

c. OpenOffice, G suite

Explanation:

The main advantage of OpenOffice is that it is free and obviously keeps your costs down. It has a lot of features that can help Paul (and really anyone else). It offers decent word processing, spreadsheets, databases and graphics, which can cover most, if not all, of Paul's needs.  

Google's G Suite also offers cheap plan's that can satisfy Paul's needs regarding emails, CRM features and cloud storage. Even though it is not free, Paul would probably need only the most basic plan at just $6 per month.

The productivity suite Paul should consider is OpenOffice. Therefore, the correct answer is option C.

The primary benefit of OpenOffice is that it is cost free, which obviously lowers your expenses. Paul can benefit mostly from its many features. The majority if not all of Paul's demand may be met by its decent word processing, spreadsheets, databases, and graphical features.  

Therefore, the correct answer is option C.

Learn more about the OpenOffice here:

https://brainly.com/question/4463790.

#SPJ6

Advanced Sounds is engaging in a full upgrade of its Windows Server 2003 network to Windows Server 2008. The upgrade includes using Windows Server 2008 Active Directory. Advanced Sounds has pioneered many technological innovations and is very concerned about keeping its network and computer systems secure. Advanced Sounds Information Technology (IT) Department hires you to help them implement Windows Server 2008 Active Directory. Assume the following:
All email servers have been consolidated back in the New York City Complex.
Most all the other applications running on Windows Servers are distributed at all sixteen locations.
Each location at minimum has a file server, a print server and a local application server.
All locations have adequate Wide Area network connections with available capacity; 10 Mbps links
The New York location has enough network capacity to serve all 16 locations.
There are 500 people at the New Your City complex.
There are 200 people at the Quebec City location and 200 at the Montreal location.
There are 40-50 people at each outlet store.
Advanced Sounds IT Department has formed a small installation planning committee consisting of the IT server operations manager, two system programmers, the current Active Directory administrator, and you. After the first meeting they have asked you to prepare a small report to address the following questions:
A. What information is required as input to the initial installation involving Active Directory? a=
B. How many Active directory servers do you propose?
C. Where will the Active directory server(s) be located?

Answers

Answer:

cs

Explanation:

Using MARS/MIPS
A) Write a program which increments from 0 to 15 and display results in Decimal on the console
B) Modify above program to increment from 0 to 15 and display results in Hexadecimal on the console

Answers

Answer:

Explanation:

MIPS program which increments from 0 to 15 and display results in Decimal on the console

In this program the user defined procedures print_int and print_eot were used to print the integer values and new line characters(\n) respectively.the mechanisam of the loop is explaine in the comment section of the program.

     addi $s0, $0, 0

     addi $s1, $0, 15

print_int:

              li $v0, 1                # system call to print integer

              syscall                

              jr $ra                     # return

print_eol:                      # prints "\n"

            li $v0, 4            

              la $a0, linebrk      

              syscall              

              jr $ra                  # return

main: . . .          

              li $a0, 0                # print 0

              jal print_int         # print value in $a0

loop:   move $a0, $s0           # print loop count

       jal print_int        

       jal print_eol           # print "\n" character

       addi $s0, $s0, 1        # increment loop count by 1

       ble $s1, $s0, loop      # exit if $s1<$s0

beq $s0, $0, end

end:

MIPS progam to increment from 0 to 15 and display results in Hexadecimal on the console

this program is slightly differed from the previous program in this program the system call issued in print_int is implemented with a system call that prints numbers in hex.

addi $s0, $0, 15

     addi $s1, $0, 0

print_int:

   li      $v0,34                  # syscall number for "print hex"

   syscall                         # issue the syscall

              jr $ra                     # return

print_eol:                      # prints "\n"

            li $v0, 4            

              la $a0, linebrk      

              syscall              

              jr $ra                  # return

main: . . .          

              li $a0, 0                # print 0

              jal print_int         # print value in $a0

loop:   move $a0, $s0           # print loop count

       jal print_int        

       jal print_eol           # print "\n" character

       addi $s0, $s0, 1        # increment loop count by 1

       ble $s1, $s0, loop      # exit if $s0>$s1

beq $s0, $0, end

end:

Which of the following are true of trademarks?
Check all of the boxes that apply.
They protect logos.
They protect fabric.
They show who the maker of the item is.
They can be registered with the government.

Answers

Answer:

A, C, D

They protect logos

They show who the maker of the item is.

They can be registered with the government

Explanation:

The following are true of trademarks:

They protect logos.  

They show who the maker of the item is.

They can be registered with the government.

A trademark is a type of intellectual property consisting of a recognizable sign, design, or expression which identifies products or services of a particular source from those of others.  A trademark exclusively identifies a product as belonging to a specific company and recognizes the company's ownership of the brand.

Trademarks protect logos, show who the maker of the item is and can be registered with the government.

Find out more on trademark at: https://brainly.com/question/11957410

Compute -ABE16-DF416 using 15’s complement

Answers

Answer:

33600

Explanation:

Let M = ABE16

and N = DF416

In hexadecimal representation: 10 = A, 11 = B, 12 = C, 13 = D, 14 = E, 15 = F

Step 1: Find the 15's complement of N

 F  F  F  F  F

- D  F  4  1  6

2  0  B  E  9

Step 2: Add 15's complement of N to M

  A  B  E  1  6

+ 2  0  B  E  9  

  C  C  9  F  F

Step 3: Find the 15's complement of CC9FF

 F  F   F  F  F

- C  C  9  F  F

 3   3  6  0  0

Therefore, ABE16 - DF416 using 15's complement is 33600

Answers must be correct. Or else it will be flagged. All of these sub parts need to be answered with step by step process showing all work and reasoning.
DISCRETE STRUCTURES:
1.a. Truth value of a propositional statement For this exercise, it is easier not to use truth tables.
1. Suppose that A → ((BAC)-D) is false. What are the truth values of A, B, C, and D?
2. Suppose that (A-B) v (CA (DAE)) → F) is false.
What are the truth values of A, B, C, D, E, and F?
1.b. Logical equivalence Prove the equivalences below without using truth tables. Instead, use the rules of logical equivalence given in class. Justify your reasoning.
1.c. Inference Formalize the following argument and show that it is valid.
If Jose took the jewellery or Mrs. Krasov lied, then a crime was committed. Mr. Krasov was not in town. If a crime was committed, then Mr. Krasov was in town. Therefore Jose did not take the jewellery

Answers

Note: The complete part of question 1b is attached as a file

Answer:

1ai) A = true, B = true, C = true, D = false

Check the attached files for the answers of the remaining parts

Explanation:

The detailed solutions of all the sections of the question are contained in the attached files

WRITTEN INTERVIEW QUESTIONS
Doctoral candidates should provide an authentic personal statement to each of the five following questions/prompts reflecting on their own personal interest. In the event that any outside resources are used, resources should be cited in APA format. Submissions should be a maximum of 500 words or 125 words per question/prompt. It is best to response to each prompt/question individually for clarity of the reviewer. Writing sample should be submitted in Microsoft Word format and include candidate’s name.
PhD IT
1. Tell us about yourself and your personal journey that has lead you to University of the Cumberlands.
2. What are your research interests in the area of information technology? How did you become interested in this area of research?
3. What is your current job/career and how will this program impact your career growth?
4. What unique qualities do you think you have that will help you in being successful in this program?
5. How can obtaining a doctorate impact your contribution to the practices of information technology? Where do you see yourself after obtaining a doctorate from UC?

Answers

Explanation:

1. I grew up in a small community and my family owned a small business which involved manual labor. Although, having little income, my Dad sought to give us the best education he could afford from his little savings. With the small family savings I went to college where I studied Information Technology, after graduating I worked for a startup firm for two years before I decided to proceed with post graduate studies and I attained my Masters in UA. I met a friend who recommended I study in University of Cumberlands, I hesitated initially but was convinced after I researched the institution.

2. I'm particularly interested in the applications of information technology in labor intensive businesses and work because of my family background.

3. I have my own startup firm that designs work communication software for companies, however I intend to broaden my knowledge through this program into Information Technology based systems using machine learning algorithm.

4. I am committed to work and study, as some have called me a curious mind because of my passion towards learning.

5. I view obtaining a doctorate as not just a personal achievement but of lasting benefits to society as I use knowledge derived to improve the work experience of society.

I am confident that after my program I would be one the renowned contributors to the applications of information technology in labor intensive businesses.

CASE II AziTech is considering the design of a new CPU for its new model of computer systems for 2021. It is considering choosing between two (2) CPU (CPUA and CPUB) implementations based on their performance. Both CPU are expected to have the same instruction set architecture. CPUA has a clock cycle time of 60 ns and CPUB has a clock cycle time of 75 ns. The same number of a particular instruction type is expected to be executed on both CPUs in order to determine which CPU would executes more instructions. CPUA is able to execute 2MB of instructions in 5*106 clock cycles. CPUB executes the same number of instructions in 3*106 clock cycles. a) Using the MIPS performance metric, which of the two (2) CPU should be selected to be implemented in the new computer system. Justify your choice. b) Compute the execution time for both CPUs. Which CPU is faster?

Answers

Answer:

(a)The CPU B should be  selected for the new computer as it has a low clock cycle time which implies that it will implement the process or quicker when compared to the CPU A.

(b) The CPU B is faster because it executes the same number of instruction in a lesser time than the CPU A .

Explanation:

Solution

(a)With regards to  the MIPS performance metric the CPU B should be chosen for the new computer as it low clock cycle time which implies that it will implement the process or quicker when compared to the CPU A and when we look at the amount of process done by the system , the CPU B is faster when compared to other CPU and carries out same number of instruction in time.

The metric of response time for CPU B is lower than the CPU A and it has advantage over the other CPU and it has better amount as compared to CPU A, as CPU B is carrying out more execution is particular amount of time.

(b) The execution can be computed as follows:

Clock cycles taken for a program to finish * increased by the clock cycle time = the Clock cycles for a program * Clock cycle time

Thus

CPU A= 5*10^6 * 60*10^-9 →300*10^-3 →0.3 second (1 nano seconds =10^-9 second)

CPU B= 3 *10^6 * 75*10^-9 → 225*10^-3 → 0.225 second

Therefore,The CPU B is faster as it is executing the same number of instruction in a lesser time than the CPU A

If a large organization wants software that will benefit the entire organization—what's known as enterprise application software—the organization must develop it specifically for the business in order to get the functionality required.

Answers

Answer:

Hello your question lacks the required options which is : True or False

answer : TRUE

Explanation:

If a large organization wants to develop a software that will benefit the entire organization such software will be known as an enterprise application software and such application software must be developed in such a way that it meets the required purpose for which the organization is designed it for.

An enterprise application software is a computer software developed specially to satisfy the specific needs of an entire  organization inside of the individual needs of the people working in the organization.

Other Questions
The act of doing what's best for the group is calledcommensalismO mutualismaltruismsymbiosis The ratio of the measurement of an angle to its supplement is 3:5. Find the measurement of the angle and its supplement.-7th grade math What is required to set apart a direct quotation? A. quotation marks B. parentheses C. brackets D. ellipses Please select the best answer from the choices provided A B C D Your company currently has $ 1 comma 000 par, 6 % coupon bonds with 10 years to maturity and a price of $ 1 comma 078. If you want to issue new 10-year coupon bonds at par, what coupon rate do you need to set? Assume that for both bonds, the next coupon payment is due in exactly six months. Which BEST describes the shape of the distribution?A)uniformB)skewed rightC)skewed leftD)roughly symmetrical Que compromisos nos lleven a tener actitudes autonomas? What is the prodded of changing an infinitive verb ? Which sentence uses the word "credibility" correctly? A) The first speaker was entertaining, but I did not find his theories very credibility. B) She established her credibility when she said she had worked for NASA for 25 years. C) My teacher gave me credibility for having strong evidence to support my ideas. D) To improve your credibility, be sure to choose a topic that no one else is writing about. What does an unstable isotope give off that a stable isotope does not? Does (3, 3) make the equation y = x true? Which of the following is(are) the solution(s) to |x+8|=1A. x=9B. x= 7,9C. x= -7, 9D. x= -7 was The Erie Canal was one reason that manufacturers had to increase the prices of goods being shipped to the Midwest. f(x) is a function true or false Where does the process of eolian (wind transported) take place? Does the point (4, 0) satisfy the equation y = 5x + 4? Lauras husband died in a car accident. When she turns 67, she will receive her husbands __1___. Her children will also receive the same until they ___2___ . 1. 401k accountsocial security benefits certificate of deposit2. gradute from high schoolretirebecome employedthis is on plato i will give brainliest this is khan academy and i need it fast thx Evaluate 4 - 2(a2 b2)2 when a = 3 and b = 2. A local car dealer has 150 cars on the lot. 30% of the cars are sedans. How many of the cars are NOT sedans? A golfer is teeing off on a 130.0 m long par 3 hole. The ball leaves with a velocity of 35.0 m/s at 35.0 to the horizontal. Assumingthat she hits the ball on a direct path to the hole, how far from the hole will the ball land (no bounces or rolls)?