Which of the following statements is TRUE of a peer-to-peer network?
A. Different parties have very different opinions on what can and can’t be shared through a peer-to-peer network.
B. In a peer-to-peer network, all files being shared are kept on one server. Anyone who wants to access one of those files can get it directly from the server.
C. A peer-to-peer network can create heavy traffic and makes download times increase significantly.
D. Creating a directory of which computers have certain files is an acceptable practice.

Answers

Answer 1

Answer:

A. Different parties have very different opinions on what can and can’t be shared through a peer-to-peer network.

Explanation:
CORRECT
Choice 'A' is very true.
There have been many arguments and court cases over what content can and cannot be shared through a peer-to-peer network. Users of these networks often argue that free speech allows us to share whatever we want online. Content creators on the other hand frequently sue for copyright infringement.


INCORRECT
Choice 'B' is describing a centralized system, not a peer-to-peer network. In a peer-to-peer network, there is no central location of files. Files are transferred directly from one computer to another without a middleman.

Choice 'C' is also not true of peer-to-peer networks. These networks are actually much more efficient than centralized systems because there is no large server holding all the files. It takes less time to download files from a peer-to-peer network because there is no centralized source of information and files.

Choice 'D' is also false; this was decided in the court case about Napster, one of the first large peer-to-peer networks. Having a centralized directory of who has which files is not considered free speech.

Answer 2

The peer-to-peer network is said to have varying views that form the basis of what can and cannot be shared. Thus, option A is correct.

What is a peer-to-peer network?

A peer-to-peer network is given as the connection of the computers that are linked with the following same responsibilities and permissions.

The network is said to have varying views. Many debates and court cases have erupted over what content can and cannot be shared over a peer-to-peer network.

Users of these sites frequently argue that freedom of speech allows us to share whatever we want on the internet.On the other hand, content creators frequently file copyright infringement lawsuits.

Thus, option A is correct.

Learn more about peer-to-peer networks, here:

https://brainly.com/question/1172049

#SPJ2


Related Questions

NEED HELP IMMEDIATELY!!
Highlight the upsides and downsides of seeking online help for a technical problems.

Answers

Answer:

Pros: Experts are there to help, Help can be found almost 24 hours of the day so you don't have to wait for an expert to be available, easier to ask more in detail.

Cons: Answers may not always come quickly, there is no face to face interaction so you dont know how legit the person is, some advice may be incorrect or old.

Explanation:

What is the main circuit board inside the computer called?CD-ROMY
Video card
ROM
Motherboard

Answers

Hey the motherboard is the main circuit think about it as  a base that all other parts like the ram and video card aka graphics card connect to

Hope this helps

Describe how being a global citizen in the world of advanced technology can be beneficial to your success in meeting your personal, academic, and professional goals.

Answers

Answer:

well you could have more options of careers and more possibilities, online jobs can pay more and give more experience to the employees

A function checkZeros accepts three double parameters. It checks to see if the sum of all three parameters is equal to zero. If this sum is equal zero, the function returns true, otherwise the function returns false. 1. Give an example CALL from main: 2. Write the prototype for the function: 3. Write down the definition (header and body) for the function.

Answers

Answer:

Explanation:

The following code is written in Java. It creates the interface/prototype, the function, and the main method call. The function takes in the three int parameters, adds them, and then checks if the sum equals zero, outputting the correct boolean value. Output can be seen in the picture attached below. Due to technical difficulties I had to add the code as a txt file below.

A field is a group of related records that can be identified by the user with a name, type, and size.

Answers

Answer: False

Explanation:

The statement that a field is referred to as a group of related records which can be identified by the user with a name, type, and size is wrong.

The above definition represents a table. The group of related records is referred to as a table. On the other hand, a field refers to a set of data values, which are of identical data type.

A new school is being built in the local school district. It will have three computer labs with 28 computers each. There will be 58 classrooms with 2 computers each that need to be on one sub-subnet. The office staff and administrators will need 7 computers. The guidance and attendance office will have 5 computers. The school has been given the address 223.145.75.0/24.

Complete the information required below.

Subnet Subnet Mask (/X) Subnet Address First Usable Host Last Usable Host Broadcast Address
1

2

3

4

5

6

7

8

9

10

Answers

Answer:

The table is formed as attached figure.

Explanation:

Subnets can use specific number of hosts so /25 can host 128 hosts, reducing by a factor of 2 leading to /30 as with only 4 hosts. Thus the subnets are alloted as indicated in the attached image.

script code written in many languages of the best known: ( C#_PHP_HTML)​

Answers

Answer:

PHP

Explanation:

The best way to answer this question is to interpret it as, which of the three is a scripting language.

Analyzing each of the languages

1. C#

C# is not a scripting language, but instead it is an object-oriented programming language. Also, c# is a compiled language and one of the features of scripting language is that, they are interpreted.

2. PHP

Basically, PHP are used for server side scripting language because it uses scripts and its programs are not for general purpose runtime environment (but instead for special runtime environments).

3. HTML

HTML is neither a programming language, nor a scripting language because its design pattern does not follow that or programming and scripting languages, and it can not perform what an actual programming and scripting language do.

What is the function of a bread crumb trial in a website

Answers

Answer:

A “breadcrumb” (or “breadcrumb trail”) is a type of secondary navigation scheme that reveals the user's location in a website or Web application. The term comes from the Hansel and Gretel fairy tale in which the two title children drop breadcrumbs to form a trail back to their home.

Explanation:

A breadcrumb or breadcrumb trail is a graphical control element frequently used as a navigational aid in user interfaces and on web pages. It allows users to keep track and maintain awareness of their locations within programs, documents, or websites. Breadcrumbs make it easier for users to navigate a website – and they encourage users to browse other sections of the site. ... You head to their site and end up on The Nestle company history page. Using their breadcrumbs, you can easily navigate back to About Us, History, or even their home page.

help meeeee pleaaaseee ​

Answers

Answer:

just drop out that the easiest solution

A decimal number is called a float.
True
False

Answers

Answer: True

Explanation:

The term floating point is derived from the fact that there is no fixed number of digits before and after the decimal point; that is, the decimal point can float. There are also representations in which the number of digits before and after the decimal point is set, called fixed-pointrepresentations.

Answer:

It's true

Explanation:

Write a program that lets a maker of chips and salsa keep track of sales for five different types of salsa: mild, medium, sweet, hot, and zesty. The program should use two parallel 5-element arrays: an array of strings that holds the five salsa names and an array of integers that holds the number of jars sold during the past month for each salsa type. The salsa names should be stored using an initialization list at the time the name array is created. The program should prompt the user to enter the number of jars sold for each type. Once this sales data has been entered, the program should produce a report that displays sales for each salsa type, total sales, and the names of the highest selling and lowest selling products.

Answers

Answer:

The program in Java is as follows:

import java.util.*;

public class Main{

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

 String [] salsa = {"Mild","Medium","Sweet","Hot","Zesty"};

 int [] number = new int[5];

 for(int i = 0;i<5;i++){

     System.out.print(salsa[i]+" number: ");

     number[i] = input.nextInt();

 }

 for(int i = 0;i<5;i++){

     System.out.println(salsa[i]+" : "+number[i]);

 }

 int smallest = number[0];  int highest = number[0];

 int count = 0;

 for(int i = 0;i<5;i++){

     if(smallest > number[i]){

         smallest = number[i];

         count = i;

     }

 }

 System.out.println("Smallest");

 System.out.println(salsa[count]+" : "+smallest);

    for(int i = 0;i<5;i++){

     if(highest < number[i]){

         highest = number[i];

         count = i;

     }

 }

 System.out.println("Highest");

 System.out.println(salsa[count]+" : "+highest);

}

}

Explanation:

This initializes the salsa names

 String [] salsa = {"Mild","Medium","Sweet","Hot","Zesty"};

This declares the array for the amount of salsa

 int [] number = new int[5];

This iterates through the 5 salsas and get input for the amount of each

 for(int i = 0;i<5;i++){

     System.out.print(salsa[i]+" number: ");

     number[i] = input.nextInt();

 }

This prints each salsa and the amount sold

 for(int i = 0;i<5;i++){

     System.out.println(salsa[i]+" : "+number[i]);

 }

This initializes smallest and largest to the first array element

 int smallest = number[0];  int highest = number[0];

This initializes the index of the highest or lowest to 0

 int count = 0;

The following iteration gets the smallest of the array elements

 for(int i = 0;i<5;i++){

     if(smallest > number[i]){

         smallest = number[i];

This gets the index of the smallest

         count = i;

     }

 }

This prints the smallest

 System.out.println("Smallest");

 System.out.println(salsa[count]+" : "+smallest);

The following iteration gets the largest of the array elements    

for(int i = 0;i<5;i++){

     if(highest < number[i]){

         highest = number[i];

This gets the index of the highest

         count = i;

     }

 }

This prints the highest

 System.out.println("Highest");

 System.out.println(salsa[count]+" : "+highest);

the shadows she fancied has tricked her. what does that mean

Answers

Answer: the room had been dark, she had not been able to see him clearly

Explanation:

The word FANCIED means desire or  fancied would mean supposed, believed, or imagined.

So it means that she might think that the shadow (assuming the shadow was a person who was invisible) was just her imagination or hallucination but in reality, the shadow (invisible person) tricked her.

_________________

Brainliest would be greatly appreciated!

_________________

#SpreadTheLove

#SaveTheTrees

- Mitsu JK

is used for finding out about objects, properties and methods​

Answers

Answer:

science

Explanation:

what connect webpages?​

Answers

Anchor tags or hyperlinks are used to connect webpages.

Answer:

"Hypertext links are those words that take you from one web page to another when you click them with your mouse. Although the same HTML tag you study in this hour is also used to make graphical images into clickable links, graphical links aren't explicitly discussed here" I got this from https://www.informit.com/articles/article.aspx?p=440289 sorry I couldnt take the time myself here to help :(

Explanation:

Write a MIPS assembly language program that prompts for a user to enter a series of floating point numbers and calls read_float to read in numbers and store them in an array only if the same number is not stored in the array yet. Then the program should display the array content on the console window.
Consult the green sheet and the chapter 3 for assembly instructions for floating point numbers. Here is one instruction that you might use:
c.eq.s $f2, $f4
bc1t Label1
Here if the value in the register $f2 is equals to the value in $f4, it jumps to the Label1. If it should jump when the value in the register $f2 is NOT equals to the value in $f4, then it should be:
c.eq.s $f2, $f4
bc1f Label1
To load a single precision floating point number (instead of lw for an integer), you might use:
l.s $f12, 0($t0)
To store a single precision floating point number (instead of sw for an integer), you might use:
s.s $f12, 0($t0)
To assign a constant floating point number (instead of li for an integer), you might use:
li.s $f12, 123.45
To copy a floating point number from one register to another (instead of move for an integer), you might use:
mov.s $f10, $f12
The following shows the syscall numbers needed for this assignment.
System Call System Call System Call
Number Operation Description
2 print_float $v0 = 2, $f12 = float number to be printed
4 print_string $v0 = 4, $a0 = address of beginning of ASCIIZ string
6 read_float $v0 = 6; user types a float number at keyboard; value is store in $f0
8 read_string $v0 = 8; user types string at keybd; addr of beginning of string is store in $a0; len in $a1
------------------------------------------
C program will ask a user to enter numbers and store them in an array
only if the same number is not in the array yet.
Then it prints out the result array content.
You need to write MIPS assembly code based on the following C code.
-------------------------------------------
void main( )
{
int arraysize = 10;
float array[arraysize];
int i, j, alreadyStored;
float num;
i = 0;
while (i < arraysize)
{
printf("Enter a number:\n");
//read an integer from a user input and store it in num1
scanf("%f", &num);
//check if the number is already stored in the array
alreadyStored = 0;
for (j = 0; j < i; j++)
{
if (array[j] == num)
{
alreadyStored = 1;
}
}
//Only if the same number is not in the array yet
if (alreadyStored == 0)
{
array[i] = num;
i++;
}
}
printf("The array contains the following:\n");
i = 0;
while (i < arraysize)
{
printf("%f\n", array[i]);
i++;
}
return;
}
Here are sample outputs (user input is in bold): -- note that you might get some rounding errors
Enter a number:
3
Enter a number:
54.4
Enter a number:
2
Enter a number:
5
Enter a number:
2
Enter a number:
-4
Enter a number:
5
Enter a number:
76
Enter a number:
-23
Enter a number:
43.53
Enter a number:
-43.53
Enter a number:
43.53
Enter a number:
65.43
The array contains the following:
3.00000000
54.40000153
2.00000000
5.00000000
-4.00000000
76.00000000
-23.00000000
43.52999878
-43.52999878
65.43000031

Answers

Explanation:

Here if the value in the register $f2 is equals to the value in $f4, it jumps to the Label1. If it should jump when the value in the register $f2 is NOT equals to the value in $f4, then it should be

Define a structure Triangle that contains three Point members. Write a function that computes the perimeter of a Triangle . Write a program that reads the coordinates of the points, calls your function, and displays the result

Answers

Answer:

The program in C++ is as follows:

#include <iostream>    

using namespace std;

int perimeter(int side1, int side2, int side3){

return side1+side2+side3;

}

struct Triangle  {

int side1;  int side2;   int side3;

};

int main(void) {

int side1, side2, side3;

cout<<"Sides of the triangle: ";

cin>>side1>>side2>>side3;

struct Triangle T;

T.side1 = side1;

T.side2 = side2;

T.side3 = side3;  

cout << "Perimeter: " << perimeter(T.side1,T.side2,T.side3) << endl;

return 0;

}

Explanation:

See attachment for complete code where comments are as explanation

Which of the following is the cause of transmission impairment?
Select one:
O Frequency
O Amplitude
O Attenuation
O Phase​

Answers

Answer:

attenuation is the third one

I have some true or false questions I need help with. 9th grade.**

Handware can be tracked back to ancient times. Over six centuries ago.
True or false.

Hardware is only found in computers.
True or false. I know

Instruments and weaving looms where some of the first pieces of hardware.
True or false.

Computers and hardware is the same thing
True or false.

Answers

Answer:

Hardware can be traced back to ancient times. False

Hardware is only found in computers. False

Instruments and weaving looms were some of the first pieces of hardware. False

Computers and hardware is the same thing. This question is a bit broad but there's many different types of hardware. From keyboards to printers to speakers.

I tried my best not exactly sure though.

You work at the headquarters of an international restaurant chain. The launch of your mobile ordering app has been well received in your home country, increasing sales and customer satisfaction while decreasing order wait time and operating expenses. Your team is now ready to expand the mobile app into a handful of international markets. However, you first need to strategize what kinds of adjustments and adaptations will be needed to help ensure the app's success in these various cultural environments. Marketing director: Frankly, I'm a little surprised at the success we've seen with this app here at home. But it makes sense to keep buiding on that momentum You Yes, I think today's customers are indigenously comfortable with internet based technologies, an________ is a natural extension of that phenomenon. The challenge is to figure out how easily the app can be adapted to markets
a. e-business
b. global purchasing
c. language diversity
d. model networking

Answers

Answer: E-business

Explanation:

Based on the information given, a natural extension of that phenomenon is the E-business. E-business which means electronic business is when business is done through the internet.

It should be noted that e-business processes consist of the purchase and sale of goods and services, the processing of payments, servicing customers, sharing information regarding products, managing production control, etc.

Theo is working on data for his business using Design view in an Access form. He wants to change a text field box's
number of products sold from 10,789 to 10,790. In which section of the form should Theo to make this change?
form footer
O form detail
form data
form header

Answers

Answer: the answer si b . form detail

Explanation

Answer:

the answer is b . form detail

Explanation:

One advantage of animal photography in zoos is that you can often get closer to the animal for your photograph than you would be able to in the wild.

True
False

Answers

Answer:

true

Explanation:

because its live

the answer would be true

Write a program that lets the user perform arithmetic operations on fractions. Fractions are of the form a/b, in which a and b are integers and b is not equal to 0. Your program must be menu driven, allowing the user to select the operation ( , -, *, or /) and input the numerator and the denominator of each fraction. Furthermore, your program must consist of at least the following function

menu: This function informs the user about the program's purpose, explains how to enter data, how to quit and allows the user to select the operation.
addFractions: This function takes as input four integers representing the numerators and denominators of two fractions, adds the fractions, and returns the numerator and denominator of the result.
subtractFractions: This function takes as input four integers representing the numerators and denominators of two fractions, subtracts the fractions, and returns the numerator and denominator of the result.
multiplyFractions: This function takes as input four integers representing the numerators and denominators of two fractions, multiplies the fractions, and returns the numerator and denominator of the result.
divideFractions: This function takes as input four integers representing the numerators and denominators of two fractions, divides the fractions, and returns the numerator and denominator of the result.

Here are some sample outputs of the program:

3 / 4 +2 / 5 = 23 / 20
2 / 3 * 3 / 5 = 2 / 5

Answers

Answer:

Explanation:

The following code is written in Java, It asks the user to enter the numerator and denominator for both fraction 1 and 2. Then it prompts the user with a menu to choose the desired operation. The choice is passed into a switch statement and calls the correct function.

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       int num1, num2, den1, den2;

       System.out.println("Enter numerator for fraction 1: ");

       num1 = in.nextInt();

       System.out.println("Enter denominator for fraction 1: ");

       den1 = in.nextInt();

       System.out.println("Enter numerator for fraction 2: ");

       num2 = in.nextInt();

       System.out.println("Enter denominator for fraction 2: ");

       den2 = in.nextInt();

       System.out.println("Menu:");

       System.out.println("+ = add fractions");

       System.out.println("- = subtract fractions");

       System.out.println("/ = divide fractions");

       System.out.println("* = multiply fractions");

       String answer = in.next();

       switch (answer.charAt(0)) {

           case '+': add(num1, den1, num2, den2); break;

           case '-': subtract(num1, den1, num2, den2); break;

           case '*': multiply(num1, den1, num2, den2); break;

           case '/': divide(num1, den1, num2, den2); break;

       }

   }

   public static void add(int num1, int den1, int num2, int den2) {

       int num3 = (num1 * den2) + (num2 * den1);

       int den3 = den1 * den2;

       System.out.println("New Fraction: " + num3 + " / " + den3);

   }

   public static void subtract(int num1, int den1, int num2, int den2) {

       int num3 = (num1 * den2) - (num2 * den1);

       int den3 = den1 * den2;

       System.out.println("New Fraction: " + num3 + " / " + den3);

   }

   public static void divide(int num1, int den1, int num2, int den2) {

       int num3 = num1 * den2;

       int den3 = den1 * num2;

       System.out.println("New Fraction: " + num3 + " / " + den3);

   }

   public static void multiply(int num1, int den1, int num2, int den2) {

       int num3 = num1 * num2;

       int den3 = den1 * den2;

       System.out.println("New Fraction: " + num3 + " / " + den3);

   }

}

Which statement best describes Link State routing? Group of answer choices Each router builds a cost-weighted graph of the network of all the routers and the shortest links between them, based on information received from each router regarding only its nearest neighbors All of these Each router uses a HELLO packet to announce its presence to its neighbors Each router builds a table with the best distance between each router and the link to use, based on each router’s providing data on distances to all the routers in its routing table to its nearest neighbors

Answers

Answer:

Each router builds a cost-weighted graph of the network of all the routers and the shortest links between them, based on information received from each router regarding only its nearest neighbors.

Explanation:

A routing protocol can be defined as a set of defined rules or algorithms used by routers to determine the communication paths unto which data should be exchanged between the source router and destination or host device.

Additionally, in order for packets to be sent to a remote destination, these three parameters must be configured on a host.

I. Default gateway

II. IP address

III. Subnet mask

After a router successfully determines the destination network, the router checks the routing table for the resulting destination network number. If a match is found, the interface associated with the network number receives the packets. Else, the default gateway configured is used. Also, If there is no default gateway, the packet is dropped.

Basically, there are two (2) main categories of routing protocols used in packet switching networks and these includes;

1. Distance-vector routing.

2. Link state routing.

Link state routing refers to a complex routing technique in which each router learns about it's own neighborhood or directly connected networks (links) and shares the information with every other router present in the network.

Hence, the statement which best describes Link State routing is that, each router builds a cost-weighted graph of the network of all the routers and the shortest links between them, based on information received from each router regarding only its nearest neighbors. Some examples are intermediate system to intermediate system (IS-IS) and open shortest path first (OSPF).

Write a method maxMagnitude() with two integer input parameters that returns the largest magnitude value. Use the method in a program that takes two integer inputs, and outputs the largest magnitude value.

Ex: If the inputs are: 5 7 the method returns: 7
Ex: If the inputs are: -8 -2 the method returns: -8

Answers

Answer:

The program in Java is as follows:

import java.util.*;

import java.lang.Math;

public class Main{

public static int maxMagnitude(int num1, int num2){

    int mag = num2;

    if(Math.abs(num1) > Math.abs(num2)){

        mag = num1;

    }

    return mag;

}

public static void main(String[] args) {

 int num1, num2;

 Scanner input = new Scanner(System.in);

 System.out.print("Enter two integers: ");

 num1 = input.nextInt();

 num2 = input.nextInt();

 System.out.println(maxMagnitude(num1,num2));

}

}

Explanation:

The method begins here

public static int maxMagnitude(int num1, int num2){

This initializes the highest magnitude to num2

    int mag = num2;

If the magnitude of num1 is greater than that of num2

    if(Math.abs(num1) > Math.abs(num2)){

mag is set to num1

        mag = num1;

    }

This returns mag

    return mag;

}

The main  method begins here

public static void main(String[] args) {

This declares num1 and num2 as integer

 int num1, num2;

 Scanner input = new Scanner(System.in);

This prompts the user for two integers

 System.out.print("Enter two integers: ");

This gets input for the first integer

 num1 = input.nextInt();

This gets input for the second integer

 num2 = input.nextInt();

This calls the maxMagnitude method and prints the number with the highest magnitude

 System.out.println(maxMagnitude(num1,num2));

}

Write a Perl program that uses a hash and a large number of operations on the hash. For example, the hash could store people’s names and their ages. A random- number generator could be used to create three- character names and ages, which could be added to the hash. When a duplicate name was generated, it would cause an access to the hash but not add a new element. Rewrite the same program without using hashes. Compare the execution efficiency of the two. Compare the ease of programming and readability of the two.

Answers

Answer:

The Perl code is attached in the attachment. The execution time for using hashes is 0 seconds while that for without hash is 27 seconds.

Explanation:

In terms of ease of access and readability, both approaches are similar. However, it is evident from the time of execution that the with hashes is more efficient than the value of without hashes. This indicates that using hashes is more efficient.

Which XXX completes the definition of the generic method, avgNum?
public class FindAverage { XXX { long tripleSum; tripleSum = item1.longValue() + item2.longValue() + item3.longValue(); return tripleSum / 3; } }
a. public static long avgNum(long item1, long item2, long item3)
b. public static long avgNum(TheType item1, TheType item2, TheType item3)
c. public static long avgNum(TheType item1, TheType item2, TheType item3)
d. public static avgNum(TheType item1, TheType item2, TheType item3)

Answers

Answer:

Explanation:

The correct piece of code for the generic method in the question would be the following...

public static <TheType extends Number> long avgNum(TheType item1, TheType item2, TheType item3)

This declaration of the avgNum method declares this method as a Generic TheType method that is a subclass of the Number class. It also takes in generic parameters which are the same as the Generic class that was declared. Finally, outputting a long value which would be tripleSum / 3

answer any one: write a computer program:which you know.​

Answers

hope this helps you.look it once

Your company has a benchmark that is considered representative of your typical applications. One of the older-model workstations does not have a floating-point unit and must emulate each floating-point instruction by a sequence of integer instructions. This older-model workstation is rated at 120 MIPS on this benchmark. A 3rd -party vendor offers an attached processor that is intended to give a hardware accelerator to your workstation. The attached processor executes each floating-point instruction on a dedicated processor, without emulation. The workstation/attached processor rates 80 MIPS on the same benchmark. The following symbols are used to answer this exercise:

I – Number of integer instructions executed on the benchmark
F – Number of floating-point instructions executed on the benchmark
Y – Number of integer instructions to emulate a float-point instruction
W – Time to execute the benchmark on the processor alone
B – Time to execute the benchmark on the processor/coprocessor combination.

Required:
a. Write an equation for the MIPS rating of each configuration using the symbols above.
b. What is the value of B?
c. What is the MFLOPS rating of the system with the coprocessor?
d. Your colleague wants to purchase the coprocessor even though the MIPS rating for the configuration using the coprocessor is less than that of the processor alone. Is your colleague’s evaluation correct?

Answers

Answer:

a-The equation for processor only configuration is [tex]120\times 10^6=\dfrac{I+YF}{W}\\[/tex] while that for processor and co-processor configuration is [tex]80\times10^6=\dfrac{I+F}{B}[/tex].

b-The value of B is 1.1 second.

c-The value of MFLOPS for co-processor system in configuration 2 is 80 MFLOPS.

d-The evaluation of your colleague is correct.

Explanation:

a

The MIPS rating equations are as follows

Configuration 01 (Processor only)

[tex]120\times 10^6=\dfrac{I+YF}{W}\\[/tex]

Configuration 02 (Processor + Co-processor)

[tex]80\times10^6=\dfrac{I+F}{B}[/tex]

b

From the equation, for processor and co-processor equation the value of B is calculated. For it to be calculated, the I value is calculated from the processor configuration with the following data F= 8 * 10^6 . Y= 50, W = 4 sec:

[tex]I=120\times10^6\timesW-YF\\I=(120\times10^6\times4)-(8\times10^6\times50)\\I=80\times10^6 \text{instructions}[/tex]

Using this value of I gives

[tex]B=\dfrac{I+F}{80\times10^6}\\B=\dfrac{80\times10^6+8\times10^6}{80\times10^6}\\B=\dfrac{88\times10^6}{80\times10^6}\\B=1.1\text{second}[/tex]

The value of B is 1.1 second.

c

The MFLOPS rating of configuration 2 is given as

[tex]\text{MFLOPS}=\dfrac{F}{B-\dfrac{I}{MIPS_{proc+coproc}}}\\\text{MFLOPS}=\dfrac{8\times10^6}{1.1-\dfrac{80\times10^6}{80\times10^6}}\\\text{MFLOPS}=\dfrac{8\times10^6}{1.1-1}\\\text{MFLOPS}=\dfrac{8\times10^6}{0.1}\\\text{Processor+Coprocessor MFLOPS}=80 \text{MFLOPS}[/tex]

So the value of MFLOPS for co-processor system in configuration 2 is 80 MFLOPS.

d

The value of W is 4 seconds while the value of B is 1.1 seconds. Despite being the configuration with lower MIPS, the co-processor configuration has a lower execution rate and thus the evaluation of your colleague is correct.

3.4 code practice question 2 edhesive

Answers

???????????????????
Is there more to this question??

You have been given an encrypted copy of the Final exam study guide here, but how do you decrypt and read it???

Along with the encrypted copy, some mysterious person has also given you the following documents:

helloworld.txt -- Maybe this file decrypts to say "Hello world!". Hmmm.

hints.txt -- Seems important.

In a file called pa11.py write a method called decode(inputfile,outputfile). Decode should take two parameters - both of which are strings. The first should be the name of an encoded file (either helloworld.txt or superdupertopsecretstudyguide.txt or yet another file that I might use to test your code). The second should be the name of a file that you will use as an output file. For example:

decode("superDuperTopSecretStudyGuide.txt" , "translatedguide.txt")

Your method should read in the contents of the inputfile and, using the scheme described in the hints.txt file above, decode the hidden message, writing to the outputfile as it goes (or all at once when it is done depending on what you decide to use).

Hint: The penny math lecture is here.

Another hint: Don't forget about while loops...

Answers

Answer:

                                               

Explanation:

               

Other Questions
The mass of the sun is about 1.98 x 10^30 kilograms. The mass of the earth is 5.97x 10^24 kilograms. The mass of the sun is how many times greater than the mass ofthe earth? h e l p pls and tyyyyy Personal branding involves ________. Instructions: Use the ratio of a 30-60-90 triangle to solve for the variables. Leave your answers as radicals in simplest form. fleksjsjdkjsdhdhd shhsbs siaba ais s Point Q is located at (27, -30). It is dilated by a scale factor of 1/6, with center of dilation as the origin. Please balance the equation C7H16 + CoF3 = C7F16 + HF +CoF2with solutions WORTH 15 POINTS WILL GIVE BRAINLIESTWhat is the mechanical advantage of a handle on a water well that requires 5 newtons of force to lift a 40-Newton bucket of water?20080.12512.5% These cylinders are similar. Find the surfacearea of the smaller cylinder. Round to thenearest tenth.5 cm13 cmSurface Area = [? ] cm2 Surface Area = 236 cm2 49. Marcy Company declared a 100% common stock dividend on January 1, 2005, when the market price of the stock was $7.50. The entry to record this dividend will: A) debit Retained Earnings,$100,000 B) credit Common Stock Dividend Distributable,$50,000 C) credit Contributed Capital in excess of par, Common Stock, $25,000 D) credit Common Stock Dividend Distributable, $100,000 E) Since this is considered a stock split, no journal entry is made WILLLL MARK BRAINLIEST IF GOTTEN RIGHT Why do you think some people still smoke despite thebseveral warnings of its harmful effects? g Earnings per share Financial statement data for the years 20Y5 and 20Y6 for Black Bull Inc. follow: 20Y5 20Y6 Net income $1,687,000 $2,632,000 Preferred dividends $40,000 $40,000 Average number of common shares outstanding 90,000 shares 120,000 shares a. Determine the earnings per share for 20Y5 and 20Y6. Round to two decimal places. 20Y5 20Y6 Earnings per Share $fill in the blank 1 $fill in the blank 2 b. Is the change in the earnings per share from 20Y5 to 20Y6 favorable or unfavorable 10. The 14th. Amendment provided for what?A. Balance of powerB. Citizenship/equalityC. FreedomD. To legalize slavery Qe potencias extranjeras participaron en la guerra? Cmo se resolvi el conflicto coreano? Type the correct answer in each box. Use numerals instead of words. If necessary, useType the correct answer in each box. Use numerals instead of words. If necessary, use / for the fraction bar(s). Jane arranges m chairs in each of n rows to seat x people. The formula to find the number of chairs in each row is m = . If 60 people attend the meeting and each row has 4 chairs, there are rows. / for the fraction bar(s). Jane arranges m chairs in each of n rows to seat x people. The formula to find the number of chairs in each row is m = . If 60 people attend the meeting and each row has 4 chairs, there are rows. A student pushes a box to the right with a force of 10 N. At the same time, anotherstudent pushes the same box to the left with a force of 5N.What is the net force A real estate agent has sold a house for $350,000. She earns 3% commission. How much did she earn? Show your work! PLEASE HELP !!!!!!!!!!! WILL MARK BRIANLIEST !!!!!!!!!!!!! In the readings, a claim is made about conservation programs: They can be used to make natural resources last longer. They can also be used to protect human health and help slow the growing mountain of trash. Cite reasons and evidence from the texts to support the claim. Also cite what you may already know about conservation and recycling programs to support the claim.