Login
Remember
Register
Questions
Hot!
Unanswered
Categories
Ask a Question
Trivia Quiz
Download Books
Donate
Ask a Question
Compare and contrast three (3) performance assessment methods that could be used in evaluating the performance of computers. In each case demonstrate how it could be used to evaluate the performance of a set of computers.
+1
vote
422
views
asked
Jul 28, 2020
in
Computer Architecture
by
anonymous
Your answer
Help us make this a great place for discussion by always working to provide accurate answers.
Email me at this address if my answer is selected or commented on:
Email me if my answer is selected or commented on
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
Write 2 in words
To avoid this verification in future, please
log in
or
register
.
0
Answers
Related questions
+2
votes
1
answer
8.6k
views
Compare and contrast sequential access, direct access, and random access methods of accessing memory. Practically explain how these memory access methods are applied in modern storage systems. Give two examples in each case.
asked
Jul 28, 2020
in
Compilers & Operating Systems
by
anonymous
+1
vote
1
answer
3.7k
views
Name the types of data dependencies that could be identified within the superscalar architecture and discuss their impact on computer architecture development by giving an example in each case.
asked
Aug 26, 2019
in
Computer Architecture
by
anonymous
0
votes
0
answers
435
views
Suppose that the designers of the laboratory access system have settled on a system that uses a swipe card and a card reader to access the laboratories. How would you set about evaluating this design? Use the design principles to discuss the key issues .
asked
Dec 20, 2020
in
Computer Aided Design
by
anonymous
+2
votes
1
answer
2.8k
views
Write a case study in the style used here to illustrate the importance of communications in a project team. Assume that some team members work remotely and it is not possible to get the whole team together at short notice.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
468
views
Some of the most important pieces of data stored in the RAM are the instructions which basically tells the CPU what to do at a particular time. Explain the concept of Instruction Set in the CPU and how it works.
asked
Oct 26, 2020
in
Computer Architecture
by
anonymous
+1
vote
0
answers
384
views
Using your knowledge of how an ATM is used, develop a set of use cases that could serve as a basis for understanding the requirements for an ATM system.
asked
Dec 4, 2021
in
Software Engineering
by
anonymous
–1
vote
1
answer
1.5k
views
Duplicate: Using your knowledge of how an ATM is used, develop a set of use cases that could serve as a basis for understanding the requirements for an ATM system.
asked
Jul 20, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
12.6k
views
Using your knowledge of how an ATM is used, develop a set of use cases that could serve as a basis for understanding the requirements for an ATM system.
asked
Oct 31, 2019
in
Software Engineering
by
anonymous
0
votes
0
answers
489
views
Explain why prototyping model is an adaptable model that can support both change avoidance and change tolerance activities. How does it differ from spiral model which in practice has not been widely used. Suggest why this might the case.
asked
Jun 17, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
1.8k
views
Explain how standards may be used to capture organizational wisdom about effective methods of software development. Suggest four types of knowledge that might be captured in organizational standards.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+2
votes
1
answer
1.4k
views
Explain when it may be cost-effective to use formal specification and verification in the development of safety-critical software systems. Why do you think that critical systems engineers are against the use of formal methods?
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+3
votes
1
answer
1.6k
views
Explain when it may be cost-effective to use formal specification and verification in the development of safety-critical software systems. Why do you think that some critical systems engineers are against the use of formal methods?
asked
Nov 10, 2019
in
Software Engineering
by
anonymous
0
votes
0
answers
234
views
Prove that if the number of Transistors is doubled, the increase in the performance of the processor will be in the region of 40% and discuss the relevance of this mathematical observation to multi-processor computing architecture design.
asked
Aug 26, 2021
in
Computer Architecture
by
anonymous
–1
vote
1
answer
1.8k
views
Duplicate: Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid: 1. 131.107.256.80 2. 0.127.4.100 3. 222.222.255.222 4. 190.7.2.0 5. 127.1.1.1 6. 255.255.255.255 7. 198.121.254.255
asked
Nov 25, 2020
in
Computer Networks
by
anonymous
0
votes
0
answers
268
views
Briefly discuss the history and future of multimedia. How might multimedia be used to improve the lives of its users? How might it influence users in negative ways? What might be its shortcomings?
asked
Oct 4, 2020
in
Computer Networks
by
anonymous
0
votes
1
answer
913
views
What are three approaches that can be taken to avoid having a single wireless link degrade the performance of an end-to-end transport-layer TCP connection?
asked
Oct 20, 2020
in
Computer Networks
by
(user.guest)
+1
vote
0
answers
283
views
How can standards (the 'what') and other information be used to develop a methodology/approach/framework for managing projects (the 'how')? Describe some of this "other information" that can be used to create a methodology.
asked
Jul 7, 2021
in
Software Engineering
by
anonymous
+3
votes
1
answer
730
views
Explain how redundancy and diversity may be used to increase the ability of a system to resist cyberattacks that may corrupt or damage system assets.
asked
Nov 10, 2019
in
Software Engineering
by
anonymous
+2
votes
1
answer
3.0k
views
Explain why it may be difficult to use agile methods in a large project to develop a new information system that is to be part of an organizational system of systems.
asked
Oct 31, 2019
in
Software Engineering
by
anonymous
0
votes
0
answers
544
views
A microprocessor has an on - chip 2 - way set associative cache with a total capacity of 8 kByte. Each line in cache can store sixteen 8 - bit words. It has a total addressable space of 16 MBytes. Consider the following CPU instruction: Load AB1234h,
asked
May 29, 2021
in
Computer Architecture
by
anonymous
–1
vote
1
answer
1.4k
views
Duplicate: How might you use a model of a system that already exists? Explain why it is not always necessary for such a system model to be complete and correct. Would the same be true if you were developing a model of a new system?
asked
Feb 9, 2021
in
Software Engineering
by
anonymous
+3
votes
1
answer
1.4k
views
Under what circumstances might an organization decide to scrap a system when the system assessment suggests that it is of high quality and high business value?
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
3.8k
views
Under what circumstances might an organization decide to scrap a system when the system assessment suggests that it is of high quality and high business value?
asked
Nov 1, 2019
in
Software Engineering
by
anonymous
0
votes
0
answers
405
views
Compare the relative merits of the 3 cache memory organizations. a. Direct-mapping cache b. Fully-associative cache c. Set-associative cache.
asked
Jun 5, 2021
in
Computer Architecture
by
anonymous
+1
vote
1
answer
885
views
A fair coin is flipped three times. Let S be the sample space of the eight possible outcomes, and let X be the random variable that assigns to an outcome the number of heads in this outcome. What is the expected value of X?
asked
Jul 26, 2021
in
Maths & Statistics
by
anonymous
0
votes
0
answers
384
views
Identify the CASE support that can be availed of during a large maintenance effort concerning a large legacy software and schematically draw the architecture of a CASE environment and explain how the different tool are integrated
asked
Apr 20, 2021
in
Software Engineering
by
anonymous
+1
vote
1
answer
581
views
In one case a byte is defined as a sequence of 8 bits. Each bit can be either zero or one. How many different bytes are possible?
asked
Aug 30, 2021
in
Maths & Statistics
by
anonymous
0
votes
1
answer
1.9k
views
What does it mean for a wireless network to be operating in “infrastructure mode?” If the network is not in infrastructure mode, what mode of operation is it in, and what is the difference between that mode of operation and infrastructure mode?
asked
Oct 11, 2020
in
Computer Networks
by
(user.guest)
0
votes
0
answers
124
views
List three (3) open source engineering computational software tools that you would recommend as alternative to Matlab software for calculating the Grade Point Average (GPA) of 1000 students for each semester
asked
Nov 8, 2021
in
Computational Tools
by
(user.guest)
+1
vote
1
answer
738
views
Explain how you would use the reference model of CASE environments to compare the IDEs offered by different vendors of a programming language such as Java.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+4
votes
1
answer
7.0k
views
How might you use a model of a system that already exists? Explain why it is not always necessary for such a system model to be complete and correct.
asked
Nov 1, 2019
in
Software Engineering
by
anonymous
+1
vote
1
answer
2.7k
views
Suppose that the roundtrip delay between sender and receiver is constant and known to the sender. Would a timer still be necessary in protocol rdt 3.0, assuming that packets can be lost? Explain.
asked
Sep 30, 2020
in
Computer Networks
by
(user.guest)
–1
vote
1
answer
601
views
Duplicate: Write a scenario that could be used to help design tests for the wilderness weather station system
asked
May 22, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
1.1k
views
Write a scenario that could be used to help design tests for the wilderness weather station system.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
4.3k
views
Write a scenario that could be used to help design tests for the wilderness weather station system.
asked
Nov 1, 2019
in
Software Engineering
by
anonymous
0
votes
1
answer
3.6k
views
Compare and contrast the properties of a centralized and a distributed routing algorithm. Give an example of a routing protocol that takes a centralized and a decentralized approach
asked
Oct 9, 2020
in
Computer Networks
by
(user.guest)
0
votes
0
answers
236
views
Choose any piece of software which you use regularly. Briefly describe the requirements that the software meets (for you as the user). Suggest three ways in which the software could be improve for you.
asked
Apr 9, 2021
in
Software Engineering
by
anonymous
+1
vote
1
answer
735
views
Section 15.4 includes a C program that calculates the greatest common divisor of two integers. Describe the algorithm in words and show how the program does implement the Euclid algorithm approach to calculating the greatest common divisor.
asked
May 16, 2021
in
Computer Architecture
by
anonymous
0
votes
0
answers
200
views
How can formal methods be used to ensure the separation logic (one important aspect is the separation of information between different levels of classified information)
asked
Dec 29, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
248
views
By writing the parity code (even) and threefold repetition code for all possible four-bit straight binary numbers, prove that the Hamming distance in the two cases is at least 2 in the case of the parity code and 3 in the case of the repetition code.
asked
Oct 13, 2021
in
Hardware Systems & Electronics
by
anonymous
+1
vote
1
answer
1.0k
views
In a medical system that is designed to deliver radiation to treat tumours, suggest one hazard that may arise and propose one software feature that may be used to ensure that the identified hazard does not result in an accident.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
1.2k
views
It has been suggested that the need for regulation inhibits innovation and that regulators force the use of older methods of systems development that have been used on other systems...
asked
Nov 5, 2019
in
Software Engineering
by
anonymous
+2
votes
1
answer
378
views
Processor performance ‘P’ could be stated to linearly relate to the time ‘T’it takes to run an application program...
asked
Aug 23, 2019
in
Computer Architecture
by
anonymous
+1
vote
1
answer
558
views
Explain how the complementary strategies of resistance, recognition and recovery may be used to enhance the survivability of a system.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
1.5k
views
An address space uses three symbols: 0, 1, and 2 to represent addresses. If each address is made of 10 symbols, how many addresses are available in this system?
asked
Jul 3, 2020
in
Computer Networks
by
anonymous
0
votes
1
answer
131
views
To implement Dijkstra’s shortest path algorithm on unweighted graphs so that it runs in linear time, what is the data structure to be used?
asked
May 3
in
Programming Languages & Algorithms
by
(user.guest)
+1
vote
1
answer
318
views
List three major components ICs that contribute to the generation of heat as well power consumption and their effect in computer architecture.
asked
Aug 26, 2019
in
Computer Architecture
by
anonymous
+1
vote
1
answer
1.3k
views
Design an electronic form that may be used to record review comments and which could be used to electronically mail comments to reviewers.
asked
Mar 13, 2020
in
Software Engineering
by
anonymous
+1
vote
1
answer
1.9k
views
The principle of component independence means that it ought to be possible to replace one component with another that is implemented in a completely different way...
asked
Nov 10, 2019
in
Software Engineering
by
anonymous
0
votes
0
answers
146
views
A definition of computer architecture is built on four basic viewpoints namely the structure, the organization, the implementation, and the performance. Explain each one of the list viewpoints based on computer architecture
asked
Mar 28
in
Computer Architecture
by
anonymous
Welcome to
CPEN
Talk
.com
Solution-oriented students of
computer engineering
on one platform to get you that
ONE SOLUTION
...