AccountingQueen

(3)

$16/per page/Negotiable

About AccountingQueen

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Algebra See all
Accounting,Algebra,Applied Sciences,Architecture and Design,Art & Design,Biology,Business & Finance,Calculus,Chemistry,Communications,Computer Science,Economics,Engineering,English,Environmental science,Essay writing,Film,Foreign Languages,Geography,Geology,Geometry,Health & Medical,History,HR Management,Information Systems,Law,Literature,Management,Marketing,Math,Numerical analysis,Philosophy,Physics,Precalculus,Political Science,Psychology,Programming,Science,Social Science,Statistics Hide all
Teaching Since: Jul 2017
Last Sign in: 363 Weeks Ago
Questions Answered: 5502
Tutorials Posted: 5501

Education

  • MBA.Graduate Psychology,PHD in HRM
    Strayer,Phoniex,
    Feb-1999 - Mar-2006

  • MBA.Graduate Psychology,PHD in HRM
    Strayer,Phoniex,University of California
    Feb-1999 - Mar-2006

Experience

  • PR Manager
    LSGH LLC
    Apr-2003 - Apr-2007

Category > Computer Science Posted 05 Sep 2017 My Price 8.00

Answer Assessment Items

Answer Assessment Items

  1. List at least two features for each of the five (5) following devices that describe how they store information:

random access memory (RAM),

 

 

cache memory,

 

 

flash memory (e.g., USB Flash Drive),

 

 

optical storage (e.g., CD/DVD), and

 

 

magnetic storage (e.g., hard drive).

 

 

 

  1. Answer the following questions about memory:

 

a. (Multiple choice) A major advantage of direct mapped cache is its simplicity and ease of implementation. The main disadvantage of direct mapped cache is:

 

A) it is more expensive than fully associative and set associative mapping

B) it has a greater access time than any other method

C) its performance is degraded if two or more blocks that map to the same location are used alternately

D) it does not allow the cache to store the tag that corresponds to the block currently residing in that cache location

 

Answer: _____

 

b. (Multiple choice) Cache memory improves performance by improving memory __________ while virtual memory improves performance by increasing memory __________ .

 

A) execution time/access time

B) locality/access time

C) organization/paging

D) access time/address space

 

Answer: _____

 

c.. Null and Lobur's discussion of RAID (Redundant Arrays of Inexpensive Disks) is focused on using standard rotating magnetic disks. Can you use SSD (Solid State Drive) storage in a RAID configuration? If so, what risks are there for SSD storage? If they can be used, do all of the redundant disks necessarily need to also be SSD?

 

 

 

 

 

  1. Convert the numbers and populate the missing cells based on column heading. To receive credit, you must show each step you took to calculate each conversion.

 

Base 2 (Binary)

Base 8 (Octal)

Base 10 (Decimal)

11100101

   
   

3287

 

7265

 

 

 

 

 

 

 

 

 

 

 

  1. You are the IT Infrastructure Specialist on a desktop refresh project responsible for defining the hardware requirements, verification, and implementation plan. First, identify a structured methodology, then briefly describe the steps you would take to initiate and bring the project to a successful conclusion.

 

 

 

 

 

 

 

  1. What is a communications protocol and why are they needed? Specifically describe at least two functions that communications protocols provide that support IT infrastructure.

 

 

 

 

 

 

 

 

  1. What is a network topology? List and define at least three examples of network topologies, along with their pros and cons.

 

 

 

 

 

 

  1. Answer the following questions on networks by choosing the best answer:

 

a. The sole purpose of an IP is to _________.

 

A) negotiate frame sizes

B) correctly route datagrams across the network

C) identification and management of sockets

D) manage connections

 

b. The theoretical maximum number of hosts under IPv6 is _________.

 

A) 232

B) 264

C) 2128

D) 2256

 

c. The unique physical address burned into every network interface card is its _________.

 

A) IP address

B) NIC address

C) LAN address

D) MAC address

 

d. Analysts worry that cyber warfare might someday be targeted toward: _________.

 

A) DARPANet

B) SCADA systems

C) gateway servers

D) firewalls

 

 

 

 

 

 

  1. Define the following devices and explain their role in network communications:

 

a. Hub

 

 

 

b. Switch

 

 

 

c. Router

 

 

 

d. Network Interface Card

 

 

 

 

 

 

 

 

  1. What is the backbone for the Internet? Briefly describe how the Internet facilitates data sharing.

 

 

 

 

 

 

 

 

  1. Consider the following questions about internal hardware size:

 

a. A single CPU processes one instruction at a time. Adding a second CPU (or core) allows the system to process two instructions simultaneously, effectively doubling the processing power of the system. A third core will offer triple the processing power of a single CPU, and so on. However, studies have shown that, in general, the expected increase in computing power starts to decline when the number of cores grows large, beyond eight or so. Why would you expect this to be the case?

 

 

 

 

b. The technologist's notion of Moore's Law is that the number of transistors per chip doubles approximately every 18 months. In the 1990s, Moore's Law started to be described as the doubling of microprocessor power every 18 months. Given this new variation of Moore’s Law, answer the following: After successfully completing your computer organization and architecture class, you have a brilliant idea for a new chip design that would make a processor six times faster than the fastest ones on the market today. Unfortunately, it will take you four and a half years to save the money, create the prototype, and build a finished product. If Moore’s Law holds, should you spend your money developing and producing your chip or invest in some other venture? Explain your answer.

Answers

(3)
Status NEW Posted 05 Sep 2017 08:09 AM My Price 8.00

Hel-----------lo -----------Sir-----------/Ma-----------dam----------- T-----------han-----------k y-----------ou -----------for----------- us-----------ing----------- ou-----------r w-----------ebs-----------ite----------- an-----------d a-----------cqu-----------isi-----------tio-----------n o-----------f m-----------y p-----------ost-----------ed -----------sol-----------uti-----------on.----------- Pl-----------eas-----------e p-----------ing----------- me----------- on----------- ch-----------at -----------I a-----------m o-----------nli-----------ne -----------or -----------inb-----------ox -----------me -----------a m-----------ess-----------age----------- I -----------wil-----------l

Not Rated(0)