Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Q. What is Sun and Nis Law?
The Sun and Ni's Law is a simplification of Amdahl's Law and Gustafson's Law. The basic concept underlying Sun and Ni's Law is to find solution to a problem with a maximum size with limited requirement of memory. These days there are numerous applications that are bounded by memory in contrast to processing speed. In a multiprocessor based parallel computer every processor has an independent little memory. So as to resolve a problem generally problem is splitted in sub-problems in addition distributed to several processors. It should be noted the size of sub-problem must be in proportion with size of independent local memory available with processor. For provided problem when large set of processors is concluded together in that scenario overall memory capacity of system rises proportionately. So rather than following Gustafson's Law which implies that fixing execution time size of problem can be increased further such that memory could be utilized. The above method helps in producing more exact solution as problem size has been increased.
Which is not a key piece of information, stored in single page table entry, assuming pure paging and virtual memory Ans. A reference for the disk block which stores the page is
Define bus. When a word of data is transferred among units, all the bits are transferred in parallel over a set of lines called bus. In addition to the lines that take the data
What are the advantages of Public Key Cryptography? Advantages of Public Key Cryptography are illustrated in below: a) Increased convenience and security and b) Electro
Performance of Pipelines with Stalls: A stall is reason of the pipeline performance to degrade the ideal performance. Average in
What are the fundamental steps in program development The basic steps in program development are as follows: a. Program coding, design and documentation. b. Preparation o
How many lines of address bus must be used to access 2048 bytes of memory when available RAM chips 128 × 8. How many lines of these will be common to each chip? Ans. AS chips
A class is made abstract by declaring one or more of its virtual functions to be pure. A pure virtual function is one with an initializer of = 0 in its declaration
Define thread cancellation & target thread. The thread cancellation is the task of terminating a thread before it has done. A thread that is to be cancelled is often referred
First Generation Electronic Computers (1937-1953) Three machines have been promoted at different times as first electronic computers. These machines used electronic switches
What are the aspects of security policy The security policy should cover aspects such as network service access, physical access, limits of acceptable behaviour, company's pro
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd