answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kobusy [5.1K]
2 years ago
11

A computer has 4 GB of RAM of which the operating system occupies 512 MB. The processes are all 256 MB (for simplicity) and have

the same characteristics. If the goal is 99% CPU utilization, what is the maximum I/O wait that can be tolerated?
Computers and Technology
1 answer:
Afina-wow [57]2 years ago
3 0

Answer:

1-p^{14} = 0.99

p^{14}= 0.01

p =(0.01)^{1/14}= 0.720

So then the value of the maximum I/O wait that can be tolerated is 0.720 or 72 %

Explanation:

Previous concepts

Input/output operations per second (IOPS, pronounced eye-ops) "is an input/output performance measurement used to characterize computer storage devices like hard disk drives (HDD)"

Solution to the problem

For this case since we have 4GB, but 512 MB are destinated to the operating system, we can begin finding the available RAM like this:

Available = 4096 MB - 512 MB = 3584 MB

Now we can find the maximum simultaneous process than can use with this:

\frac{3584 MB}{256 MB/proc}= 14 processes

And then we can find the maximum wait I/O that can be tolerated with the following formula:

1- p^{14}= rate

The expeonent for p = 14 since we got 14 simultaneous processes, and the rate for this case would be 99% or 0.99, if we solve for p we got:

1-p^{14} = 0.99

p^{14}= 0.01

p =(0.01)^{1/14}= 0.720

So then the value of the maximum I/O wait that can be tolerated is 0.720 or 72 %

You might be interested in
You have been tracking your exercise routine, which involves running, lifting weights, yoga, and stretching. You want to see wha
Harrizon [31]

The best chart to see the data distribution for the exercise routine would be a pie chart. Using Microsoft Excel, you can input each data point you have for all you exercise routine category, and generate a pie chart which will show you the percentage for each category in comparison to the total.


5 0
2 years ago
Read 2 more answers
As part of the duties of a digital forensics examiner, creating an investigation plan is a standard practice. Write a 3 to 4 (no
Simora [160]

Answer:

A digital forensic investigation is a special case of a digital investigation. Where the procedure and techniques are used will allow the results to be entered into cost of low foreg on investigation may be started to answer a question about whether or not centraband digital images exist on a computer.

Here we are considering the case of Global Finance Company with wide range of financial products and wide range of customers throughout the world. A suspect of compromise has been detected from the manager's computer. Now the team has been deployed to the branch office and conduct the Digital Forensic Investigation.

Concern of the Company

1. Regular updates for application infrastructure and network infrastructure.

2. One branch managers from porisbane branch felt compromises in his computer.

3. Both the servers and work station from all the offices are based on Microsoft Windows.

4. The firewalls and network segmentation are fully implemented.

5. Through intrasion detection and logging exist in the brances these are hardly used.

Digital Forensic Investigation Approach

The audit term of the Global Finacnce Company can follow four step. The digital forensic investigation model stands to be most effective model for investigation of the compromise happened int he reginal branch of the Global Finance Company.

1. Collection

a. All information from the manager's workstation, servers and other workstations must be collected.

b. Obtain all the important informtation.

c. Identify storage context noth internal and external devices.

d. Forensic tools that are applicable and to be used for the investigation are to be listed and made available for usage.

e. Target computer forensic imaging to be done and hashed to check the integrity of data.

f. Line network traffic has to captured.

Digital Evidance Collection done in two stages:

Volatile memory is the temporary memory and primary volatile memory is RAM

By cinning command: Cryptcat6543 -k key

Computer data can now required with the command Cryptcat -1 -p6543 -k key>>

Non volatile Memory Acquisition: Permanent memory or volatile memory stands significant source for the digital forensic investigation.

Parmanent data is collected through both online and offline methods:

Offline data is collected from the hard drive applications tool such as Guymayers etc.

Online data like firewall logs, antivirus logs and domain controller log with help of wires work and ethernal collected.

2. Examination

Once the data collected detailed examination is done by comparing the original and logical copies collected. Such examination gives us clues of how manege for window registry examination. Command used echo text_mess > file1.text : file2.txt

The above file retrieved through the command more < file1.txt : file2.txt

The network forensic is enabled using the tools and techniques so that the following potential information can be accessed.

System Information, Service listing, Process listing, Registry information, Binary dumped of memory

3. Analysis with Assumption

Many tools and methodologies are used by the audit team to analyse the collection and examined evidence. Analysis is done according to the following:

a. Leyword searches in all the files

b. Recovering the deleted files

c. Registry information extraction from the workstation

The tools used in this phase are FTK and ILOOKIX. These tools are helpful to recover the document, chat, logs, emails.

4. Report

The final report is generated by the audit team

Purpose of report Digital Forensic investigation conducted on the compromise of manager's computer

Author of the report Aufit Team

Incident Summery The source of compromise are x, y, x

Evidence All the effected files, registry, log files

Analysis All the analyzed data analyzed

Conclusion All digital evidence are extracted and found from the source

Document support volatile and non volatile data, tools, log info, registry info and so on.

7 0
2 years ago
Does the Boolean expression count &gt; 0 and total / count &gt; 0 contain a potential error? If so, what is it?
Semenov [28]

<u>Answer:</u>

<em>Assuming that all the necessary declarations are made and given statements are only an extract, we can conclude that the given piece of code contains error. </em>

<u>Explanation:</u>

Let us analyze each one in order.

<em>count >0 </em> This statement is right if we match this with the <em>syntax of regular comparison operation</em>. Here count is an operand, “0” is the constant operand and these two operands are operated by the operator “>”.

when we take total / count >0 Here count>0 returns <em>Boolean and total is assumed to be an integer and an integer cannot be divided by a Boolean value. so it can be rectified as (total / count)>0. </em>

6 0
2 years ago
python Write a function that computes a future investment value at a given interest rate for a specified number of years. The fu
Svetlanka [38]

Answer:

def future_investment_value(investment, monthly_interest_rate, years):

  print("Years\tFuture Value")

  print("- - - - - - - - - - -")

  for i in range(1, years+1):

      future_value = investment * ((1 + monthly_interest_rate) ** (12 * i))

      print(i, "\t\t", format(future_value, ".2f"))

investment = float(input("Enter the invesment amount: "))

interest = float(input("Enter the annual interest rate: "))

year = int(input("Enter the year: "))

future_investment_value(investment, interest/1200, year)

Explanation:

Inside the function:

- In the for loop that iterates through the years, calculate the future value using the formula and print the results

Then:

- Ask the user for the investment, annual interest rate, and year

- Call the function with the given inputs

4 0
2 years ago
Which formula would you enter into C3, and then AutoFill into C4 through C6, to calculate the percent sales (Pct.) for the regio
inna [77]

Answer:

In C3, you would enter the formula:

  • =B3/$B$7%

Explanation:

Let's assume the first row is 1 and it contains the titles of the columns.  For instance, the content of the cellss A1:C1 could be:

  • A1: Region
  • B1: Sales
  • C1: Percent Sales

Also, assume the second row is empty and the cells on the first column, A, contain the names of four regions. For instance, North, South, East, and West:

  • A3: North
  • A4: South
  • A5: East
  • A6: West

The cells B3:B6 contain the sales for the four regions. For instance:

  • B3: 200
  • B4: 300
  • B5: 100
  • B6: 400

Then, you must calculate the percent sales for every region, in the cells <em>C3:C6.</em>

That means, you must divide the sale of every region by the total of sales and multiply by 100.

To do that in the worksheet you do this:

<u>1. Sum the sales for the regions:</u>

  • In cell B7 introduce: =SUM(B3:B6)

<u>2. Calculate the percent sale for the first region:</u>

  • In cell C3 introduce: =B3/$B$7%

That means that the reference B3 is relative: when you copy that formula, the column (B) and the row (3) will change accordingly to the cell where you will copy it.

Thus, by using the Autofill into C4 through C6, the column wil remain unchanged (C) and the row will change to 4, 5, and 6, respectively.

The symbol $ used in $B$7 make the reference absolute. That means that they will not change. The symbol % makes that the result is multiplied by 100.

<u>3. When you use Autofull into C4 through C6, you obtain:</u>

  • C4: =B4/$B$7%
  • C5: =B5/$B$7%
  • C6: =B6/$B$7%
4 0
2 years ago
Other questions:
  • Let's assume that the smallest possible message is 64 bytes (including the 33-byte overhead). if we use 100base-t, how long (in
    10·1 answer
  • Why would someone need to use tools like IECacheView or MyLastSearch on a system? Do companies have the right to search a workst
    11·1 answer
  • Given a pattern as the first argument and a string of blobs split by | show the number of times the pattern is present in each b
    14·1 answer
  • The term Electronic Privacy Information Center (EPIC) refers to a form of the digital subscriber line technology, which enables
    6·1 answer
  • An extranet is like an intranet except that it allows company employees access to corporate Web sites from the ______
    13·1 answer
  • PYTHON CODE ONLY:
    7·1 answer
  • reAay ouyay aay hizway ithway igPay atin?Lay? (Translated: "Are you a whiz with Pig Latin?") Write a program that converts an En
    6·1 answer
  • Write a split check function that returns the amount that each diner must pay to cover the cost of the meal The function has 4 p
    14·1 answer
  • Which of these are characteristics of a Python data type? Check all that apply.
    11·1 answer
  • A company has deployed four 48-port access layer switches to a switch block. For redundancy each access layer switch will connec
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!