If you wanted to make the system sequentially consistent, what are the key constrains you need to impose

Answers

Answer 1

Answer:

The call of instructions and data must be sequential, there can be no reordering of instructions but to allow reordering, a fence must be created.

Explanation:

Sequential consistent memory model is able to use instructions when or before processing is done and after processing, so long as the instruction order is sequential.

This is similar to uploading a video on you-tube, the site immediately creates a page for the video even before the video is fully uploaded. Sent tweeter messages are seen by different people at different times, but the messages appear to be arranged sequentially.


Related Questions

Internet Explorer inserts the Flash Shockwave Player as a(n) ____ control. Group of answer choices AVI ActiveX Class Quicktime

Answers

Answer:

Internet Explorer inserts the Flash Shockwave Player as a(n) ____ control.

ActiveX

Explanation:

ActiveX controls are small apps, also called “add-ons,” that allow websites to provide content such as videos and games. They also enable web interaction, make browsing more enjoyable, and allow animation. However, these ActiveX controls can sometimes malfunction, produce unwanted contents, or install spyware in your system because they exercise the same level of control as the computer user.

Asymmetric encryption uses only 1 key.

A)
False

B)
True

Answers

A.) false

Symmetric encryption uses a single key that needs to be shared among the people who need to receive the message while asymmetric encryption uses a pair of public key and a private key to encrypt and decrypt messages when communicating.
A) false is the answer

Professor Gig A. Byte needs to store text made up of the characters A with frequency 6, B with frequency 2, C with frequency 3, D with frequency 2, and E with frequency 8. Professor Byte suggests using the variable length codes:
Character Code
A 1
B 00
C 01
D 10
E 0
The professor argues that these codes store the text in less space than that used by an optimal Huffman code. Is the professor correct?

Answers

Answer:

This is not true

Explanation:

The optimal Huffman code is used to encrypt and compress text files. It uses fixed-length code or variable-length code for encryption and compression of data.

The professor's character code is similar to Huffman's variable-length coding which uses variable length od binary digits to represent the word strings. The file size of the text file above is;

= 6 x 1 + 2 x 2 + 3 x 2 + 2 x 2 + 8 x 1 = 28 bits

This would be the same for both cases.

The encrypt would be the problem as the encoded and decoding of the characters B and E may cause an error.

You want to search for contacts in your email program. You enter the person’s first name and last name in the search box. You want the computer to display the contact with the exact first and last name as well as contacts with either of the names. Which logic gate idea are you using here?
A.
AND
B.
NOT
C.
NAND
D.
OR
E.
NOR

Answers

Answer:

NOR

Explanation:

Answer:

Correct answer: D. OR

Explanation:

Took test

1) Write a statement that defines an array of four integers named miles. The array should be initialized with the values 1, 5, 9, and 22.
2) Write a statement that defines an array of string objects nameddirections. The array should be implicitly sized, with an initialization list containing the values "Up", "Down", "Left", and "Right.

Answers

Answer:

Explanation:

The following code statements are written in Java and are simple one line statements that can be into any Java code or function. The first code statement creates a simple integer array with 4 predefined values initialized.

1) int[] miles = {1,5,9,22};

The second code statement creates a simple String array with four-string objects in it.

2) String[] nameddirections = {"Up", "Down", "Left","Right"};

Describe one practical application of total internal reflection. ​

Answers

Answer:

The phenomenon of total internal reflection of light is used in many optical instruments like telescopes, microscopes, binoculars, spectroscopes, periscopes etc. The brilliance of a diamond is due to total internal reflection. Optical fibre works on the principle of total internal reflection.

Explanation:

thank me later but if it wrong. sorry

One vulnerability that makes computers susceptible to walmare is:
A. A using antimalware software
B. Using password software
C. Using old versions of software
D. Using encryption on sensitive files

Answers

C using old versions of software

list any three importance of computer​

Answers

Answer:

here is the answer

Explanation:

1) accurate

2) fast

3) can accomplish tasks more effencily

Type the correct answer in the box. Spell all words correctly.

A freelance graphic designer has received an assignment to design a company logo. What image format is most suitable to display this logo on the company website?

The _________ format is most suitable in order to display the logo on the company website.

Answers

Answer:

The most suitable format for logo is PNG

Explanation:

PNG stands for portable network graphics. It is an improved version of gif. The best thing in png is that it is lossless compression and the background is not visible. Both 24 and 32 bit Colour can be used in png. PNG became ISO standard in sixteen years ago in 2004.

What is the main advantage of using a WYSIWYG (“what you see is what you get”) editor when constructing a website?
Only one programming language is required.
Websites may have more professional construction.
Knowledge of HTML is not required.
Website templates are not necessary.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer among the given options to this question is:

Knowledge of HTML is not required.

Because when you are constructing a website using WYSIWYG (“what you see is what you get”) editor, then you don't need the knowledge of HTML. Because, when you use WYSIWYG editor to insert button, table, images, text, paragraph, etc. It will automatically insert HTML code behind the page. For example, you can insert a form and a submit button using drag and drop with the help of WYSIWYG (“what you see is what you get”)  editor, for this purpose, you don't need exact knowledge of HTML. WYSIWYG (“what you see is what you get”)  automatically inserts the HTML for the form and button on a website page.

While other options are not correct because:

Using the WYSIWYG (“what you see is what you get”)  editor, you can use different programming languages in your website, such as VB.net, Asp.Net, C#, Javascript, Bootstrap, etc. It is not necessarily that you may have more professional construction and in WYSIWYG (“what you see is what you get”)   website templates are mostly used and modified using WYSIWYG editor.

Answer:

(C):Knowledge of HTML is not required.

Write, in your own words, a one-two paragraph summary on the Running Queries and Reports tutorials. Apply critical thinking and an academic writing style that demonstrates your understanding of the difference between a Microsoft Access database and an Excel spreadsheet by comparing the features of each and when they would be used as personal computer applications if applicable.

Answers

Answer:

Running queries in SQL or structured query language interacts with a relational database. It is used to create new databases and tables, read the content of the database tables, update and also delete the content.

Microsoft Access is a database software but Excel is a spreadsheet application.

Explanation:

Access databases hold large datasets that can be accessed from other platforms and generate automatic query while datasets in Excel are limited but it has comprehensive statistical tools for data analysis.

While your hands are on home row, both of your thumbs are on _____.

Answers

Answer:

While your hands are on home row, both of your thumbs are on Space-barI know this will definitely help✍️✍️✍️

write passage on computer virus​

Answers

In more technical terms, a computer virus is a type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another. A virus operates by inserting or attaching itself to a legitimate program or document that supports macros in order to execute its code.

Answer:

A computer virus is a relatively small program that attaches itself to data and program files before it delivers its malicious act. There are many distinct types of viruses and each one has a unique characteristic. Viruses are broken up into to main classes, file infectors and system or boot-record infectors.

hope it helps

How would you change your prompt to have it display the current time (hour and minute) and the full path of the current directory?

Answers

Answer:I tried using following command:

Code:

export PS1="$(date +%k:%M:%S) $ "

but it gave me a fixed time in prompt whereas my objective is to get the current time everytime.

Code:

$ export PS1="$(date +%k:%M:%S) $ "

17:42:42 $

17:42:42 $ date

Tue Oct  2 17:42:54 PDT 2012

17:42:42 $

Explanation:

Which statement is true?
1)A deque is a type of collection,
2)A collection is a type of deque.
3)A list is a type of deque.
4)A deque is a type of list.

Answers

Answer:

1. A deque is a type of collection.

Explanation:

The statement that is true is as follows:

A deque is a type of collection.

Thus, the correct option for this question is A.

What is Deque?

Deque may be defined as an ordered and systematic collection of items similar to the queue. It is also known as a double-ended queue. It consists of two ends, a front, and a rear, and the items remain positioned in the collection.

According to the context of this question, a deque is a kind of collection that holds data and information identical to a queue. From here, elements can be added to or eliminated from either the front or back very efficiently.

It is also often called a head-tail linked list. Though properly this signifies specific data with appropriate structure that has been the implementation of a deque.

Therefore, a deque is a type of collection that is a true statement. Thus, the correct option for this question is A.

To learn more about Deque, refer to the link:

https://brainly.com/question/16750037

#SPJ2

Explain how a stored procedure is processed by the DBMS query processor (including the type of return value after the query is processed

Answers

Answer:

The stored procedures in DBMS can be executed with;

EXEC procedure_name

It can also be executed with single or multiple arguments with

EXEC procedure_name (use the at tag here)Address= data1, (use the at tag here)Address= data2;

It returns a status value of the queried table.

Explanation:

A stored procedure is a subroutine used in SQL servers to perform a task on a table in a database or the database itself. The syntax for creating a stored procedure is;

CREATE PROCEDURE procedure_name

And then, other statements can be written to be executed when the procedure is called.

It is always better to get at least 3 times the amount of b-roll needed

True
False

Answers

Answer:

true

Explanation:

Please have a look at the screenshot below

Answers

C. Reliability

Because of the network and recovery time



Plz give brainliest

what does "route print" do?

Answers

Answer:Route is a Windows command that displays and updates the network routing table. These activities will show you how to use the route command to display the local routing table.

Explanation:

Which feature is being used when connecting a device to the network using an electrical outlet?

Answers

Answer:

In other words, a WiFi bridge can convert Ethernet to WiFi. WiFi bridges can be high-performance and can support more WiFi network types than the T7-Pro can.

What is one feature that differentiates social media information systems (SMIS) from Web site applications? A user has to login to a Web site to use the special features. SMIS do not use browsers. A user can comment on a Web site. SMIS has more users than a Web site. SMIS has connection data

Answers

Answer:

A user has to login to a Web site to use the special features.

Explanation:

This is true because, even though website could be able to give the required information needed at that particular point in time, in order to use the special features found in the website, there is need to login into the website.

For example, Brainly which is a website needs the students to login in-order to ask his or her questions where not clarified with an expected answer gotten from the website.

What are the advantages and disadvantages of using steganography versus symmetric or asymmetric encryption

Answers

Explanation:

Steganography is a technique used in securing or hiding sensitive information by encrypting the information in a non-hidden file like a JPEG format. A major advantage of this method is that it reduces the risk of attack or break-in since the data is enclosed in a non-secure file; thereby reducing threats of any hack. One main disadvantage of this method is that the hidden message may become difficult to recover if the source file (non-secure file) used, is edited or deleted.

In symmetric or asymmetric encryption they both employ cryptographic encryption method. While symmetric encryption uses one key to encrypt and decrypt data, asymmetric encryption uses two keys (one for encryption, the other for decryption) of the data. A major advantage of using these methods is that they provide more security. Although while symmetric encryption is faster, asymmetric encryption is slower (eg using separate keys to gain access), a disadvantage.

A strategy for concealing critical information as well as ensuring its secure communication everything in non-hidden storage is steganography.

Advantage:

Because the content is contained throughout a non-secure file, the above strategy decreases the chance of an assault on classified info.

Disadvantage:

This approach has the disadvantage that concealed information might be able to retrieve if somehow the documents have been changed or deleted as of a non-secure file.

Once again to encrypt as well as decode information, symmetric encryption employs a unique key, but asymmetric encryption utilizes two different keys, something for encryption as well as someone else for decryption.

Advantage:

One such approach is superior to steganography throughout the level of protection.

Disadvantage:

Because distinct keys have been needed to get access, such techniques of asymmetric encryption are considerably slower.

Thus the approach above is correct.

Learn more about steganography here:

https://brainly.com/question/15187715

For things like school, you should have a more serious:

Answers

Answer:

who and what do you mean

Explanation:

Documenting findings, actions, and outcomes of network troubleshooting calls is an essential part of the troubleshooting process. List the reasons why documentation is critical, and discuss the form that this documentation could take (e.g. blogs, wikis, professional document management software, etc). Include a detailed description of what information would need to be saved.

Answers

Answer:

The main purpose of documentation is for future reference on the cost, materials, procedures, and techniques used in a task. It can be in form of a video log, report, digital text document or software, etc.  

Explanation:

Documentation is an important practice of taking notes of events during a process. It could in the process of creating or discovering new ideas or repair or management of existing processes. It holds the time, cost, technique, event name, measures-taken, etc, that would totally describe the event.

Which tools can Object Drawing Mode be applied to?
Line tool
Rectangle Tool
Oval Tool
Pencil tool
Pen Tool
Brush Tool

Answers

Answer:

• Line Tool

• Rectangle Tool

• Oval Tool

• Pencil Tool

• Brush Tool.

Explanation:

When people want to animate when using the Adobe Animate CC, it is vital for them to know how to draw shapes like squares, lines, ovals, rectangles, and circles. This is to enable such individuals understand how to draw objects as it can be difficult if they do not know how to draw these shapes.

The tools that Object Drawing Mode be applied to include:

• Line Tool

• Rectangle Tool

• Oval Tool

• Pencil Tool

• Brush Tool.

When the tool is being selected, it should be noted that the option for the drawing mode will be shown in the Property Inspector panel or it can also be seen in the tools panel.

Bluetooth uses this medium to connect two devices.
Select one:
a. microwave signals
b. fiber optics
c. infrared light
d. radio signals

Answers

Answer:

D

Explanation:

Bluetooth is the wireless technology which allows for the exchange of the data between different devices. It uses wavelength to transmit information and generally works with short rage devices.

Due to Bluetooth relies on the range of devices and hence it depends on the UHF radio waves. These have a range of 2.4 to 2.5 Ghz. Such that the devices can talk to each other. The usage is control automation system.

Hence the option D is correct.

Learn more about the uses this medium to connect two devices.

brainly.in/question/5681178.

PLS I WILL GIVE BRAINLIEST IF CORRECT

Select the correct answer.

Stacy is in the process of creating a storyboard for her personal website, but she is unable to decide which storyboarding technique to use. Which technique would work best for her?


A. hierarchical
B. linear
C. webbed
D. wheel

Answers

Answer:webbed

Explanation:

k

Answer:

Webbed

Explanation:

How many permutations for a 7 characters in length string, which contains all following letters R, X, S, Y, T, Z, U, has either the string 'RXS' or string 'ZU' in the 7 characters string?

Answers

Answer:

Following are the solution to this question:

Explanation:

In the following forms, RXS can appear:  

[tex]R X S \_ \_ \_ \_[/tex] it may look like that really, [tex]4 \times 3 \times 2 \times 1[/tex] forms = 24 may construct the remainder of its letters.  

[tex]\_ R X S \_ \_ \_[/tex] it may look like that really,  [tex]4 \times 3 \times 2 \times 1[/tex] forms = 24 may construct the remainder of its letters.  

[tex]\_ \_ R X S \_ \_[/tex] it may look like that really, [tex]4 \times 3 \times 2 \times 1[/tex] forms = 24 may construct the remainder of its letters.  

[tex]\_ \_ \_ R X S \_[/tex] it may look like that really,  [tex]4 \times 3 \times 2 \times 1[/tex] forms = 24 may construct the remainder of its letters.  

[tex]\_ \_ \_ \_ R X S[/tex] it may look like that really,  [tex]4 \times 3 \times 2 \times 1[/tex] forms = 24 may construct the remainder of its letters.  

And we'll have a total of [tex]24 \times 5 = 120[/tex] permutations with both the string RXS.

In the following forms, UZ can appear:

[tex]U Z \_ \_ \_ \_\ _[/tex]  They can organize your remaining 5 characters through 5 categories! Procedures [tex]= 5 \times 4 \times 3 \times 2 \times 1 = 120[/tex]

[tex]\_ UZ \_ \_ \_ \_[/tex] They can organize your remaining 5 characters through 5 categories! Procedures [tex]= 5 \times 4 \times 3 \times 2 \times 1 = 120[/tex]

[tex]\_ \_ U Z \_ \_ \_[/tex]They can organize your remaining 5 characters through 5 categories! Procedures  [tex]= 5 \times 4 \times 3 \times 2 \times 1 = 120[/tex]

[tex]\_ \_ \_ U Z \_ \_[/tex]They can organize your remaining 5 characters through 5 categories! Procedures  [tex]= 5 \times 4 \times 3 \times 2 \times 1 = 120[/tex]

[tex]\_ \_ \_ \_ U Z \_[/tex] They can organize your remaining 5 characters through 5 categories! Procedures  [tex]= 5 \times 4 \times 3 \times 2 \times 1 = 120[/tex]

[tex]\_ \_ \_ \_ \_ U Z[/tex] They can organize your remaining 5 characters through 5 categories! Procedures  [tex]= 5 \times 4 \times 3 \times 2 \times 1 = 120[/tex]

There may be [tex]120 \times 6 = 720[/tex] ways of complete permutations.

If a function is called more than once in a program, the values stored in the function's local variables do not _________ between function calls. g

Answers

Answer:

persist

Explanation:

Calling a function Within a program, can be regarded to as specifying of the name of the function when it is within a statement or it could be by the function itself, it possible for a particular function to call another function, in a case wherby a function returns a value, assignment or using the value to variable is not necessary. It should be noted that If a function is called more than once in a program, the values stored in the function's local variables do not persist between function calls

He should identify his various
online and offline audiences,
and how best to engage them
TRUE
FALSE​

Answers

Answer:

false, that shouldn't be a a priority to identify if they are or not.

Explanation:

Other Questions
Mario ____muy simptico. A. esB. eresC. ests D. est A carnival sold 450 tickets on Saturday. The ticket sales showed that 126 of the ticket sales were adult tickets. What percent of the tickets sold on Saturday were adult tickets?!PLEASE ANSWER!!! Please answer the question below Write an expression for the perimeter of the triangle shown below:A triangle is shown with side lengths labeled 2.3x plus 14, 2x, and negative 0.2x plus 15. 4.1x + 29 4.1x 29 4.5x + 29 4.5x 29 5) How many kilograms are there in 7.50 x 10^26 molecules of sulfuric acid? Rewrite the sentences below in the most concise manner possible. Copy and paste the sentences into the box before rewriting them.The universe is made up of thousands and millions of galaxies, and each of them has innumerous numbers of stars in them.Electronic gadgets of various sorts help us work around the home and the office in a more efficient and capable manner.Shockingly, air pollution is still the one and only leading cause of lung disorders and diseases across the whole wide world.Reading is one of the most unappreciated hobbies of all time because it has the capability to keep you engaged for hours on end.Movies that are based on books are never really up to the mark because they always simply fail to depict every single detail mentioned in the book. Prompt: What did you like about snow days? pls help5 pts - topic sentence5 pts - physical activity5 pts - 5 complete sentences5 pts - conclusion sentence5 pts - spellingMy response: Which US President built the American Empire of the Imperialist Age? Answer this question: Is math really important to giving science power? (remember the 5 Ws and the H) help me Im about to have a meantal break down using powers of 10, which would be the best choice for the first number to subtract in the division problem 4860/15? URGENT! PLEASE HELP!! 30 POINTS!! When writing an argumentative essay, why should you gather evidence during the prewriting stage?A)to better define the prompts topicB)to understand the writers audienceC)to be able to properly organize claimsD)to help decide which claims are supportable I will mark you brainliest if you give me a legit answer Explain one event that escalated American involvement in Vietnam and two events in the war that began to turn American public opinion against US involvement there. solve the right angle trig problem. Help. Will give brainliest :) Jill has a photograph that is 4 inches wide by 6 inches high. If she enlarges it so that the width is 12inches, what will be the height? ____ is the ability to course change in matter which is NOT an important function of context in a news story?!? To help readers understand the topics significanceTo make readers understand the topic To change readers minds about an issueTo provide a clear, vivid picture of events What kinds of toys encourage language? Who introduced the concept of scenery and wrote the ancient Greek play Antigone?PlatoSophoclesHerodotusOedipus Which word is the most different from the others? a. burden b. advantage c. difficulty d. hardship