subject

Alice p. hacker has two types of memory that she's using to build her system to store her objects. the first type, type a is extremely fast, but it's expensive and she doesn't have much of it. she has 10gb of type a memory that can being used to store objects, and reading an object from this memory takes 5ms. the second type of memory, type z, is a lot slower, but it's cheap, and so alice bought a lot of it. she has 1tb of the second type of memory that she can use to store objects, and reading an object from this memory takes 200ms. alice decides she's going to build a system where she keeps all of her objects in the second type of memory, and then also keeps copies of some of those objects in the first type so that she can do some of her reads more quickly. alice has 2048 objects, all of the same size, which use up all of her second type of memory storage. alice decides to analyze different ways to pick and choose what she keeps in her type a memory, and how they affect her expected object read performance. round all answers to 3 decimal places. if alice is naive and decides to randomly fill her type a memory with objects and never change it, what is her expected time to read 10 randomly selected objects out of the 2048 (in ms)? alice now runs a workload where she reads 20 objects per minute. 50% of the objects she reads are objects she's seen in the past 30 seconds, and the other 50% of the objects are randomly chosen from the full 2048. using the same naive strategy as before, what is her expected average read time for an object with this workload? alice tries to improve her performance. she decides that every time she reads an object, if it is not in her type a memory, she will put it there. when she needs to remove something, she will remove the thing that she read least recently what is alice's average read time per object in the best case scenario? what is alice's average read time per object in the worst case scenario?

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 21:30
Asuccessful format string attack attempted to steal user account information by reading from unauthorized memory. answer the followings with proper explanation a)this attack will lead to violation of which security policies?
Answers: 2
question
Computers and Technology, 23.06.2019 14:30
Select the correct answer. peter has launched a website that features baby products. however, clients often find they are unable to access the website because the server is down. which feature of cybersecurity should peter focus on for his website? a. data authenticity b. data privacy c. data availability d. data integrity e. data encryption
Answers: 3
question
Computers and Technology, 24.06.2019 00:50
Which player type acts on other players? a. killer b. achiever c. explorer d. socializer
Answers: 1
question
Computers and Technology, 24.06.2019 17:40
This assignment continues work on the online booking facility introduced at the end of chapter- 10. the work will be continued in the assignments for chapters 14 and 15 (a) assume that you will produce your online booking facility using an agile approach. i. suggest the kind of user research you would like to conduct for your product before iteration cycles begin. ii prioritize the requirements for your product according to business value, i.e which requirements are likely to provide the greatest business benefit, and sketch out the ux design work you would expect to undertake during the first four iteration cycles, i.e. cycle 0, and cycles 1 to 3. (b) using one of the mockup tools introduced above, generate a mockup of your product's landing page, as developed in the assignment for chapter-11 (c) using one of the patterns websites listed previously, identify suitable interaction patterns for elements of your product, and develop a software-based prototype that incorporates all the feedback and the results of the user experience mapping achieved at the end of chapter-11. if you do not have experience in using any of these, create a few html web pages to represent the basic structure of your website
Answers: 2
You know the right answer?
Alice p. hacker has two types of memory that she's using to build her system to store her objects. t...
Questions
question
Mathematics, 07.01.2021 22:10
question
Mathematics, 07.01.2021 22:10
question
Mathematics, 07.01.2021 22:10
Questions on the website: 13722367