Using an appropriate diagram:
1. Apply the fetch, decode & execute machine cycle to explain
pipelining and parallelism in the context of computing
a) Write an assembly program using MARIE's assembly Instruction set that prompts the user to enter a non-negative integer that is less than 10. The program should include a subroutine that keeps prompting until a valid value is obtained. When a valid number is entered, it will be displayed. (Hint: Use JNS & JUMPI instructions to implement the subroutine)
N.B: You should include the MARIE code in your Answer, with an explanation of each instruction in your code beside it. Example: Subt One /Subtract 1 from AC
b) Add a screenshot of the simulation, showing the result (A screenshot of the MARIE Simulator window after running the program). Instructions: - Use “ORG” instruction to start your program at address equivalent to 25610. - Use your last university ID number to input the value of X. For example, if your ID is1915161678234, then you will use the number 4 as the value of x. - Do not forget to change the representation of the Input and Output windows in the simulator to Decimal.
Discuss security measures to put into place in order to mitigate various cloud security threats.
Describe the various positions in information security, and list the duties, tasks, and responsibilities associated with each position.
What kind of businesses are most likely to benefit from using Cloud computing?
Provide justification for your answer.
1. Suppose end system A wants to send a large file to end system B. At a very high level, describe how end system A creates packets from the file. When one of these packets arrives to a router, what information in the packet does the router use to determine the link onto which the packet is forwarded? Why is packet switching in the Internet analogous to driving from one city to another and asking directions along the way?
How big of a role do green issues such as energy efficiency
What is the Network ID, Broadcast Address, First Usable IP, or Last Usable IP on the sub-network
that the node 192.168.1.15/26 belongs to?
What is deadlock? What is starvation? How do they differ from each other?
You are a network administrator, been tasked to create a network connection of 3 different departments. Each department has got 3 pc's. In your network include DNS server, Web server, email server