Suppose, you are a developer of a software company named 'HackerMan'. Your supervisor asked you to...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Suppose, you are a developer of a software company named 'HackerMan'. Your supervisor asked you to develop a password program, for MIPS architecture, that can both generate passwords and break them. After building the program, you observed that the program was taking 18101599 milliseconds to execute and the password generation was taking 90% of the total execution time. After reporting to your boss fearfully, he said it was unacceptable and threatened to fire you unless you can increase the whole program's performance by a factor of 5 by optimizing the password generation. Now, your job's future rests in your optimization skills and the results of your analysis. Let's start with the analysis. Question 1: You need to improve the password generation operation by a factor of what, to meet the requirements? Is it even possible to meet the requirements? If not then why? [4 Marks] In the meantime, you are thinking if you can decrease the execution time of the password breaking operation. You thought of a slight optimization of that operation and made some rough calculations: the optimized algorithm would have an average CPI of Y and instruction count of 1*107. Question 2: How much processing speed would you require for running the optimized algorithm? [4 Marks] Suppose, you are a developer of a software company named 'HackerMan'. Your supervisor asked you to develop a password program, for MIPS architecture, that can both generate passwords and break them. After building the program, you observed that the program was taking 18101599 milliseconds to execute and the password generation was taking 90% of the total execution time. After reporting to your boss fearfully, he said it was unacceptable and threatened to fire you unless you can increase the whole program's performance by a factor of 5 by optimizing the password generation. Now, your job's future rests in your optimization skills and the results of your analysis. Let's start with the analysis. Question 1: You need to improve the password generation operation by a factor of what, to meet the requirements? Is it even possible to meet the requirements? If not then why? [4 Marks] In the meantime, you are thinking if you can decrease the execution time of the password breaking operation. You thought of a slight optimization of that operation and made some rough calculations: the optimized algorithm would have an average CPI of Y and instruction count of 1*107. Question 2: How much processing speed would you require for running the optimized algorithm? [4 Marks]
Expert Answer:
Answer rating: 100% (QA)
ANSWER ANS 1 We need to increase the password gener... View the full answer
Related Book For
Posted Date:
Students also viewed these computer engineering questions
-
Suppose you are a high tax bracket taxpayer. How could you take advantage of a situation in which the implicit tax rate on a tax exempt asset is different from the marginal tax rate on income from a...
-
Suppose you are a high tax bracket taxpayer. How could you take advantage of a situation in which the implicit tax rate on a tax exempt asset is different from the marginal tax rate on income from a...
-
Suppose you are a perfectly competitive firm producing computer memory chips. Your production capacity is 1000 units per year. Your marginal cost is $10 per chip up to capacity. You have a fixed cost...
-
Consider the utility function U(x 1 , x 2 ) = x 1 x 2 with budget constraint p 1 x 1 + p 2 x 2 = c. (a) Show that the maximum of U(x 1 , x 2 ) subject to the budget constraint is equal to c 2 /(4p 1...
-
What are the goals of acquisition and retention in an online context?
-
1. Consider your own online shopping patterns. How much weight do you place on the presence of a name or logo or other trademark (such as the Kitchen Aid silhouette) on a Web site when purchasing...
-
Can you create a graphic of the Fairmont payroll systems company expenses that highlight general accounting clerk, Mary Perez, has company expenses for FICA (social security), Medicare and 401K,...
-
Fleet Inc. is an athletic footware company that began operations on January 1, 2012. The following transactions relate to debt investments acquired by Fleet Inc., which has a fiscal year ending on...
-
QUESTION IO.17 (Applicationofdecline invaluemethods) George Bensonisa45-year-oldresident taxpayerwhohasconducted businessasanITProgrammerfor8yearsandhasannualturnover below...
-
Laurman, Inc. is considering a new project and has provided the details of the project. The Controller has asked you to compute various capital budgeting methods to help aid in the decision to pursue...
-
Make a timeline of technological breakthroughs from 2000 up to the present. Since there are so many inventions between these periods, choose only those inventions that are significant and have made a...
-
The acronym TOADS (Time, Opportunity, Ability Desire, and Stimulus) indicates specific factors that lead up to and allow violence to occur. Explain why it is important to understand TOADS in order to...
-
What is a good and substantial response to this question? Why are juries so accepting of scientific evidence, including DNA evidence? Please explain
-
Given the following grammar, build a table, including the content of a stack and input, the actions a shift - reduce parser might take in parsing the input id 1 * id 2 . E - > E + T | T T - > T * F |...
-
Ausma Co is a profitable Latvian company. After securing an extension to an existing contract, the directors of Ausma Co are reviewing the scenarios relating to an equipment that is a key part of the...
-
What do you feel has led to the growth and related demands of security management in the United States at present? Conversely, what do you feel serves as primary challenges to security professionals...
-
A text is given. Write a program that modifies the casing of letters to uppercase at all places in the text surrounded by and tags. Tags cannot be nested. Example: We are living in a yellow...
-
Subprime loans have higher loss rates than many other types of loans. Explain why lenders offer subprime loans. Describe the characteristics of the typical borrower in a subprime consumer loan.
-
What is distributed data processing?
-
Are any time lags in recording economic events typically experienced in cash disbursements systems? If so, what are they Discuss the accounting professions view on this matter as it pertains to...
-
Define the term assurance.
-
How are risk and return each defined? Do you think there is a relationship between them?
-
Describe the components of a business plan. How does each of these components help the following people to make decisions about a business? (a) An investor. (b) A creditor. (c) A manager or owner.
-
Define relevant range. Why is it important?
Study smarter with the SolutionInn App