Suppose, you are a developer of a software company named 'HackerMan'. Your supervior asked you to...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Suppose, you are a developer of a software company named 'HackerMan'. Your supervişor asked you to develop a password program, for MIPS architecture, that can both generate passwords and break them. After building the program, you observed that the program was taking 19101799 milliseconds to execute and the password generation was taking 90% of the total execution time. After reporting to your boss fearfully, he said it was unacceptable and threatened to fire you unless you can increase the whole program's performance by a factor of 5 by optimizing the password generation. Now, your job's future rests in your optimization skills and the results of your analysis. Let's start with the analysis. Question 1: You need to improve the password generation operation by a factor of what, to meet the requirements? Is it even possible to meet the requirements? If not then why? [4 Marks] In the meantime, you are thinking if you can decrease the execution time of the password breaking operation. You thought of a slight optimization of that operation and made some rough calculations: the optimized algorithm would have an average CPl of Y and instruction count of 1*107 Now answer the following question. Question 2: How much processing speed would you require for running the optimized algorithm? [4 Marks] Suppose, you are a developer of a software company named 'HackerMan'. Your supervişor asked you to develop a password program, for MIPS architecture, that can both generate passwords and break them. After building the program, you observed that the program was taking 19101799 milliseconds to execute and the password generation was taking 90% of the total execution time. After reporting to your boss fearfully, he said it was unacceptable and threatened to fire you unless you can increase the whole program's performance by a factor of 5 by optimizing the password generation. Now, your job's future rests in your optimization skills and the results of your analysis. Let's start with the analysis. Question 1: You need to improve the password generation operation by a factor of what, to meet the requirements? Is it even possible to meet the requirements? If not then why? [4 Marks] In the meantime, you are thinking if you can decrease the execution time of the password breaking operation. You thought of a slight optimization of that operation and made some rough calculations: the optimized algorithm would have an average CPl of Y and instruction count of 1*107 Now answer the following question. Question 2: How much processing speed would you require for running the optimized algorithm? [4 Marks]
Expert Answer:
Answer rating: 100% (QA)
the solution of this problem is given below Answer 1 Suppose you are a developer of a software compa... View the full answer
Related Book For
Statistics for Business and Economics
ISBN: 978-0132930192
8th edition
Authors: Paul Newbold, William Carlson, Betty Thorne
Posted Date:
Students also viewed these computer engineering questions
-
Suppose you are a high tax bracket taxpayer. How could you take advantage of a situation in which the implicit tax rate on a tax exempt asset is different from the marginal tax rate on income from a...
-
Suppose you are a high tax bracket taxpayer. How could you take advantage of a situation in which the implicit tax rate on a tax exempt asset is different from the marginal tax rate on income from a...
-
Suppose you are a perfectly competitive firm producing computer memory chips. Your production capacity is 1000 units per year. Your marginal cost is $10 per chip up to capacity. You have a fixed cost...
-
What is the capacity for each of the containers in Problems 4754? (Give answers in the U.S. system to the nearest tenth of a gallon or in metric to the nearest tenth of a liter.) Orange 25 cm Juice...
-
Explain how DBS has used technology to vary the marketing mix from the extract and explain other opportunities for varying the mix.
-
Look at Table: a. Suppose the debenture was issued on September 1, 1992, at 99.489%. How much would you have to pay to buy one bond delivered on September 15? Dont forget to include accrued interest....
-
According to the Supreme Court decision in Quill Corp. v. North Dakota, a state may not require a retailer with no physical presence in the state to collect and remit sales tax on sales made in the...
-
Ehrlich Co. began business on January 2, 2013. Salaries were paid to employees on the last day of each month, and social security tax, Medicare tax, and federal income tax were withheld in the...
-
returns the number of rows that contain the integer parameter. For example, if the array (as created by the Write a method called findRows that takes a two-dimension array of integers and an int as...
-
Write a paper about knowledge management strategy formulation this project provides an opportunity for you to identify opportunities for knowledge management at a real-world business and to suggest...
-
Discuss the process of team development in project resource management.
-
QF09/2612-4.0E 23. Consider the following MATLAB commands: count = 0; i=1; while (i
-
Meriden Ltd., a CCPC, had a non-eligible RDTOH (Refundable Dividend Tax on Hand) account balance of $23,500 on December 31, 2022, the end of its 2022 taxation year. The GRIP (General Rate Income...
-
Denny owns a restaurant that sells lunch for $15. The food cost of sales used in producing each set lunch is $5. Additional variable costs are $5 per lunch. What is the contribution margin expressed...
-
Is social Media a good Think what are your thoughts on Law Enforcement using SOcial Media to catch criminals what are your thoughts on Social Media as it pertains to being used by employers to decide...
-
an exception occurs in a try - catch block, the code in the finally clause Finis O a . . is not executed if the exception is caught O b . . is executed O c . . is not executed O d . . may be executed
-
2. Write a Java program that computes the size of a pizza and determines its price per square inch, given its diameter and price. 1. Declare a class named constant (PI) for ]-3.14159265. 2. Declare...
-
Why do markets typically lead to an efficient outcome for buyers and sellers?
-
The president of Floor Coverings Unlimited wants information concerning the relationship between retail experience (years) and weekly sales (in hundreds of dollars). He obtained the following random...
-
The data file Earnings per Share shows earnings per share of a corporation over a period of 28 years. Use a computer to prepare a time plot of this series and comment on the components of the series...
-
Of 100 patients with a certain disease, 10 were chosen at random to undergo a drug treatment that increases the cure rate from 50% for those not given the treatment to 75% for those given the drug...
-
An MMW side looking SAR has the following specifications: radar velocity v = 70 m/s, elevation angle = 35, operating frequency f0 = 94 GHz, and antenna 3 dB beam width 3dB = 65 mrad. (a) Calculate...
-
Consider a synthetic aperture radar. You are given the following Doppler history for a scatterer: {1000 Hz, 0, 1000 HZ}, which corresponds to times {10 ms, 0, 10 ms}. Assume that the observation...
-
A side looking SAR takes on eight positions within an observation interval. In each position, the radar transmits and receives one pulse. Let the distance between any two consecutive antenna...
Study smarter with the SolutionInn App