Premium Essay

Nt1330 Unit 3 Essay

Submitted By
Words 818
Pages 4
Question 2
1) A 64bit CPU can process data sets faster and more efficiently because there are more discrete addresses, a 32bit CPU has somewhere in the region of 4GB of addressable memory where as a 64 bit processor can have up to 16 exa bites of memory (this is the equivalent of 16 billion GB of RAM). This is due to more transistors and improved silicon production processes. 64bit CPU’s can have up to 8 cores where as 32bit CPU’ can only have dual cores. Multiple cores increase processing power and spread the workload which makes it easier to handle larger data sets. Physics researches would most likely prefer a computer which has a 64bit CPU because of the amount of data they will need to process, also some of the applications they may need for certain computations may have minimum requirement of 64bit due to the complexity and scale of the data sets they will be processing. In short, the more free RAM a computer has, the faster it can respond and the more information it can process.

2) …show more content…
All computers are working together but only working on a fraction of the task each, this improves efficiency and performance. Parallel computing is very much the same except the workload is divided among different processors on the one machine. Distributed computing is considered a sub set of parallel computing but it is slower due to the network interface that has to be set up between the different

Similar Documents

Premium Essay

Nt1330 Unit 3 Quiz Essay

...1. When to use standard I/O (A) When working with disk or terminal files (B) When you need to fetch file metadata [a] (C) None (D) All the above 2. Difference between getc and fgetc (a) fgetc can be implemented as macro, where as getc cannot be implemented as macro (b) getc can be implemented as macro, where as fgetc cannot be implemented as a macro [b] (c) getc is used to write a character and fgetc to read a character (d) fgetc to write a character and getc to read a character 3. rewinddir returns (a) 0 (b) -1 [c] (c) no value (d) error (4) The functions which change the execution mode of the program from user mode to kernel mode are known as (a)...

Words: 1393 - Pages: 6

Premium Essay

Nt1330 Unit 3 Assignment 1 Essay

...1. First of all we need to define the first port for Wide Area Network (WAN) connection so the router will connect to the internet via another router with DHCP. In Winbox click IP > DHCP Client and Add DHCP Client to port ether1. Figure 3.6 New DHCP Client 2. Now add the hotspot service to Wireless Lan. Click IP > HotSpot > Setup box, and select wlan1 as hotspot interface. You can accept the default values but choose none for certificate. Leave the IP as it is (192.168.0.x). If you change the IP, the LOGIN and LOGOUT links will not work on your splash page. Figure 3.7 Hotspot Setup 3. The router need to be placed in AP bridge mode. Click interface, double click the wlan1, and click Mode: and select ap bridge. Figure 3.8 Radius Interface 4. You need to add the radius server as authentication and accounting...

Words: 1891 - Pages: 8

Premium Essay

Nt1330 Unit 1 Assignment 3 Essay

...Assignment 3 Kamal Hussain 16179 Standard of RIP, OSPF, BGP: 1. RIP (Routing information protocol): RIP is an interior domain routing protocol used inside an autonomous system. It is very simple protocol based on distance vector routing. RIP implements distance vector routing directly with some considerations. RIPs uses the services of UDP protocols that is completely known port 520. In routing information protocol has many different sections these are: RIP messages, requests and responses, timer, version and encapsulation etc. Now a request message is sent to the router and that may be taken some timeout in each entry, a request can ask about all entries....

Words: 689 - Pages: 3

Premium Essay

Nt1330 Unit 3 Lab Report Essay

...Taskhost-exe file is used as a host by Windows for all the DLL based services which are run. The process concerning the aforementioned file is looked upon as a generic one used for the sole purpose of loading other entities. In case, of Taskhost.exe $(arg0) specific issues, its sheer ability to open multiple instances of itself gets affected in a great way. Remember, a slight infection to the aforementioned version of dossier might cause issues specific to CPU and excessive memory usage. Identical processes running Taskhost.exe 2 running processes system error is quite common and in all such cases you shall find that there are two identical executable file versions running. The bothering aspect with a similar type of fault is that, in spite, of scanning the flash drive and movies with MSE nothing could really be detected. The thought as to whether it is normal to have more than a single executable file version is the aspect which bothers the gamut of all system users. Further, most seem to be confused if the particular version of the dossier enjoys a normal command line. Upload related issues Issues specific to Taskhost.exe bsod in windows 8 are common and initially when this happens you might face trouble with some of the internet pages being unable to load properly. It is after the last blue screen that explorer.exe faces a fault, starts all over again, and displays the identical message. If such a situation happens, the only available option is to manually stop the same...

Words: 509 - Pages: 3

Premium Essay

Nt1330 Unit 3 Data Analysis Essay

...Q#02 What are the differences between an IDS and honeypot in terms of their functionality? Ans: The difference between the IDA and the Honeypot in terms of their functionality are as : IDS Functionality: IDS collect the information from different systems and the network resources for possible security problems. IDS collect and explore the information from the different parts of the computers or network and identify its potential security holes. The Instruction Detection System comprise from both the Internal and External organizations.  Deployment of IDS is easier and doesn’t affect the system resources.  NIDS detect many attacks like TCP SYN attack, fragmented packet attack by checking the headers of the packets.  IDS have real time functionality, it monitor the real time traffic and detect the malicious activity when they occurs.  IDS used as a shield around the networks.  IDS identify the attacks by using the signatures matching and statistical models.  IDS detect on behavior and knowledge based.  IDS have passive alerting and Active response detection.  IDS audit the sources location by using the Host log files, Network packets, Application log files and IDS sensor alerts. Honeypot Functionality: Honeypot detect the unauthorized use of the informantion of the systems. As shown the blow fig the honeypot consist of a computer, data and the network sites that are the part of the networks. Honeypot fooling the attacker that it is a legitimate...

Words: 767 - Pages: 4

Premium Essay

Nt1330 Unit 3 Assignment 1 Network Essay

...Assignment 3 For this assignment, you need to answer questions based on Network Layer. • Assignment submitted after due date will not be evaluated. • Write answers in your own words. • Materials copied from the Internet or otherwise will attract penalty as per course policy. • Upload a pdf version of the document. Due Date: 5 pm, October 28, 2014. Submitting this Assignment You will submit this assignment in Blackboard. • Write your answer after each question in the document. • Name the document as A2_CN2013_John_Doe.pdf in case your name is John Doe. Grading Criteria Correct and to-the-point answers will be awarded full points. This assignment has 15 points (with weightage of 3% in your overall 100 points). 1. Explain (in about 1000-1500 words) RIP, BGP and OSPF. Your explanation should clearly highlight the following points:  Working of all the three protocols.  Advantages and...

Words: 1340 - Pages: 6

Premium Essay

Fsmo Role Ayer Nate Method

...Sole's Blog SOLVE YOUR IT PROBLEMS FASTER, SAVE YOUR FEET AND GET MORE TIME ON YOUTUBE! * HOME * * ABOUT SOLE VIKTOR * * USEFULL LINKS « How to publish a website with both Anonymous and Forms Based Authentication in ISA 2006 How to configure ISA 2006 with FBA for OWA and NTLM for Outlook Anywhere and Autodiscover in Exchange 2007 » How to place FSMO and Global Catalog roles in Active Directory During installation of Active Directory on a Windows Server 2000/2003/2008 all FSMO roles will automatically be installed on the first server. But Best Practice dictates to move some of theese Flexible Single Master of Operation (FSMO) roles to seperate servers. If you only have one domain controller (not recommended), there is nothing to do since all roles must be on this server, but if you have multiple servers you should move some of theese roles on to more servers. It is also important to be aware of what servers are Global Catalog servers, especially if you have more than one domain and even if only one domain, they will be prefered by applications like Exchange server. It is recommended to place the forest roles on one Domain Controller (DC) and the domain roles on another server. If not all Domain Controllers are Global Catalog servers, it is also important to place the infrastructure master on a server that is NOT a Global Catalog server. Recommended Best Practice setup of FSMO roles. Domain Controller #1 Place the two forest roles on this server. * Schema Master...

Words: 10360 - Pages: 42