Mainframe architecture, Basic Computer Science

Mainframe Architecture:

Till a few decades back, all computing was controlled through the central mainframes server. Multiple users could connect to the central host through unintelligent terminals which captured the keystrokes, sent the information to the host and displayed the text output. All the processing was done by the applications residing on the main central server.

Only large transaction-oriented applications were developed during that time. Business tasks such as accounts receivable, accounts payable, general ledger, credit account management and payroll that were repetitive and could be run as batch jobs were automated.  

In these centralized computing models, the host provided both the data storage and processing power for the client systems. There was no support for graphical user interface or access to multiple databases from geographically dispersed sites. 

277_Mainframe Architecture.png

Posted Date: 10/23/2012 5:17:37 AM | Location : United States







Related Discussions:- Mainframe architecture, Assignment Help, Ask Question on Mainframe architecture, Get Answer, Expert's Help, Mainframe architecture Discussions

Write discussion on Mainframe architecture
Your posts are moderated
Related Questions
Proposal a) Disabling Interrupts (Hardware Solution) • Every process disables all interrupts just after entering in its critical section and re-enables all interrupts just previous

COMPONENTS OF A DIGITAL COMPUTER: A digital computer is an electronic device that receives data, performs arithmetic and logical operations and produces results according to a

Working of a Computer Computer may be divided into the following units     Input Unit     Main Memory or Primary Storage Unit     Arithmetic-Logic Unit

High level languages: High level languages (converted to machine code by compiler or equivalent) are much easier to program, as well as to understand. Several high level langu

Assume |s1|=|s2|=n and consider the functions defined, for any s1 and s2, as: (a) G1(s1,s2)=s1 xor s2, (b) G2(s1,s2)=(s1, s2, s1 xor s2). We have that: A. G1 and G2 are pseudo-ra

QUESTION 1 Write short notes on controlled vocabulary indexing. QUESTION 2 (a) List five types of abstracts. (b) Describe four types of abstracts. QUESTION 3

Multi-valued Attribute DBMS Each multi valued attribute maps into a separate table. Include also an attribute for the primary key of the entity and relationship type which the attr

What is an encoder? Draw the logic circuit of Decimal to BCD encoder and explain its working.?

how to set up the location (e.g. plaza, hall of fame, lecture theater or etc.) and services that will be used during the exhibition; devices needed; and finally produced a compreh

Problem 1 Perform the following conversion a. (ABE) 16 =() 2 b. (101011) 2 =() 10 2 Explain how full adder adds three bits 3 Explain digital multiplexers