Compare and contrast the following, in terms of cores

Assignment Help Basic Computer Science
Reference no: EM1379720 , Length: 1333 Words

Computer Platforms

Computer systems may be classified into two categories: classical and quantum. This assignment will focus on classical computers. Classical computer systems' design trends have been shifting from very large systems that occupy warehouse size buildings down to handheld systems. Very large systems include supercomputers such as the K computer, SPARC64 VIIIfx 2.0 GHz, Tofu interconnect manufactured by Fujitsu. It has 705,024 CPU cores and 1,410.048 GB of RAM and is the largest in the world. A list of the top 10 supercomputers can be been seen at https://top500.org/ Website. Handheld systems include smartphones such as the iPhone, Android, and Windows 7 Phone. There are also embedded systems, which run real-time operating systems to control automobile engines, industrial robots, spacecraft, and industrial control systems.  

Write a two to three (2-3) page paper in which you:

1.      Compare and contrast the following, in terms of cores (or microprocessors), random access memory (RAM), disk storage, and networking capabilities.

  1. Supercomputers
  2. Mainframe computers
  3. Desktop computers
  4. Laptops
  5. Handheld computers

2.      Suppose that you were an architect working for a Fortune 500 company with millions of customers. Your company would like to provide a Web-based self-service computer environment for customers.

1.      Determine the computer platform that your company should use so that it can scale to the millions of customers. Include how the platform should be managed for high availability and redundancy for continuous uptimes.

2.      Explain how you would convince your company to adopt your solution. Provide both technical and business reasons.

3.      Computer users have been moving to using tablet and smartphone devices in larger numbers.

  1.  
    1. CEOs, CIOs, managers, and end users need to be able to access data everywhere using these devices. Discuss the advantages and disadvantages of these devices in terms of computing power, maintenance, and security.
    2. Select the one that you would advise to buy and explain why.

4.      Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Describe processor technology, architecture and future trends in processing.
  • Describe the main classes of hardware and system software components.
  • Use technology and information resources to research issues in computer architecture.
  • Write clearly and concisely about computer architecture using proper writing mechanics and technical style conventions.

Reference no: EM1379720

Questions Cloud

Identify the differences in the code samples : Coding style is a very important part for those entering the technology field. Here are two model Java programs that do exactly the same thing according to the user.
What two countries were embarking on a series of structural : What two countries were embarking on a series of structural social also economic reforms that were designed to completely alter its failed political also ideological history.
How you could use all four operant conditioning principles : Specifically define also n describe how you could use all four operant conditioning principles of Reinforcement theory to shift emphasis among firm's employees toward ethical behaviour also away from unethical behaviour.
What are those sources : James Dyson has begun experimenting with robotics also microchips to accomplish what objective.
Compare and contrast the following, in terms of cores : Compare and contrast the following, in terms of cores (or microprocessors), random access memory (RAM), disk storage, and networking capabilities. Supercomputers, Mainframe computers , Desktop, computers, Laptops, Handheld computers
What are advantages also risks of this approach : According to company president, "We're selling like crazy. We don't do research. We react as sort of a karma thing."How would explain firm's success. What are advantages also risks of this approach.
Define control flow in programming : Use internet to define and study control flow in programming. Discuss how would you use control flow in computer programming to solve problems?
Why is it so important to businesses operating in china : Explain concept of gaunxi. Why is it so important to businesses operating in china. How did McDonald's lack of gaunxi raise its cost of doing business in china.
Identify some factors that have affected womens flexibility : Identify some factors that have affected women's flexibility in workplace throughout history. Evaluate factors that have affected women's pay in workforce, Hypothesize what may change for women in workplace within next 10 years.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Explaining pros and cons of coralcdn

Provide a summary of CoralCDN. Contrast its operation with that of Akamai. What the pros and cons of CoralCDN (as compared to Akamai)?

  Expalin programs like ping and some of scanning tools

When using programs such as ping and some of the scanning tools to do forensic investigations, we may easily tip off the suspect that is under investigation

  Activity diagram of each step of ordering pizza

Draw an activity diagram representing each step of the process; from the moment you pick up the phone to the point where you are eating the pizza.

  Calculate fourier transform of function

Given a function f(x) as follows: f(0) = 2, f(1) = 3, f(2) = 5, f(3) = 4. Calculate the Fourier Transform of f(x), i.e: F(0), F(1), F(2) and F(3)!

  Evaluate for risk management purposes

Choose three information assets that a typical organization has and evaluate for risk management purposes which vulnerability should be evaluated for additional controls first?

  Describe how to recover file for further investigation

When you try to open file in image viewer, message is displayed indicating that file is corrupt. Write 2-3 page report describing how to recover the file, orkty.zip, for further investigation.

  How procedure calls go before registers saved in memory

How deep can the procedure calls go before registers must be saved in memory? (That is, what is the maximum number of "active'' procedure calls that can be made before we need to save any registers in memory?)

  Connection between business and information system functions

Give a brief overview/answer of each: Involving individuals with various perspectives in system analysis and design activities and Connection between business and information system functions.

  Classify memory in hierarchy

Classify a memory in hierarchy according to the two most common attributes like accessing method and speed.

  Determine pz and also estimate any constants

Determine P(z) and also estimate any constants in this expression so that P(z) is given in terms only of  and μ. If possible eliminate any common factors in numerator and denominator of this expression

  Explain the term omniscience

Explain the term omniscience Explain the importance of autonomy in an agent Develop the task environment for an interactive language tutor

  Explaining reasonable values for items in risk register

Suggest reasonable values for the items in the risk register for this asset and threat, and provide justifications for your choices.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd