Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Assignment 1: Computer Platforms

Computer systems may be classified into two categories: classical and quantum. This assignment will focus on classical computers. Classical computer systems' design trends have been shifting from very large systems that occupy warehouse size buildings down to handheld systems. Very large systems include supercomputers such as the K computer, SPARC64 VIIIfx 2.0 GHz, Tofu interconnect manufactured by Fujitsu. It has 705,024 CPU cores and 1,410.048 GB of RAM and is the largest in the world. A list of the top 10 supercomputers can be been seen at http://top500.org/ Website. Handheld systems include smartphones such as the iPhone, Android, and Windows 7 Phone. There are also embedded systems, which run real-time operating systems to control automobile engines, industrial robots, spacecraft, and industrial control systems.  

prepare a two to three (2-3) page paper in which you:

1.      Compare and contrast the following, in terms of cores (or microprocessors), random access memory (RAM), disk storage, and networking capabilities.

  1. Supercomputers
  2. Mainframe computers
  3. Desktop computers
  4. Laptops
  5. Handheld computers

2.      Suppose that you were an architect working for a Fortune 500 company with millions of customers. Your company would like to provide a Web-based self-service computer environment for customers.

1.      Determine the computer platform that your company should use so that it can scale to the millions of customers. Include how the platform should be managed for high availability and redundancy for continuous uptimes.

2.      describe how you would convince your company to adopt your solution. Provide both technical and business reasons.

3.      Computer users have been moving to using tablet and smartphone devices in larger numbers.

  1.  
    1. CEOs, CIOs, managers, and end users need to be able to access data everywhere using these devices. Discuss the advantages and disadvantages of these devices in terms of computing power, maintenance, and security.
    2. Select the one that you would advise to buy and describe why.

4.      Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Describe processor technology, architecture and future trends in processing.
  • Describe the main classes of hardware and system software components.
  • Use technology and information resources to research issues in computer architecture.
  • prepare clearly and concisely about computer architecture using proper writing mechanics and technical style conventions.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M913965
  • Price:- $25

Priced at Now at $25, Verified Solution

Have any Question? 


Related Questions in Computer Engineering

1 why is it important to use specific and clearly defined

1. Why is it important to use specific and clearly defined job descriptions for hiring information security professionals? 2. What functions does the CISO perform, and what are the key qualifications and requirements for ...

It is possible to arrange a set-associative physical

It is possible to arrange a set-associative physical address cache so that the pagetable entry for a location can be fetched concurrently with a cache lookup for the same location. The trick is to ensure that the address ...

The annual property tax in richardson county is 150 for

The annual property tax in Richardson County is $1.50 for each $100 of a property's assessed value. The county clerk wants you to create an application that will display the property tax after he enters the property's as ...

This exercise asks you to consider sources of errors in

This exercise asks you to consider sources of errors in thumbprints (see Section 25.6.2.3). Recall that a thumbprint is computed from the contents of a connection over some interval of time. Consider clocks on two differ ...

What is the time complexity as a function of the number n

What is the time complexity, as a function of the number n of vertices and m of edges, of the following network operations if the network in question is stored in adjacency list format? a) Calculating the mean degree. b) ...

1 implement the general priority queue adt using the

1. Implement the general Priority Queue ADT using the min-heap implemented as a vector. Instead of having the number of priority levels as an argument of the constructor, specify the maximum capacity of the queue. 2. Com ...

Explain why it is important for the safety professional to

Explain why it is important for the safety professional to become knowledgeable and skilled in system safety concepts. Your response must be at least 75 words in length.

1 extend the example of deriving required logging

1: Extend the example of deriving required logging information to the full Bell-LaPadula Model with both security levels and compartments. 2: In the example of deriving required logging information for the Chinese Wall m ...

1 in an impulse invariance design show that if hmcs is a

1. In an impulse invariance design, show that if Hmc(s) is a transfer function of a stable system, the corresponding H(z) is also a transfer function of a stable system. 2. Consider the design of a digital differentiator ...

In this exercise you are asked to attack an rsa encrypted

In this exercise, you are asked to attack an RSA encrypted message. Imagine being the attacker: You obtain the ciphertext y = 1141 by eavesdropping on a certain connection. The public key is kpub = (n,e)=(2623,2111). 1. ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen