Ask Question, Ask an Expert


Ask Computer Engineering Expert

Assignment 1: Computer Platforms

Computer systems may be classified into two categories: classical and quantum. This assignment will focus on classical computers. Classical computer systems' design trends have been shifting from very large systems that occupy warehouse size buildings down to handheld systems. Very large systems include supercomputers such as the K computer, SPARC64 VIIIfx 2.0 GHz, Tofu interconnect manufactured by Fujitsu. It has 705,024 CPU cores and 1,410.048 GB of RAM and is the largest in the world. A list of the top 10 supercomputers can be been seen at Website. Handheld systems include smartphones such as the iPhone, Android, and Windows 7 Phone. There are also embedded systems, which run real-time operating systems to control automobile engines, industrial robots, spacecraft, and industrial control systems.  

prepare a two to three (2-3) page paper in which you:

1.      Compare and contrast the following, in terms of cores (or microprocessors), random access memory (RAM), disk storage, and networking capabilities.

  1. Supercomputers
  2. Mainframe computers
  3. Desktop computers
  4. Laptops
  5. Handheld computers

2.      Suppose that you were an architect working for a Fortune 500 company with millions of customers. Your company would like to provide a Web-based self-service computer environment for customers.

1.      Determine the computer platform that your company should use so that it can scale to the millions of customers. Include how the platform should be managed for high availability and redundancy for continuous uptimes.

2.      describe how you would convince your company to adopt your solution. Provide both technical and business reasons.

3.      Computer users have been moving to using tablet and smartphone devices in larger numbers.

    1. CEOs, CIOs, managers, and end users need to be able to access data everywhere using these devices. Discuss the advantages and disadvantages of these devices in terms of computing power, maintenance, and security.
    2. Select the one that you would advise to buy and describe why.

4.      Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Describe processor technology, architecture and future trends in processing.
  • Describe the main classes of hardware and system software components.
  • Use technology and information resources to research issues in computer architecture.
  • prepare clearly and concisely about computer architecture using proper writing mechanics and technical style conventions.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M913965
  • Price:- $25

Priced at Now at $25, Verified Solution

Have any Question? 

Related Questions in Computer Engineering

You are a forensics investigator and need to address the

You are a forensics investigator and need to address the following cases. You can find the Case Projects at the end of Chapters 3 and 4 in your textbook. Case Project 3-3: Digital Evidence Storage Formats (CLO 1) Case Pr ...

Modify exercise 1 so that the class can keep track of

Modify Exercise 1 so that the class can keep track of multiple courses. Write a program to test your implementation. Exercise 1 Design and implement a class that allows a teacher to track the grades in a single course. I ...

A noted computer security expert has said that without

A noted computer security expert has said that without integrity, no system can provide confidentiality. a. Do you agree? Justify your answer. b. Can a system provide integrity without confidentiality? Again, justify you ...

Sources must be cited in apa format your response should be

Sources must be cited in APA format. Your response should be four (4) double-spaced pages; refer to the "Assignment Format" page located on the Course Home page for specific format requirements. Part A: 1. Using your own ...

Calculate the cpi for the system listed above assuming that

Calculate the CPI for the system listed above assuming that there are no accesses to I/O. What is the CPI if the VMM performance impact doubles? If it is cut in half? If a virtual machine software company wishes to obtai ...

1 the control field in a tcp segment is 6 bits we can have

1. The control field in a TCP segment is 6 bits. We can have 64 different combinations of bits. List some combinations that you think are normally used. 2. The following is part of a TCP header dump (contents) in hexadec ...

Consider these three networksa find a 3-core in the first

Consider these three networks: a) Find a 3-core in the first network. b) What is the reciprocity of the second network? c) What is the cosine similarity of vertices A and B in the third network?

Chapter 1 discussed four general methods for coping with

Chapter 1 discussed four general methods for coping with complexity: modularity, abstraction, hierarchy, and layering. Which of those four methods does a protocol stack use as its primary organizing scheme? Give two scen ...

1 what is security assessment why is it important2 discuss

1. What is security assessment? Why is it important? 2. Discuss the necessary steps in analyzing the security state of an enterprise. 3. What is security assurance? How does it help in enterprise security? 4. What is sec ...

1 in an impulse invariance design show that if hmcs is a

1. In an impulse invariance design, show that if Hmc(s) is a transfer function of a stable system, the corresponding H(z) is also a transfer function of a stable system. 2. Consider the design of a digital differentiator ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro