Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Assignment 1: Computer Platforms

Computer systems may be classified into two categories: classical and quantum. This assignment will focus on classical computers. Classical computer systems' design trends have been shifting from very large systems that occupy warehouse size buildings down to handheld systems. Very large systems include supercomputers such as the K computer, SPARC64 VIIIfx 2.0 GHz, Tofu interconnect manufactured by Fujitsu. It has 705,024 CPU cores and 1,410.048 GB of RAM and is the largest in the world. A list of the top 10 supercomputers can be been seen at http://top500.org/ Website. Handheld systems include smartphones such as the iPhone, Android, and Windows 7 Phone. There are also embedded systems, which run real-time operating systems to control automobile engines, industrial robots, spacecraft, and industrial control systems.  

prepare a two to three (2-3) page paper in which you:

1.      Compare and contrast the following, in terms of cores (or microprocessors), random access memory (RAM), disk storage, and networking capabilities.

  1. Supercomputers
  2. Mainframe computers
  3. Desktop computers
  4. Laptops
  5. Handheld computers

2.      Suppose that you were an architect working for a Fortune 500 company with millions of customers. Your company would like to provide a Web-based self-service computer environment for customers.

1.      Determine the computer platform that your company should use so that it can scale to the millions of customers. Include how the platform should be managed for high availability and redundancy for continuous uptimes.

2.      describe how you would convince your company to adopt your solution. Provide both technical and business reasons.

3.      Computer users have been moving to using tablet and smartphone devices in larger numbers.

  1.  
    1. CEOs, CIOs, managers, and end users need to be able to access data everywhere using these devices. Discuss the advantages and disadvantages of these devices in terms of computing power, maintenance, and security.
    2. Select the one that you would advise to buy and describe why.

4.      Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Describe processor technology, architecture and future trends in processing.
  • Describe the main classes of hardware and system software components.
  • Use technology and information resources to research issues in computer architecture.
  • prepare clearly and concisely about computer architecture using proper writing mechanics and technical style conventions.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M913965
  • Price:- $25

Priced at Now at $25, Verified Solution

Have any Question? 


Related Questions in Computer Engineering

In computer science when we encounter an algorithm we often

In computer science, when we encounter an algorithm, we often need to ask about the complexity of that algorithm (how many computations we need to do). To find the complexity of the distance vector's algorithm, find the ...

1 why does the network-layer protocol need to provide

1. Why does the network-layer protocol need to provide packetizing service to the transport layer? Why can't the transport layer send out the segments without encapsulating them in datagrams? 2. Why is routing the respon ...

1 what are the reuse time thresholds for these three

1. What are the reuse time thresholds for these three technology generations? 2. What are the reuse time thresholds if we keep using the same 4K page size? What's the trend here? 3. What other factors can be changed to k ...

Objectivesdesign and plan the implementation of a web

Objectives Design and plan the implementation of a web architecture to support the online presence of a newspaper company. The design must include diagram(s) of the network and web architecture and have installation and ...

1 how many 16-byte cache blocks are needed to store all

1. How many 16-byte cache blocks are needed to store all 32-bit matrix elements being referenced? 2. References to which variables exhibit temporal locality? 3. References to which variables exhibit spatial locality? 4. ...

1 a client uses udp to send data to a server the data

1. A client uses UDP to send data to a server. The data length is 16 bytes. Calculate the efficiency of this transmission at the UDP level (ratio of useful bytes to total bytes). 2. The following is a dump (contents) of ...

First questionwhere would you like to be in 5 years 10

First Question Where would you like to be in 5 years, 10 years? What impact do you anticipate information assurance will play in your education and career? The self-reflection should be a minimum of 1 full page, Times Ne ...

Suppose one wishes to confirm that none of the files in the

Suppose one wishes to confirm that none of the files in the directory /usr/spool/lpd are worldreadable. a. What would the fourth field of the tripwire database contain? b. What would the second field of the RIACS databas ...

Write a function that converts a phrase into pig latin a

Write a function that converts a phrase into pig Latin. A word is converted to pig Latin by removing the first character of the word, placing it at the back of the word, and adding the characters "ay" to the word. For ex ...

One of the earlier applications of cryptographic hash

One of the earlier applications of cryptographic hash functions was the storage of passwords for user authentication in computer systems. With this method, a password is hashed after its input and is compared to the stor ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro