Describe the key functions of a modern operating system

Assignment Help Computer Networking
Reference no: EM132347891

COMPUTER & NETWORK TECHNOLOGY

SECTION A

Answer 2 questions (out of 4).

A1

All information inside a computer is represented in the form of strings of 1s and 0s.

There are many ways of representing numeric values in everyday life; for example,

Integer 123

Negative integer -32

Fraction 0.123

Floating-point 1.124 x 10-6

How is a computer able to represent each of these values in binary form? Explain the advantage and disadvantage of each system of numeric representation and its limitations.

Your answer should include considerations such as word-length, accuracy, range, and the complexity of performing operations in each system.

A2

a) The inner (dot) product S of two vectors A and B is defined as S =Σai.bi for i = 0 to n-1; that is, S = a0.b0 + a1.b1 + … + an-1.bn-1

Assuming that vectors A and B are located in main memory, write an assembly language program to calculate S. Note that a vector is a sequence of consecutive values; for example, A = a0, a1, a2, … , an-1.

You may use any assembly language, although you must explain the action of each instruction you use. Your program should be documented.

b) Year by year, microprocessors have become faster and faster. Part of the increase in speed is due to advances in semiconductor manufacturing technology and part of the increase in speed is due to advances in computer architecture and organization. Briefly explain two of the advances in computer architecture and organization that have significantly improved computer performance.

A3

Computer networks are associated with various types of hardware. A modern home or office may include the following items of hardware:

Modem

Hub

Wi-Fi router

Explain what role each of these devices performs in a typical installation and why they are needed to provide safe networking facilities.

A4

a) Computer performance is regarded as important today; users want the best performance possible for the computers they buy.

Discuss the factors that contribute to the overall performance of a desk-top computer.

Explain how the performance of computers is measured today and how different computers are compared. Your answer should include several ways by which computer performance can be measured and you should comment on the accuracy/relevance of each of the measurement techniques.

b) Why has power dissipation (i.e., heat) become one of the principal limiting factors of modern computer performance?

SECTION B


Answer 5 questions (out of 8).

B5

a) Briefly explain the role of TCP/IP in network management.

b) Describe the different layers of the TCP/IP model.

B6

a) Describe THREE security threats that computer users face today.

b) Give THREE measures that can be taken to deal with these threats.

B7 Describe the characteristics and typical uses of the following:

a) VLAN

b) Intranet

B8 Briefly describe the features and uses of the following:

a) DRAM

b) USB drive (flash memory)

c) Hard disk

B9 Briefly describe the features and uses of the following in the context of networking:

a) RJ45

b) HDMI

c) Fibre optics

d) CAT5

B10 What would an IT technician understand by the following terms:

a) Bandwidth

b) Ipconfig

c) FAT32

d) Proxy server

B11

a) Explain why a hierarchical file structure is needed in a computer system.

b) Describe THREE file formats that might be used in a typical computer.

B12 Describe the key functions of a modern operating system.

Reference no: EM132347891

Questions Cloud

Calculate the net present value : Random, Inc. is considering a major expansion of its product line and has estimated the following cash flows associated with such an expansion.
Identify a current or recent health policy issue : Identify a current or recent health policy issue facing a government, or a particular level of government, in a country of your choice
What is the break-even volume : What would the total cost, total sales and profit (or loss) be for a weekly volume of 100,000 bars? What is the break-even volume?
What is the company wacc : Suppose the company's stock has a beta of 1.4. The risk-free rate is 3.4 percent and the market risk premium is 7.3 percent.
Describe the key functions of a modern operating system : BCS HIGHER EDUCATION QUALIFICATIONS- BCS Level 4 Certificate in IT- COMPUTER & NETWORK TECHNOLOGY -Describe the key functions of a modern operating system.
What is the firm market value capital structure : What is the firm's market value capital structure? (Do not round intermediate calculations and round your answers to 4 decimal places, e.g., .3216.)
Acquisition of a chain of cemeteries : Random, Inc is considering the acquisition of a chain of cemeteries for $440 Million, Since the primary asset of this business is real estate
Write an audit program for internal control of cash : Write an audit program for internal control of cash in Word or Excel. The following components must be included: Information and communication.
Explain why the fisher equation holds : Explain why the Fisher Equation holds; that is, explain why the expectation of higher inflation leads to a higher nominal interest rate.

Reviews

Write a Review

Computer Networking Questions & Answers

  What is the encryption algorithm

What is the encryption algorithm? How secure is it?

  What is the size of an ethernet frame carrying an arp packet

Is the size of the ARP packet fixed? Explain. What is the size of an Ethernet frame carrying an ARP packet? What is the broadcast address for Ethernet?

  The concept of providing wireless access to employees

What are the limitations of powerline networks?

  How you would protect the server using an access list

Your network is experiencing an excessive amount of pings to your network server. The pings are from outside the network.

  Determine the smtp transfers messages in ascii

Survey users at your site to determine if they send sensitive information in e-mail. Are users aware that SMTP transfers messages in ASCII.

  Define the vehicle routing problem

In Bullnheimer et al. (1999a) the authors applied the ant colony optimization algorithm in several instances of the vehicle routing problem (VRP) extracted.

  Discuss the advantages and disadvantages of star topologies

Discuss the advantages and disadvantages of star, bus, and mesh physical topologies. Provide real examples of each type. Explain why the OSI model is better than the TCP/IP model. Why hasn't it taken over from the TCP/IP model

  Decision-making process to help the company grow

How would you utilize this information in the decision-making process to help the company grow?

  Provide a physical layout of the computers on the floor plan

Determine a physical layout of the computers on the floor plan, along with the network wires (network wiring diagram). Provide justifications for each element of your network design (numbers 1-4 above).

  Show the working of ldcr and mdcr protocol

Find that distance with which the tasks are feasibly scheduled and Show the working of LDCR and MDCR protocol on the given message set

  Depict network topology graphical model initial environment

Depict a network topology graphical model of the initial environment of 10 employees using Visio or its open source alternative software. Note: The graphically depicted solution is not included in the required page length.

  Analyze the performance of the http and ethernet protocols

For this assignment you will analyze the performance of the HTTP and Ethernet protocols with Riverbed Modeler in a LAN depending on the number of client nodes.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd