Describe the key functions of a modern operating system

Assignment Help Computer Networking
Reference no: EM132347891

COMPUTER & NETWORK TECHNOLOGY

SECTION A

Answer 2 questions (out of 4).

A1

All information inside a computer is represented in the form of strings of 1s and 0s.

There are many ways of representing numeric values in everyday life; for example,

Integer 123

Negative integer -32

Fraction 0.123

Floating-point 1.124 x 10-6

How is a computer able to represent each of these values in binary form? Explain the advantage and disadvantage of each system of numeric representation and its limitations.

Your answer should include considerations such as word-length, accuracy, range, and the complexity of performing operations in each system.

A2

a) The inner (dot) product S of two vectors A and B is defined as S =Σai.bi for i = 0 to n-1; that is, S = a0.b0 + a1.b1 + … + an-1.bn-1

Assuming that vectors A and B are located in main memory, write an assembly language program to calculate S. Note that a vector is a sequence of consecutive values; for example, A = a0, a1, a2, … , an-1.

You may use any assembly language, although you must explain the action of each instruction you use. Your program should be documented.

b) Year by year, microprocessors have become faster and faster. Part of the increase in speed is due to advances in semiconductor manufacturing technology and part of the increase in speed is due to advances in computer architecture and organization. Briefly explain two of the advances in computer architecture and organization that have significantly improved computer performance.

A3

Computer networks are associated with various types of hardware. A modern home or office may include the following items of hardware:

Modem

Hub

Wi-Fi router

Explain what role each of these devices performs in a typical installation and why they are needed to provide safe networking facilities.

A4

a) Computer performance is regarded as important today; users want the best performance possible for the computers they buy.

Discuss the factors that contribute to the overall performance of a desk-top computer.

Explain how the performance of computers is measured today and how different computers are compared. Your answer should include several ways by which computer performance can be measured and you should comment on the accuracy/relevance of each of the measurement techniques.

b) Why has power dissipation (i.e., heat) become one of the principal limiting factors of modern computer performance?

SECTION B


Answer 5 questions (out of 8).

B5

a) Briefly explain the role of TCP/IP in network management.

b) Describe the different layers of the TCP/IP model.

B6

a) Describe THREE security threats that computer users face today.

b) Give THREE measures that can be taken to deal with these threats.

B7 Describe the characteristics and typical uses of the following:

a) VLAN

b) Intranet

B8 Briefly describe the features and uses of the following:

a) DRAM

b) USB drive (flash memory)

c) Hard disk

B9 Briefly describe the features and uses of the following in the context of networking:

a) RJ45

b) HDMI

c) Fibre optics

d) CAT5

B10 What would an IT technician understand by the following terms:

a) Bandwidth

b) Ipconfig

c) FAT32

d) Proxy server

B11

a) Explain why a hierarchical file structure is needed in a computer system.

b) Describe THREE file formats that might be used in a typical computer.

B12 Describe the key functions of a modern operating system.

Reference no: EM132347891

Questions Cloud

Calculate the net present value : Random, Inc. is considering a major expansion of its product line and has estimated the following cash flows associated with such an expansion.
Identify a current or recent health policy issue : Identify a current or recent health policy issue facing a government, or a particular level of government, in a country of your choice
What is the break-even volume : What would the total cost, total sales and profit (or loss) be for a weekly volume of 100,000 bars? What is the break-even volume?
What is the company wacc : Suppose the company's stock has a beta of 1.4. The risk-free rate is 3.4 percent and the market risk premium is 7.3 percent.
Describe the key functions of a modern operating system : BCS HIGHER EDUCATION QUALIFICATIONS- BCS Level 4 Certificate in IT- COMPUTER & NETWORK TECHNOLOGY -Describe the key functions of a modern operating system.
What is the firm market value capital structure : What is the firm's market value capital structure? (Do not round intermediate calculations and round your answers to 4 decimal places, e.g., .3216.)
Acquisition of a chain of cemeteries : Random, Inc is considering the acquisition of a chain of cemeteries for $440 Million, Since the primary asset of this business is real estate
Write an audit program for internal control of cash : Write an audit program for internal control of cash in Word or Excel. The following components must be included: Information and communication.
Explain why the fisher equation holds : Explain why the Fisher Equation holds; that is, explain why the expectation of higher inflation leads to a higher nominal interest rate.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd