Reference no: EM132339641
COMPUTER ARCHITECTURE
Course Description
This course deals with attributes and functional behavior of a computer system that are visible to the programmer such as instruction set, number of bits used for data representation, input-output mechanisms, addressing techniques, and types of operations that are supported by computer systems e.g., addition, subtraction and subroutine calls.
This course is a key component of computer engineering. Knowledge in computer architecture makes it easier to design an operating system.
Course objectives
• To equip students with knowledge of the architecture and organization of current microprocessor based computers.
• To enable students relate the instruction set architecture at the programmer’s level of abstraction to the digital logic implementation at the hardware designer’s level of abstraction.
Learning outcomes
Upon successful completion of the course, students shall be able to:
• Describe the organization of a von Neumann machine, its major functional units, its strength and weaknesses.
• Write simple programs of assembly language code to demonstrate an understanding of machine level operations.
• Discuss the generation of control signals using hardwired or microprogrammed implementation.
• Identify the new trends and technologies of computer architecture and organization.
• Recognize the importance of pipelining to enhance the performance.
Explain the significance of detecting infrastructure attacks
: For this assignment, you are the Director of Information Technology for your state fusion center. The state just hired 12 new staff members to your department.
|
Explore the use of at least one database management systems
: DATABASE SYSTEMS-Year 3 Semester I-Explore the use of at least one Database Management Systems (DBMS) and the formulation of queries in databases;
|
Create a infographic handout using an infographic tool
: Create a 1-page infographic handout, using an infographic tool of your choice, covering the topic of IoT that employees will be able to use as a quick reference
|
Illustrate how a patron would interact with the kiosk
: Draw use-case diagrams that illustrate how a patron would interact with the kiosk. These diagrams should illustrate all of the interactions in enough detail.
|
Describe the organization of a von neumann machine
: COMPUTER ARCHITECTURE-Year 3 Semester I-Describe the organization of a von Neumann machine, its major functional units, its strength and weaknesses.
|
Write most important suggestions from the plan you select
: Select a specific governance plan that exists at a company or a plan framework from an organization. Write a 2-page paper on three or four of most important.
|
Post one federal case using standard legal notation
: Using a Microsoft Word document, please post one federal and one state statute utilizing standard legal notation and a hyperlink to each statute.
|
Explain ways to strongly authenticate a remote machine
: In NOT less than 150 words, respond to the following discussion questions: List 5 ways to strongly authenticate a remote machine. Justify your answers.
|
Find the costs of compromised data integrity breaches
: In 500 words, discuss risk and costs of compromised data integrity breaches. Focus on integrity not confidentiality. Look at military, education, science.
|