Illustrate about fourth generation computers, Computer Engineering

Assignment Help:

Q. Illustrate about fourth generation computers?

One of the main milestones in IC technology is Very large scale integration (VLSI) where thousands of transistors can be integrated on a single chip. The major impact of VLSI was that it was possible to make a complete CPU or main memory or other related devices on a single IC chip. This showed that mass production of memory, CPU can be done at a very small cost. The VLSI-based computer architecture is occasionally termed as fourth generation computers.

Fourth generation is paired with Parallel Computer Architectures too. These computers had distributed or shared memory and specialized hardware units for floating point computation. In this period compilers as well as special languages, multiprocessing operating system and tools were created for parallel processing and distributed computing. CRAY X-MP, IBM/3090 and VAX 9000were a number of the systems developed during this era.

Fifth generation computers are also available currently. These computers majorly emphasize on Massively Parallel Processing. These computers employ high-density packaging as well as optical technologies.


Related Discussions:- Illustrate about fourth generation computers

Face detection, i want the matlab code for the following events 1. face det...

i want the matlab code for the following events 1. face detection 2. video to frame conversion 3.video shot boundary detection

How does cpu know that an interrupt has taken place, How does CPU know that...

How does CPU know that an interrupt has taken place? There needs to be a line or a register or status word in CPU which can be increased on occurrence of interrupt situation.

Explain concurrent sharing, Explain Concurrent sharing. Concurrent s...

Explain Concurrent sharing. Concurrent sharing: Some number of programs may share a file concurrently. While this is the case, this is essential to ignore mutual interferen

Secure systems development, Write an academic report on a significant softw...

Write an academic report on a significant software security exploit you have studied. Your report should include details such as, for example: The nature of the software vuln

C++, program to find area under the curve y=f(x) between x=a and y=b , inte...

program to find area under the curve y=f(x) between x=a and y=b , integrate y=f(x)between limits of a and b

Voice identifier - biometric computer security systems, Voice Identifier - ...

Voice Identifier - Biometric Computer Security Systems Besides fingerprint, another popular security technology is voice identifier. According to VSS organization (2007), voic

Flat, nfa significance

nfa significance

What is precloud computing, What is precloud computing? Precloud comput...

What is precloud computing? Precloud computing is an email access was through a single computer, which also keeps all email messages. Example: Microsoft Outlook or Outlook Expr

Can link and association applied interchangeably, No, You cannot apply the ...

No, You cannot apply the link and Association interchangeably. Since link is used show the relationship among the two objects. But Association is used signify the relationship

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd