Share
Explore BrainMass

Computer Systems Organization

While the programmer can see a lot of what is going on beyond a normal user experience, there are still many aspects of the machine's running remains invisible to them, such as clock frequency and physical memory size. Computer organization, also known as computer architecture, looks at the structural relationships between these components of the computer system. Familiar examples of this include looking at how the CPU acts and uses computer memory, as well as cluster computing and non-uniform memory access.

The point of it all is to design ever-improving computer architectures that can run more and more efficiently, maximizing performance with as low a power consumption and cost as possible. In order to optimize their software, programmers must know the processing ability of their CPUs so a detailed analysis of the computer organization must be performed, and must show improved performance. Computer architects must keep many things in mind in order to achieve this. Perhaps the most important of these aspects in terms of maximizing performance are a computer's logic design, functional organization and instruction set design. The choice of processor for a programming project is heavily dependent on how these components are structured - for example, multimedia efforts have need of rapid data access while some more supervisory software prioritizes a need for fast interrupts instead. Architects need to be clear as to what is available on their new version of a particular machine.

But how can one use a machine to design a better version of that machine? In the beginning stages, most of the desired behavior of the new computer is written on an existing one as software that can run programs using the designer's new idea for handling instruction sets. Then the architect will collaborate with compiler designers to work out the kinks in those instructions. Then they have an instruction-handling process that can be implemented as a new version of the original machine. 

 

Categories within Computer Systems Organization

Registry Keys Forensic Analysis

For Windows OS, Registry keys are extensively used for forensic analysis; do we have similar information in UNIX or Macintosh OSes?

Self esteem across cultures

One of the important personality factors is self-esteem. Everyone values themselves in one way or another and makes positive or negative conclusions based on their own feelings of self-esteem. These conclusions affect a person's further decisions and behaviour, including aspirations for promotion. At the same time, not all soci

Personality and Profession

Imagine an action movie where the hero faces a bomb quickly counting down—there is one decision to be made: Do you cut the blue wire or the red one? The lives of the hero and countless civilians hang in the balance. The decision must be made swiftly—but the wrong choice would be disastrous. Now imagine an assembly line. You

Organisational culture and learning

One of the ways to assess organisational culture is to map where a given organisation falls on a set of different spectra. Typical features of organisational culture include: - Innovation and risk taking - Attention to detail - Outcome orientation - People orientation - Team orientation - Aggressiveness - Stability (in co

Entering a new organization

Part of successful organisational change is an organisation's ability to quickly bring new employees into alignment with the desired organisational culture. Recall your first day(s) in a new organisation, as a new student in a new school or in a new position with a new employer. Consider the important lessons that you learned in

Virtual versus in-person offices

Some forward-thinking entrepreneurs believe the virtual organization has 'arrived' and that employees of an organization no longer need a physical office, nor even to be located in the same city. More than ever before, work has transcended the traditional workday and the traditional workplace, due to advances in mobile computing

The Impact of IT on Managers

The nature of work has changed dramatically with the advent of the Information Age. Undoubtedly, the number of files and emails that people create and share has increased significantly each year. Few industries are immune to this proliferation of information. Now, imagine yourself in a managerial role in which you had to keep tr

Build versus buy a PC

Identify the top three (3) factors that have the largest influence on whether you would purchase a pre-built personal computer (PC) or whether you would build a PC. Justify your response. Suppose you are assisting a company who is shopping for new PC's for its workers. They are having a difficult time differentiating among co

Managing IT

What are the concepts, principles and critical thinking skills to apply in IT Management?

Computing the Last Byte Number

Two stations running TCP/IP are engaged in transferring a file. This file is 10KB long, and the payload size is 100 bytes, and the negotiated window size is 2000 bytes. The sender receives an ACK 900 from the receiver. a). Which bytes will be sent next? b). what is the last byte number that can be sent without an ACK bei

TCP/IP Total Data Size Transfer

A station running TCP/IP needs to transfer a file to a host. The file contains 2048 bytes, How many bytes, including all of the TCP/IP overhead, would be sent, assuming a payload size of 512 bytes and that both systems are running IPv4? (Also assuming that the three-way handshake and window size negotiation have been completed

Microsoft PowerPoint Presentations - Animation, Transitions, Handouts

What is the difference between animation and transition as it relates to a PowerPoint presentation? Review the different handout page formats. If you were giving a presentation to your coworkers about a new company product or service, which handout views would you provide and why?

IT in the public sector

How do IT applications help employees work more effectively and efficiently as individuals and groups? Provide examples. How would you contrast the perspectives of public sector stakeholders, including employees, elected officials, vendors and citizens, with respect to the use of information technology to accomplish the nee

Computer Architecture (Cache mapping)

Consider a column associative cache with 32 lines. This question assumes that all references are to memory lines; that is, a block of bytes from memory rather than a single memory word. a. What lines do 5, 21, 34, and 50 map to directly? (Consider the references to be memory line references.) b. What lines do 5, 21, 34 ma

Data Transmission Speeds Over Modern Channels and Ethernet

     An image is 1024x768 pixels with 3 bytes/pixels. Assume the image is uncompressed. How long does it take to transmit it over a 56-kbps modem channel? Over a 1-Mbps cable modem? Over a 10-Mbps Ethernet? Over 100-Mbps Ethernet?

Drawing the Waveforms using Different Encoding Schemes

Draw the waveform for the ASCII code for the character Z (upper-case) using a) non-return-to-zero (NRZ, also called NRZ-L) line coding; b) non-return-to-zero, invert-on-one (NRZI) line coding; and c) 4B/5B-NRZI block coding. Assume 7-bit ASCII plus an odd parity bit. Whenever needed, assume that the signal was at a low vol

Network multilayer protocol

The president of company A decides that company A should work with company B to develop a new product. The president tells her legal department to look into the idea, and they in turn ask the engineering department for help. As a result, the chief engineer calls his counterpart at the other company to discuss the technical aspec

DISCUSSION: Selecting an Appropriate WSDL

This Discussion focuses on a situation that you could face as a member of an architecture team. Some proposed protocols become standards. Usually, standards evolve over a period of time, with new versions being introduced every so often. However, new versions are usually not adopted immediately and may not have sufficient tool s

Termination Planning and Future Projects

There is often a wealth of information that can be mined from a project, successful or unsuccessful, that can be used in future projects, for example for planning activities such as schedule and cost estimation. What aspects of termination planning can be used to facilitate this process?

Scheduling and Resourcing Issues: Using Two Tiers of Developers

Suggestion: It would be feasible to enhance productivity, and ease scheduling conflicts, by having two tiers of developers working on I.T. project teams. The idea is that elite or upper tier developers would be scheduled to work on new projects, creating new applications quickly and efficiently, whilst "cheaper" (less skilled/ex

Mix Integers and Single Expressions

You can mix integers and non-integers in a single expression. For example: 123."A" = "123A" "4A"+123 = 127, "5.5" + 5 = 10 Non-integers are converted to integers as required by the operators. The non-integer converts to an integer starting with the left-most character and continuing until encountering a non-numeric character. In

Exception Class with Two Constructors

Define an exception class called tornadoException. The class should have two constructors, including the default constructor. If the exception is thrown with the default constructor, the method what should return "Tornado: Take cover immediately!". The other constructor has a single parameter, m, of the int type. If the

Accepted standards in the computer industry

This solution provides the learner with an understanding of why a computer manufacturer would decide to abide by acceptable standards. The solution provides discusses when it is appropriate for a manufacturer to deviate from accepted standards.

(ref3) Tens Complement Representation

The tens complement of the decimal number X is defined to be (10 superscript N ) - X, where N is the number of decimal digits in the number. Describe the use of tens complement representation to perform decimal subtraction. Illustrate the procedure by subtracting (0326) subscript 10 from (0736)subscript 10

Packed Decimal Numbers

Please note this refer to PACKED decimal numbers. For each of the following packed decimal numbers, show the decimal value: a. 0111 0011 0000 1001 b. 0101 1000 0010 c. 0100 1010 0110

Information Technology Architecture

My project team at my place of employment is working a task that we (being all relatively new) are fully understanding. What we need to know is how does the information technology architecture differ from an information vision?