
Explanation of Solution
Major technologies used in business:
- Hardware is the physical component to connect with the
operating system . These computer hardware’s like mainframe computers, personal computers, supercomputers, workstations, and grid computers. - The data storage devices used to store data in the devices. These data storage devices like magnetic disk, optical disc, magnetic tapes, and storage networks are used in business.
- The input and output devices are used to communicate with the system with some peripherals. Input devices includes keyboard, mouse, touch screen, pen based input, scanner, and other input devices. Output devices include monitor, printers, and audio output.
- The hardware trends used in business today are nanotechnology, cloud computing based technology, mobile digital platform, grid computing, cloud computing, and so on.
Types of computers available to business today:
There are various types of computers available in business today is as follows:
- Personal computers
- Workstations
- Mainframes
- Super computers
- Servers
- Grid computing
Personal computers:
It is the desktop computers used for a person or peoples in small business. It handles all the basic functionalities compared to server computers.
Workstations:
These computers have a powerful functionalities and graphical capabilities than PCs. It is used in designing work with powerful graphic tool and capabilities.
Mainframes:
It is the large capacity computers with high performance which process the vast amount of data quickly.
Super computers:
It is an advanced machine which is used to solve the complicated calculations, millions of measurements with multiple variables, and thousands of equations.
Servers:
This type of computers used to share the files, software, peripheral devices, or other network related resources through
Grid computing:
It is the remote computing system which is connected to the single network to virtual super computer by combining the computational power of all computers in a grid.
Client and server model:
- The two or many computers are connected with each other through network for data processing is called distributed processing. The client/server is one of the distributed processing which passes the data between client and server.
- Both client and server is the computer system which works on internet and connected with each other. The client is called use and server provides the service to the user.
- The client system access the client part of the application and server stores the information and share the data with network activities.
Difference between two-tiered and n-tier client/server architecture;
Two-tier client/server architecture | n-tier client/server architecture |
It has two computer systems. One system used for client system and another one is used for server system. | It has multiple numbers of clients and servers. |
The process of data splits between two types of machines. | The process is splits between multiple number of clients and servers. |
It is the simple system. | It is the complex system. |
Secondary storage media:
The storage device is places internal or external to the computer is known as secondary storage media. The list of secondary storage media is as follows:
- Magnetic disk
- Optical disk
- Magnetic tape
- Storage networks
Magnetic disk:
Magnetic disks are most widely used secondary device which includes floppy and hard disks. These magnetic disks are convenient to use, permit the direct access with individual records, and provide fast access speed.
Strengths of magnetic disk:
- The magnetic disk supports the direct access to the data which is not possible in magnetic tapes.
- It is light weighted and easy portable form one to another place.
- Data transfer rate is higher than the magnetic tapes.
Limitations of magnetic disk:
- It is costlier than magnetic tapes.
- Difficulty to maintain data securely.
Optical disk:
It has the greater density than the magnetic disks to store the vast quantity of data such as documents and reference materials.
Strengths of optical disk:
- It uses the laser technology for large quantity of data such as audio, video, and images.
- The cost of the optical disk is low and provides the extensive storage
- It is portable.
Limitations of optical disk:
- The data in optical disk can be editable in 3 to 4 times only. Because, it has limited editable accessibility in optical disk...

Want to see the full answer?
Check out a sample textbook solution
- also provide the number of moves(actions) made at state A and moves(actions) made state B. INCLUDE Java program required(this question is not graded)arrow_forwardYou are given a class that processes purchases for an online store. The class receives calls to: • Retrieve the prices for items from a database • Record the sold items • Update the database • Refresh the webpage a. What architectural pattern is suitable for this scenario? Illustrate your answer by drawing a model for the solution, showing the method calls/events. b. Comment on how applying this pattern will impact the modifiability of the system. c. Draw a sequence diagram for the update operation.arrow_forward2. The memory management has contiguous memory allocation, dynamic partitions, and paging. Compare the internal fragmentation and external fragmentation for these three approaches. [2 marks] 3. Suppose we have Logical address space = 24 = 16 (m = 4), Page size=2² =4 (n = 2), Physical address space = 26 = 64 (r = 6). Answer the following questions: [4 marks] 1) Total # of pages ? 2) Total # of frames ? 3) Number of bits to represent logical address? 4) Number of bits to represent offset ? 5) Number of bits to represent physical address? 6) Number of bits to represent a page number? 7) Number of bits to represent a frame number / 4. What is translation look-aside buffers (TLBS)? Why we need them to implement the page table? [2 marks] 5. Why we need shared pages for multiple processes? Give one example to show the benefits. [2 marks] 6. How to implement the virtual memory by using page out and page in? Explain with an example. [2 marks] 7. We have a reference string of referenced page…arrow_forward
- Good morning, please solve this trying to follow this criteria. (use Keil) Abstract describing the requirements and goals of the assignment. List file with no errors or warnings. Brief description of your implementation design and code. Debugging screen shots for different scenarios with your reference and comments. Conclusion (and please give me the code without errors, make sure it is working)arrow_forwardGood mrng, please solve this trying to follow this criteria. (use Keil) Abstract describing the requirements and goals of the assignment. List file with no errors or warnings. Brief description of your implementation design and code. Debugging screen shots for different scenarios with your reference and comments. Conclusion (and please give me the code without errors, make sure it is working)arrow_forward#include <stdio.h> #include <stdlib.h> #include <unistd.h> int global_var = 42; // int* function(int *a) { int local_var = 10; // *a = *a + local_var; int *local_pointer = (int *)malloc (size of (int) * 64); // Allocated array with 64 integers return local_pinter; } int main() { int local_main[1024*1024*1024*1024*1024] = {0}; // initialize an array and set all items as 0 int *heap_var = (int *)malloc(size of(int) * 16); // Allocated array with 16 integers *heap_var = 100; function(heap_var); printf(“the value is %d\n”, *heap_var); free(heap_var); // release the memory return 0; } 1) draw the memory layout of the created process, which should include text, data, heap and stack [2 marks]. 2) Indicate which section the variables are allocated [2 marks]: global_var local_var, local_pointer local_main heap_var, *heap_var (the data that it points to) 3) Does this code have memory leaking (heap memory is not released)? [2 marks] 4) The…arrow_forward
- 8. List three HDD scheduling algorithms. [2 marks] 9. True or False? The NVM has the same scheduling algorithms with HDD. Explain why? [2 marks] 10. Why the modern mouses use polling to detect movements instead of interrupts? [2 marks] 11. What is thrashing? How does it happen? [2 marks] 12. Given a reference string of page numbers 7, 0, 1, 2, 0, 3, 0, 4, 2, 3, 0, 3, 0, 3, 2, 1, 2, 0, 1, 7, 0, 1 and 4 frames show how the page replacement algorithms work, and how many page faults? [6 marks], 1) FIFO algorithm? [2 marks] 2) Optimal algorithm? [2 marks] 3) LRU algorithm? [2 marks] 13. List at least three file systems that you know. [2 marks] 14. In C programming, how the seek to a specific position in the file by offset? [2 marks]arrow_forwardA Personal Address Book application program allows the user to add, delete, search, save, and load contact information. The program separates the user interface (command-line) and the internal processing subsystem. The internal processing system consists of the following classes: • • Contact Manager (responsible for add and delete operations) Contact Finder (responsible for the search operation) pataManager (responsible for save and load operations) a. What design pattern can be used to implement the user interface? Explain your answer using a class diagram for the entire system. b. Draw a UML sequence diagram to show the behavioral view of the Personal Address Book program, demonstrating what happens when a user enters new contact information.arrow_forwardA system comprises three components: A, B, and C. Calling A requires calling B, and calling B requires calling A. Component C is responsible for dissimilar tasks T#1, #2, and T#3. a. Comment on the modifiability of this system. What problems do you see in this system, and how would you solve them? b. Suppose that T#1 is performed by both component A and C. What does this indicate about A and C? How would you solve this problem?arrow_forward
- Please answer questions from number 1 to 3 if these questions in the image provided below(NOTE: THESE QUESTIONS ARE NOT GRADED!)arrow_forwardIn a client-server system for a hypothetical banking application, the clients are ATM machines, and the server is the bank server. Suppose the client has two operations: withdraw and deposit. Use the broker architectural pattern to document an initial architecture design for this system: a. Draw a class diagram for this system. Use a client-side proxy to encrypt the data using an encrypt operation and a server-side proxy to decrypt the data. b. Discuss how you plan to apply redundancy tactics on the server. Additionally, identify the quality attribute that this tactic will achieve and discuss any potential side effects of applying it.arrow_forwarda. Comment on how you would achieve higher performance for a hypothetical Trent Course Registration System, assuming it utilizes a client-server architecture. b. Suppose we want greater availability of the server. Discuss what kind of tactics should be used to achieve that.arrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education





