...(1.12) Case Study #4 Original Values from Figure 1.26 Chip | # of cores | Clock Frequency (MHz) | Memory Performance | Dhrystone Performance | Athlon 64 X2 4800+ | 2 | 2400 | 3423 | 20718 | Pentium EE 840 | 2 | 2200 | 3228 | 18893 | Pentium D 820 | 2 | 3000 | 3000 | 15220 | Athlon 64 X2 3800+ | 2 | 3200 | 2941 | 17129 | Pentium 4 | 1 | 2800 | 2731 | 7621 | Athlon 64 3000+ | 1 | 1800 | 2953 | 7628 | Pentium 4 570 | 1 | 2800 | 3501 | 11210 | Processor X | 1 | 3000 | 7000 | 5000 | a) Results normalized to Pentium D 820 (calculation performed in MS Excel) Chip | # of cores | Clock Frequency (MHz) | Memory Performance | Dhrystone Performance | Athlon 64 X2 4800+ | 2 | 2400 | 1.141 | 1.361235217 | Pentium EE 840 | 2 | 2200 | 1.076 | 1.241327201 | Pentium D 820 | 2 | 3000 | 1 | 1 | Athlon 64 X2 3800+ | 2 | 3200 | 0.980333333 | 1.12542707 | Pentium 4 | 1 | 2800 | 0.910333333 | 0.500722733 | Athlon 64 3000+ | 1 | 1800 | 0.984333333 | 0.501182654 | Pentium 4 570 | 1 | 2800 | 1.167 | 0.73653088 | Processor X | 1 | 3000 | 2.333333333 | 0.328515112 | b) Arithmetic means calculation results (calculation performed in MS Excel) Chip | Original Arithmetic Means of Performance | Normalized Arithmetic Means of Performance | Athlon 64 X2 4800+ | 12070.5 | 1.251117608 | Pentium EE 840 | 11060.5 | 1.158663601 | Pentium D 820 | 9110 | 1 | Athlon 64 X2 3800+ | 10035 | 1.052880201 | Pentium 4 | 5176 | 0.705528033 | Athlon 64 3000+ | 5290.5 |...
Words: 598 - Pages: 3
...SAMPLE QUESTION PAPER 1 Computer Applications in Financial Markets Class XI Time allowed : 2 hours Maximum Marks : 40 Note : (i) All questions are compulsory. (ii) Question 1 consists of 10 questions of 1 mark each. (iii) Question 2 consists of 5 questions of 2 marks each. (iv) Question 3 consists of 5 questions of 4 marks each. (v) Answer the questions after carefully reading the text. |1. |Answer the following questions: | | |(a) |Expand the terms DVD and USB. |1 | | | | | | | |Ans |DVD stands for Digital Versatile Disc and USB stands for Universal Serial Bus. | | | | |( ½ Mark each for each correct full form) | | | |(b) |Which function key is used as a toggle key for changing cell referencing modes? | | | | | |1 | | ...
Words: 1930 - Pages: 8
...Course Website (Blackboard): http://iol.tamucc.edu/ Course Materials 1. Required Text: O’Brien, James and George Marakas, Introduction to Information Systems: Essentials for the E-Business Enterprise, 16th ed., Irwin/McGraw-Hill. Print - ISBN: 0073376884 eText – ISBN: 0077506413 2. Course material through http://iol.tamucc.edu/ Optional Materials None Prerequisites MISY 2305 or equivalent and Junior standing or above. Course Description: Provides an understanding of the importance of computer-based information in the success of the firm. Illustrates ways in which companies utilize computer systems to strategically compete within certain industries. Emphasis is on the role of information systems within each of the functional areas of business. Major concepts include data management, decision support, and management information systems. Relationship to Other Coursework: Where MISY 2305 provides for hands-on general entry-level computer package skills, this course revolves around business information systems and advanced...
Words: 2297 - Pages: 10
...UNIT 4 HW Assignment 1. List and describe three SMTP server security threats. A1: brute force attack. This security threat is identified by the way in which the attacker tries to break security. This is done by trying to guess the password through the mail server or other service working on your system using software that will use all possible combinations for the password until it guesses the correct one. A2: denial-of-service also known as DoS. This attack will shut off access to your site. The attacker will increase traffic on your site. The increased traffic will cause your site to become unresponsive and shut down. A3: malware. Malware is malicious software which can be in various forms such as Trojans, viruses, spyware and worms. Malware is usually installed without the user’s consent. It can attack the user’s computer and then use the user’s computer to attack other computers. To help prevent the spread of malware, you can have firewalls and proper security software protection. 2. List three suggestions to harden SMTP server security. A1: Digitally sign and encrypt your Email. By doing this you will prevent others from the ability to open and read your email. This will ensure that it is only opened by the person you sent it to. A2: Backup your Exchange server periodically. By doing this you will have copies of everything on your computer to use in case you need to reinstall if your computer crashes due to an attack. A3: Deploy Front End Server: Deploy...
Words: 286 - Pages: 2
...RECOMMENDED READING : 1. Pankaj Jalote. An Integrated approach to Software Engineering 6th Edition 2. Ghezzi, Jazayeri, Mandrioli “Fundamentals of Software Engineering”, 2/E, Pearson Education, 2002 3. Stephen R Schach “Software Engineering with JAVA”, TMH An Introduction to Software Engineering Let us start with a question : You are given a problem for which you have to build a software system that most students feel will be approximately 10,000 LOC. If your are working full time on it, how long will it take you to build this system ? What could be your answer ??? • • • Perhaps 2 to 3 months What can you say about productivity? If completion time is 2 months, we can say that the productivity is 5000 LOC per person-month Now, let us take an alternative scenario – we act as clients and pose the same problem to a company that is in the business of developing software for clients What would you say about the productivity? it is fair to say a productivity figure of 1,000 LOC per person-month !!!! Why this difference in two scenarios ???? The Problem Domain Student System • • Built to illustrate something or for hobby Not for solving any real problem Solves some problem of some users where larger systems or businesses may depend on the software Where problems in the software can lead to significant direct or indirect loss Industrial Strength Software [P. Jalote] • • Student system versus Industrial Strength Software ...
Words: 635 - Pages: 3
...CIS190-04 Computer Applications Kendall College 900 N. North Branch Street Chicago, IL 60642 Course: CIS190-04 Instructor: Mr. Loren Hildebrand Term: Fall 2013 Office Location: 245 Meeting Days: Tu Th Office Hours: MW 8:30-10:10 MW 1:00-2:15 TuTh 10:20-12:00 Meeting Time: 12:50-2:30 Phone Number: (312) 752-2434 ------------------------------------------------- Classroom: 624 E-Mail: loren.hildebrand@kendall.edu ------------------------------------------------- ------------------------------------------------- Note about e-mail: Always put the class name, section number, your last name and whatever subject matter in the subject line of your emails. Do this for all of your classes. For example if you’re in CIS190 Section 04, your name is Chris Smith and you have a question about assignment 5, the subject line on your email should look like this: CIS190-04 Smith Question about HW 5. ------------------------------------------------- ------------------------------------------------- General Education Mission Statement The mission of the General Education Program at Kendall College is to provide students with the breadth and depth of knowledge necessary to be educated, responsible, and adaptable global citizens and leaders in their chosen service industries. Using student-centered and active learning techniques, the faculty supports students...
Words: 2636 - Pages: 11
...COMPUTER ORGANIZATION AND ARCHITECTURE DESIGNING FOR PERFORMANCE EIGHTH EDITION William Stallings Prentice Hall Upper Saddle River, NJ 07458 Library of Congress Cataloging-in-Publication Data On File Vice President and Editorial Director: Marcia J. Horton Editor-in-Chief: Michael Hirsch Executive Editor: Tracy Dunkelberger Associate Editor: Melinda Haggerty Marketing Manager: Erin Davis Senior Managing Editor: Scott Disanno Production Editor: Rose Kernan Operations Specialist: Lisa McDowell Art Director: Kenny Beck Cover Design: Kristine Carney Director, Image Resource Center: Melinda Patelli Manager, Rights and Permissions: Zina Arabia Manager, Visual Research: Beth Brenzel Manager, Cover Visual Research & Permissions: Karen Sanatar Composition: Rakesh Poddar, Aptara®, Inc. Cover Image: Picturegarden /Image Bank /Getty Images, Inc. Copyright © 2010, 2006 by Pearson Education, Inc., Upper Saddle River, New Jersey, 07458. Pearson Prentice Hall. All rights reserved. Printed in the United States of America. This publication is protected by Copyright and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. For information regarding permission(s), write to: Rights and Permissions Department. Pearson Prentice Hall™ is a trademark of Pearson Education, Inc. Pearson® is a registered trademark of...
Words: 239771 - Pages: 960
...Ocpar, Inc. Proposal Bill Johnson Strayer University April 29, 2012 Statement of Need Ocper, Inc. currently has 20 Windows peer-to-peer client computers which are all connected via coax cabling. The president also indicates that the company plans to double in size over the next two years, but she is leery about drastically altering the computer environment. They have indicated that they will possibly be expanding from 20 to 40 users over the next few years. The president has indicated that she would prefer to hold the costs down thought she has indicated that this upgrade is an investment for the future.. My proposal consists of the following: First of all I have proposed to her that they upgrade their PC’s to an Ethernet network which will add more speed and stability to their network. I have suggested that Ocpar buy a total of (20) twenty Intel Gigabit CT PCI Desktop Network adapters at $31.99 per for a total of $639.80. I am also proposing they upgrade their network to a scalable distributed backbone network centralized around a Cisco Small Business 300 Series Managed Switch SF300-24 (24 ports) at a cost of $224.99. The one large item I am proposing to change their network is the purchase of one (1) Dell PowerEdge T310 Server at $3,643.00. This server will suffice what their work is now but it is also something they can grow into. The PowerEdge T310 includes the following: Hard Drives 500GB 7.2K RPM SATA 3.5in Cabled Hard Drive plus one (1) 1TB 7.2K RPM SATA...
Words: 550 - Pages: 3
...Computer Fundamental What Is Computer? Kw¤úDUvi wK? Computer kãwUi mvaviY A_© n‡”Q MYK hš¿| j¨vwUb kã Compute †_‡K Bs‡iRx Computer k‡ãi DrcwË| Compute kãwUi A_© MYbv ev wnmve wbKvk Kiv| Kw¤úDUv‡ii mvnv‡h¨ g~jZt †hvM, we‡qvM, ¸Y, fvM BZ¨vw` Kvhv©ejx m¤úv`b Kiv hvq| wKš‘ eZ©gvb hy‡M Kw¤úDUv‡ii eûgyLx e¨env‡ii d‡j Kw¤úDUv‡ii ms½v A‡bK e¨vcKZv jvf K‡i‡Q| †Kvb mxwgZ ms½v w`‡q Avi Kw¤úDUvi‡K MÛxe× Kiv hvq bv| Who Is The Inventor Of Computer? Kw¤úDUvi -Gi Avwe®‹viK ‡K? wewkó weÁvbx weªwUk MwYZwe` Pvj©m e¨v‡eR AvaywbK Kw¤úDUv‡ii g~jbxwZ wbav©iY K‡ib| ‰eÁvwbK cÖhwy ³i Afv‡e e¨v‡e‡Ri GB g~jbxwZ ev¯—evqb Kiv m¤¢e nqwb| ZeyI Zvui GB hyMvš—Kvix wPš—vfvebv Ges cÖ‡Póvi Rb¨ Zvu‡K AvaywbK Kw¤úDUv‡ii RbK ejv nq| 1887 mv‡j Wv³vi nvigvb n‡jwi_ Av‡gwiKvi Av`gïgvixi KvR `ª“Z m¤úv`‡bi Rb¨ Pvj©m e¨v‡e‡Ri g~jbxwZ wb‡q M‡elbv ïi“ K‡ib| c‡i 1911 mv‡j `yÕwU wfbœ ‡Kv¤úvbxi mn‡hvMxZvq wZwb KgwcDwUs, †Uey‡jwUs I †iKwW©s †Kv¤úvbx cÖwZôv K‡ib| hv c‡i wek¦ weL¨vZ IBM (International Business Machine) -G iƒcvš—wiZ nq| Computer Structure: Kw¤úDUvi Gi MVb cÖbvjxt Computer g~jZt wZbwU As‡k wef³| †hgb t 1. Input Device. D`vniYt Kx †evW©, gvDm, Rqw÷K, MÖvwd· c¨vW, ¯‹vbvi BZ¨vw`| 2. Central Processing Unit (CPU) 3. Output Device. D`vniYt gwbUi, wcÖ›Uvi, w¯úKvi cÖfw„ Z| BbcyU wWfvBm MvwbwZK hyw³ Ask -----------^----------‡m›Uªvj BDwbU --- > -----------^----------¯§„wZ GjvKv AvDUcyU wWfvBm Kw¤úDUvi I gvby‡li g‡a¨ cv_©K¨t Kw¤úDUvi I gvby‡li g‡a¨ cv_©K¨ n‡jv Kw¤úDUvi †h †Kvb Kv‡Ri djvdj AwZ `ª“Z MwZ‡Z cÖ`k©b K‡i| wKš‘...
Words: 3038 - Pages: 13
...Dell in ’84, • Competitors strategy :: use resellers for large corporate accounts, due to lack of sales force • 1986- IBM moves to propriety architecture with PS/2 line and rejects 386 chip • 1980-90 – PC performace improved and chip price declined, o New technology advancement of 386DX and Pentium II processors were significant o Windows 3.0 launched in 1990, commonly called Wintel architecture o PC Sales declined in 1990 due to US recession • Post 1990 o Demand picks up due to economic growth, and technology like computer Networking, email and WWW. o PC prices decline to less than 499USD, 45.5% of US household owsn PC in 1998 â–ª Modular architecture prevalent for HW and SW, PC differed depending on configuration â–ª Most HW components sourced my numerous companies and highly competitive, however the Microprocessor was controlled by INTEL with 90% share, similarly for OS , Microsoft owned the market and even 80% of the productivity SW, like word processor, â–ª HW and SW started selling as integrated bundle â–ª PC customers were of 4 types • Individuals (33% of Market)- buying depended on evaluations provided by consumer Reports • Educational...
Words: 1511 - Pages: 7
...| Disaster plan | | | | 6/6/2010 | | Abstract This is a disaster plan that I created for the IST Department of XYZ Computers company in order to prevent any future problems that may arise such as the situation they had over the weekend when a major water pipe broke and flooded the first floor, causing extensive damage to the servers. Included in the disaster plan I will address a few issues that will aid the company in protecting against such things as any natural disasters that may occur as well as any other occurrences that may deem necessary for such a disaster plan. I will detail my recommendations for using a RAID system for data protection in order to have a well placed back up plan with the most up to date information possible. In short I plan to properly detail a disaster plan the best possible way that I can in order to have a good disaster recovery plan in place rather than having to spend the time and money on extra recovery efforts. Hopefully having such a plan in place will keep from losing important data to unforeseen issues, such as natural disasters due to the geographical location among other issues that may arise at the most in opportune time possible. When creating a disaster plan the first thing to keep in mind is to do a complete risk assessment of the entire existing computer systems. In order to accomplish this task all the risks and probabilities will need to be noted such as any delays to system uptime and how close at hand these...
Words: 1273 - Pages: 6
...Term Paper Proposal To: Dr. Vijay Karan From: Ming-Tzu Chou Date: 13 February 2012 Subject: Management control system Proposed Research Topic: How a new strategy saved and created a bright future for IBM in 90s. Statement of problem: In the early 1990s, IBM suffered in dramatically declining in the revenue of the mainframe sales, and the stock price also dropped. During the period, the personal computer was the most popular products in Information Technology market, and the mainframe was already outdated. Last but not least, IBM could not reduce its cost according to its size and bureaucracy. As a result, many people believed that IBM could only fell or be divided to smaller companies. Louis V. Gerstner, Jr., who was the new CEO, saved IBM and implemented different strategies in the company. Objective & Method: The purpose of the study is to evaluate how a new strategy affected IBM. Except the abstract, the term project will be separated to four parts: problem statement, strategy formulation and strategy planning of solutions, the summary of results, and recommendations. The term project should reach the following goals through in the four sections. 1. Problem statement will describe IBM’s previous business situation and introduce how problems had generated before Gerstner arrived. 2. The solutions from Gerstner will be deeply analyzed according to the theories from strategy formulation and strategy planning in the textbook. 3. The summary of results will be presented...
Words: 319 - Pages: 2
... 2012). Bleeding technology is relatively, new technology. Bleeding technology is unreliable because it has not been tested and it has not proven its worthiness or authenticity. A user will be taking a huge risk to use the bleeding technology which would be more expensive than the leading technology. Bleeding edge technology could be very costly and it could turn into something that could be the beginning of a serious problem. The reason why bleeding edge technology could cause many problems is because it is new and might be quite risky because of the instability. Bleeding edge technology has not been thoroughly tested and has not proven itself to be reliable. As an example of bleeding technology would be an early development of a new computer product that is being develop for the very first time. When a consumer decides to purchase the product, the cost is not the only thing that the consumer faces when choosing to purchase the bleeding edge technology; it is possible that the customer might get stuck with...
Words: 1786 - Pages: 8
...1 Teachers’ Views of Computers as Catalysts for Changes in Their Teaching Practice Sara L. Dexter and Ronald E. Anderson University of Minnesota Henry Jay Becker University of California, Irvine This paper was published in the Journal of Research on Computing in Education. The citation for it is: Dexter, S., Anderson, R. E., & Becker, H. J. (1999). Teachers’ views of computers as catalysts for changes in their teaching practice. Journal of Research on Computing in Education, 31 (3), 221239. Abstract: In this study we examined the use of computers by teachers in their instructional practices and their perception of the impact of computers on changes they have made to their classroom practice. These data draw from 47 teachers from 20 K-12 schools across 3 states who each completed a questionnaire, participated in 3 semi-structured interviews, and allowed 3 observations of their classroom. The teachers who had adopted more progressive teaching practices over time felt computers helped them change but they did not acknowledge computers as the catalyst for change. Instead, they cited catalysts that included: reflection upon experience, classes taken, and the context or culture of the school. We conclude that in order for teachers to implement the use of educational technology in a constructivist manner, they must have opportunities to construct pedagogical knowledge in a supportive climate. Research funded by the program of Research on Education Policy and Practice at the National...
Words: 9206 - Pages: 37
...WBS Dictionary Team One Technologies Project Management | From start to finish lay out of the project | Scope / Requirements | Team One Technologies is determined to helping Greenway Bank develop an approach to examine their scale or level of risk management. | Design | The office will house a local LAN, create a revenue stream, a new inbound customer service call center | Headquarters and four branch locations | Four branches located in New York, Seattle, Orlando, and Los Angeles, corporate offices in St Louis | Budget breakdown / Materials | Total cost on parts, labor and time | Complete data network and communication to all locations | Networks connect large numbers of users to share information and resources | Physical Layout for Voice & Data | A building by building layout or diagram for the Physical layout for the voice and data network | Data storage and off site backups for all 5 locations | off-site data protection, or vaulting, is the strategy of sending critical data out of the main location (off the main site) as part of a disaster recovery plan.Example: Barracuda Networks | Network Configuration Plan | the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance, and provisioning of networked systems. | Documentation for business continuity | The activities performed by Team One Technologies to ensure that critical business functions will be available to customers, suppliers, regulators, and...
Words: 655 - Pages: 3