...Viva Voce Total University Examinations Durations Max in Hrs Marks 3 100 3 100 3 100 3 100 3 100 3 3 3 3 100 100 100 100 100 1000 II For project work and viva voce (External) Breakup: Project Evaluation : 75 Viva Voce : 25 1 Anx.31 J - M Sc CS (SDE) 2007-08 with MQP Page 2 of 16 YEAR – I PAPER I: ADVANCED COMPUTER ARCHITECTURE Subject Description: This paper presents the concept of parallel processing, solving problem in parallel processing, Parallel algorithms and different types of processors. Goal: To enable the students to learn the Architecture of the Computer. Objectives: On successful completion of the course the students should have: Understand the concept of Parallel Processing. Learnt the different types of Processors. Learnt the Parallel algorithms. Content: Unit I Introduction to parallel processing – Trends towards parallel processing – parallelism in uniprocessor Systems – Parallel Computer structures – architectural classification schemes – Flynn’ Classification – Feng’s Classification – Handler’s Classification – Parallel Processing Applications. Unit II Solving problems in Parallel: Utilizing Temporal Parallelism – Utilizing Data Parallelism –...
Words: 3613 - Pages: 15
...Computers: Tools for an Information Age Chapter 6 Storage and Multimedia: The Facts and More Copyright © 2003 by Prentice Hall Secondary Storage • Separate from the computer itself • Software and data stored on a semipermanent basis – Unlike memory, not lost when power is lost • Benefits Copyright © 2003 by Prentice Hall 2 Benefits of Secondary Storage • • • • Space Reliability Convenience Economy Return Copyright © 2003 by Prentice Hall 3 Space • Store a roomful of data on disks smaller than the size of a breadbox – Diskette contains equivalent of 500 printed pages – Optical disk can hold equivalent of 500 books Return Copyright © 2003 by Prentice Hall 4 Reliability • Data in secondary storage is relatively safe – Secondary storage is highly reliable – More difficult for untrained people to tamper with data stored on disk Return Copyright © 2003 by Prentice Hall 5 Convenience • Authorized users can easily and quickly locate data stored on the computer Return Copyright © 2003 by Prentice Hall 6 Economy • Several factors create significant savings in storage costs – Less expensive to store data on disks than to buy and house filing cabinets – Reliable and safe data is less expensive to maintain – Greater speed and convenience in filing and retrieving data Return Copyright © 2003 by Prentice Hall 7 Magnetic Disk Storage • Data represented as magnetized spots on surface of spinning disk – Spots on disk converted...
Words: 1315 - Pages: 6
...Project Management Question I: (Discussion and Review Questions No.6) What is a work breakdown structure, and how is it useful for project planning? Work breakdown structure (WBS) – a hierarchical listing of what must be done during a project. It is useful due to the fact that large projects usually involve a very large number of activities, planners need some way to determine exactly what will need to be done so that they can realistically estimate how long it will take to complete the various elements of the project and how much it will cost. Question II: What kind of projects need project management? What are the five phases of project management? To your understanding, what is the key reason why many projects fail? Anything with a goal and/or expected outcome, regardless if it has a budget or not, can benefit from using project management principles. The five phases of project management: 1. Scoping the project 2. Developing the plan 3. Launching the plan 4. Monitoring & controlling 5. Closing out the project Poor requirements analysis causes many of these failures, meaning projects are doomed right from the start. Question III: Chris received new word processing software for her birthday. She also received a check, with which she intends to purchase a new computer. Chris’s college instructor assigned a paper due next week. Chris decided that she will prepare the paper on the new computer. She made a list of the activities she will need...
Words: 684 - Pages: 3
...development skills, you also need to understand the server side of the Web— in particular, how server-side scripting fits into Web development. In this chapter, you will study server-side scripting with ASP.NET. But before getting into server-side scripting, it’s helpful to set the stage by reviewing the fundamentals of client/server architecture. 507 508 Chapter 11 ASP.NET CLIENT/SERVER ARCHITECTURE There are many definitions of the term’s client and server. In traditional client/server architecture, the server is usually some sort of database from which a client requests information. A server fulfills a request for information by managing the request or serving the requested information to the client—hence the term, client/server. A system consisting of a client and a server is known as a two-tier system. One of the primary roles of the client, or front end, in a two-tier system is the presentation of an interface to the user.The user interface gathers information from the user, submits it to a server, or back end, then receives, formats, and presents the results returned from the server. The main responsibility of a server is usually data storage and management. Heavy processing, such as calculations, on client/server systems usually takes place on the server. As desktop computers become increasingly powerful, however, many client/server systems place at least some of the processing...
Words: 5454 - Pages: 22
...is doing. a. doctor – cures the sick b. nurse – assists the doctor in healing the sick c. teacher – teaches children to learn things in school d. dressmaker – creates clothes e. chef – cooks food f. house helper– employed to do household work g. policewoman – empowered to enforce the law, protect property and reduce civil disorder h. soldier – defends the country against bad people i. firefighter – fights fire j. flight attendant – assists persons in an airplane Processing 1. What can you say about the gender shown in the pictures? 2. Are women good enough to attend to those kinds of responsibilities? 3. What are their advantage as a woman in their chosen field? Activity – Human Bingo Procedure 1. The participants will know about the mother of other participants. 2. Distribute the Human Bingo activity sheet to each participant. 3. Ask them to read the contents of the Human Bingo activity sheet to be familiarize with the contents. 4. Tell them to ask other participants to write their on the line if the given activity is being done by his/her mother. They need to find a different...
Words: 6346 - Pages: 26
...Lesson 2 Lab Worksheet Lab Exercises Lab 1 How TCP/IP Protocols Work through the TCP/IP Model The purpose of this lab is to familiarize the students with the TCP/IP Model and some of the protocols that are used in it. This lab is important to the student because it takes the student through a thought experiment about how data would pass thorough the TCP/IP Model down from the computer and up through the destination computer. By doing this thought experiment the student will come to better understand how different protocols work together to accomplish a specific task. Materials • Word processing document • Textbook Do the Lab Follow Protocols through the Layers of the TCP/IP Model 1. Read though the section of this lesson titled “How the Layers Work Together.” 2. Carefully study Figure 2-11. [pic] 3. In a word processing document, list the layers of the TCP/IP Model and then the protocols that the discussion you read says are used on each layer to move the data from one location on the network to another. The following is what your answer should look like: • Application layer: HTTP • Transport layer: TCP • Internet layer: IP • Network Interface layer: Ethernet 4. List the protocols as they correspond to the TCP/IP Model...
Words: 791 - Pages: 4
...Legacy Systems Older software systems that remain vital to an organisation ©Ian Sommerville Software Engineering, 6th edition. Chapter 26 Slide 1 Objectives To explain what is meant by a legacy system and why these systems are important To introduce common legacy system structures To briefly describe function-oriented design To explain how the value of legacy systems can be assessed ©Ian Sommerville Software Engineering, 6th edition. Chapter 26 Slide 2 Topics covered Legacy system structures Legacy system design Legacy system assessment ©Ian Sommerville Software Engineering, 6th edition. Chapter 26 Slide 3 Legacy systems Software systems that are developed specially for an organisation have a long lifetime Many software systems that are still in use were developed many years ago using technologies that are now obsolete These systems are still business critical that is, they are essential for the normal functioning of the business They have been given the name legacy systems ©Ian Sommerville Software Engineering, 6th edition. Chapter 26 Slide 4 Legacy system replacement There is a significant business risk in simply scrapping a legacy system and replacing it with a system that has been developed using modern technology Legacy systems rarely have a complete specification. During their lifetime they have undergone major changes which may not have...
Words: 2577 - Pages: 11
...stock and hatching, rearing parent stock, production of hatching eggs, hatching day old chick of broilers, growing broilers, slaughtering of broilers and further processing and selling poultry meat through supermarkets, supply to restaurants or further processing into convenience products. Only small numbers of organizations are Breeding Companies. For the most of the companies this business starts with growing a day old broilers. One section of the business is Broiler farm. The optimum for the initial operation of the business would be 10,000 chickens. The one day old chickens hatched from the parent generation are delivered to the farm. The Broiler farm will be on area of about 10,000 sq. meters for the farm with road connections, water availability and houses for growing broilers. Broiler farms, where day old chicks are raised to slaughter weight, will be located near the processing facilities to minimize the transport costs. The basic needs for the broilers are fresh feed, fresh water, fresh air, light, darkness, thermal environment, protection and space. Second section of the business is feed mill for food production. This section will provide meals that give good result for broilers with best conversion. Third section of the business is slaughterhouse and further processing of poultry meat. The processing section will selectively collect chickens of varying sizes from the broiler farm depending on its needs. The business objective is...
Words: 1293 - Pages: 6
...assigned to I/O devices, and reads and writes to those addresses are interpreted as commands to the I/O device 2. [10 points] Why is DMA an improvement over CPU programmed I/O? When CPU programmed I/O is used the CPU is usually fully occupied for the entire duration of the read or write operation and is unavailable to perform other work. With DMA the CPU initiates the transfer, does other operations while the transfer is in progress, and receives an interrupt form the DMA controller when the operation is complete. This frees up the CPU for other tasks. 3. [10 points] When would DMA transfer be a poor choice? When the amount of data transferred between memory and the I\O device is small. In this case the work to set it up would be more than the benefits of having it. 4. [15 points] Mention two advantages and disadvantages for using a single bus as a shared communication link between memory, processor and I/O devices. Advantages: versatility and low cost Disadvantages: communication bottleneck 5. [15 points] What is the average time to read or write a 512-byte sector for a typical disk rotating at 7200 RPM? The advertised average seek time is 8ms, the transfer rate is 20MB/sec, and the controller overhead is 2ms. Assume that the disk is idle so that there is no waiting time. -8 + (.5*60*1000/7200) + (512/20*2^20) * 1000 + 2 = -14.17 ms 6. [10 points] Discuss why RAID 3 is not suited for transaction processing applications. What kind of applications...
Words: 460 - Pages: 2
...additional processing capabilities can increase employee productivity, expand business opportunities, and allow for more flexibility. - To assemble an effective and efficient system, you should select and organize components while understanding the trade-offs between overall system performance and cost, control, and complexity. ex) Racecar : power delivery(effective and efficiency), how much(cost), how reliable(control), how many engine(complexity) hardware components - computer system hardware components include devices that perform input, processing, date, and output. - Central processing unit (CPU) consists of three associated elements : the arithmetic/logic unit, the control unit, and the register areas. - Primary storage, also called main memory or memory, is closely associated with the CPU. Memory holds program instructions and data immediately before or after the registers. Hardwar components in Action : instruction and execution Instruction time : Step 1) fetch instruction, step 2) decode instruction Execution time : step 3) execute instruction, step 4) store result Completing the instruction phase followed by the execution phase is called a machine cycle. Some processing units can speed processing by using pipelining, whereby the processing unit gets one instruction, decodes another, and executes a third at the same time. Processing and memory devices : Power, Speed, and Capacity The components responsible for processing – the CPU...
Words: 1317 - Pages: 6
...Policies at Littlefield Purchasing Supplies Processing in Batches Contract Pricing Borrowing from the Bank Cash Balance The winning team is the team with the most cash at the end of the game (cash on hand less debt). Current State of the System and Your Assignment At the end of day 350, the factory will shut down and your final cash position will be determined. Starting at 5 PM on Wednesday, February 27, the simulation will begin The game will end at 9 PM on Sunday, March 3. PLEASE DO NOT WAIT UNTIL THE FINAL SECONDS TO MAKE YOUR CHANGES. SOMETIMES THEY TAKE A FEW MINUTES TO BE PROCESSED. Written Assignment: Analysis of Game 2 of Littlefield Technologies Simulation Due March 14, 8:30 am in eDropbox Your group is going to be evaluated in part on your success in the game and in part on how clear, well structured and thorough your write-up is. The write-up only covers the second round, played from February 27 through March 3. It should not discuss the first round. Your write-up should address the following points: • A brief description of what actions you chose and when. Not a full list of every action, but the major actions such as machine purchases, large changes in inventory policy, changes in production batch sizes and contract changes. • Explanation of the actions you chose. E.g., why did you choose to add / sell capacity at the times you chose? What factors and information did you take into account? How did you estimate variables that you were not given...
Words: 637 - Pages: 3
...reporting on servers/disks not used by transaction processing systems most firms want to set up transaction processing systems so there is a high probability that transactions will be completed in what is judged to be an acceptable amount of time. Reports and queries, which can require a much greater range of limited server/disk resources than transaction processing, run on the servers/disks used by transaction processing systems can lower the probability that transactions complete in an acceptable amount of time. Or, running queries and reports, with their variable resource requirements, on the servers/disks used by transaction processing systems can make it quite complex to manage servers/disks so there is a high enough probability that acceptable response time can be achieved. Firms therefore may find that the least expensive and/or most organizationally expeditious way to obtain high probability of acceptable transaction processing response time is to implement a data warehousing architecture that uses separate servers/disks for some querying and reporting. To use data models and/or server technologies that speed up querying and reporting and that are not appropriate for transaction processing There are ways of modeling data that usually speed up querying and reporting (e.g., a star schema) and may not be appropriate for transaction processing because the modeling technique will slow down and complicate transaction processing. Also, there are server technologies that that...
Words: 1160 - Pages: 5
...Research Question 1. Investigate a causal relationship. How does ‘X’ affect ‘Y’. ‘X’ and ‘Y’ need to be measurable. Eg. How does molecular mass of straight chain alcohol affect boiling point? Hypothesis 1. Predict the relationship and no need of the magnitude. Eg. As the molecular mass increases , the boiling point increases. 2. Explain the logic behind the hypothesis- Eg. As the molecular mass increases the B.P increases, the London Force increases, so does the IMF, more heat is required to separate, therefore more heat is needed. Apparatus and Materials ● Apparatus : Devices, Usable. Eg. Beaker. ● Materials : Not reusable. Eg. Alcohol Variables 1. Independent Variable - There are five increments. These increments would be tested. Eg. the molecular mass- 100 g, 101 g, 102 g, 103 g, 104 g. Trials a b c d 1 2 3 2. Dependent Variable - How to measure? How to calculate? Write the equation. 3. Controlled Variable- Have at least 3-5 Variable Significance How? Value Precautions 1. Mention whether it was flammable or toxic. Method 1. Precise and easy to follow. Data Collecting and Processing Collecting Qualitative Data 1. Always write in the point form. 2. Tell the time, when happened what. Eg. when did you see the flame? Quantitative Data Trials Ethanol 1 2 Median Value for Ethanol Standard Deviation Processing Plot the graph. 1. r^2 shows how much data is spread from mean to error. 2. Error bars-...
Words: 384 - Pages: 2
... name and 234 on your Scantron. Good luck. Dr.B MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) The perspective of development that examines adolescent development through the lens of brain processes is the 1) _________ A) social-cognitive perspective. B) psychoanalytic perspective. C) cognitive neuroscience perspective. D) behavioral perspective. 2) Vygotsky'ʹs sociocultural theory emphasizes 2) _________ A) cognitive neuroscience processes. B) the interconnectedness of the influences of development. C) daily reinforcements one receives in the environment. D) how cognitive development proceeds as a result of social interactions. 3) Which of the following is a criticism of the Piaget'ʹs cognitive perspective? 3) _________ A) Piaget'ʹs cognitive perspective overemphasizes the universality of cognitive stages. B) Piaget'ʹs cognitive perspective focuses too much on unconscious influences. C) Piaget'ʹs cognitive perspective focuses too much on operant learning. D) Piaget'ʹs cognitive perspective overemphasizes schemes. 4) Adolescents are more likely to conform to ________ on major issues, such as values and beliefs. 4) _________ A) parents more than peer groups...
Words: 3018 - Pages: 13
...system-level requirements and refine them into a detailed blueprint for the program. Up to this point, you have identified the processes the program must perform, but you have not given any consideration to exactly how the processes work together to solve the problem. At this point, you must generate a description of the processing using pseudocode, a natural language description of the processing the application must perform. The natural place to start is the system-level requirements you identified in the input-process-output (IPO) chart. Determine how the processes work together: Once you have determined the top-level logic, you can design each individual process. This step-wise refinement process allows you to conceptualize a vague problem into increasing levels of details to actually generate a working program. This point is important because the step-wise refinement process is used throughout the entire program development—each new piece of information is based on, and is a refinement of, the information uncovered in the previous step. For this week’s CheckPoint, you will refine the IPO table into a complete design, as demonstrated on pp. 80 & 83 in Ch. 2 of Prelude to Programming. Additionally, refer also to the Input and Output Process Example in Appendix B to see how more detailed analysis and design relates to the previously constructed IPO chart. The following information demonstrates all the items you need to develop your programming assignments and the final project...
Words: 489 - Pages: 2