Computer science

From q1 to q7 you need to search in academic source and write a references for each q in APA style .

Q1          Suppose you would like to buy a computer for your own needs.

What are the major considerations and factors that would be important in your decision? What technical factors would influence your decision?

Now try to lay out a specification for your machine.

Consider and justify the features and options that you would like your machine to have.

Q2 Locate a current reference that lists the important protocols that are members of the TCP/IP protocol suite.

Explain how each protocol contributes to the operation and use of the Internet.

Q3.         Explain the relationships among the following words: system, environment, boundary, and interface.

 

Q4.         What does the top-down approach allow a system architect to do that might be more difficult otherwise?

 

Q5.         Many system architects base their IT system designs on an n-tier architecture, where n is a number with value 2 or greater.

Explain the difference between a single-tier architecture and an n-tier architecture.

What are the main advantages claimed for an n-tier architecture?

 

Q6          Figure 2.8 illustrates the basic architecture for a three-tier database system.

This system can be viewed as an IPO (input-processing-output) system.

What is the input for this system?

What environmental element generates the input? (Hint: the Web browser computer is within the system boundary.)

What is the expected output from this system?

What environmental element receives the output?

Briefly describe the processing that takes place in this system.

 

Q7.         It is common to represent network connections in IT systems as a cloud.

The cloud is obviously an abstraction as we defined abstraction in this chapter.

What does the cloud abstraction actually represent?

 

 

Q8. What is excess notation? What is two’s complement notation?
Q9. What is the numeric range of a 16-bit two’s complement value? A 16-bit excess notation value? A 16-bit unsigned binary value?
Q10. What is overflow? What is underflow? How can the probability of their occurrence be minimized?
Q11. How and why are real numbers more difficult to represent and process than integers?
Q12. Why may a programmer choose to represent a data item in IEEE 64-bit floating point format instead of IEEE 32-bit floating point format? What additional costs may be incurred at run time (when the application program executes) as a result of using the 64-bit instead of the 32-bit format?
Why doesn’t a CPU evaluate the expression ‘A’ = ‘a’ as true?

—————————————————————————————

Q13.    Write a Little Man program that accepts three values as input and produces the largest of the three as output.

You are required to use symbolic addressing as described in Lecture 5. Do not use any direct mailbox addressing.

Note: Write the pseudocode first to perform this task and then write the LMC code.

I have finish this question, but you need to write the pseudcode

START: IN     | INPUT X

STO X

IN

STO Y  | INPUT Y

IN

STO Z  | INPUT Z

SUB X  | ACC = Y -X

BRP ELSE1  | IF (Y>X) THEN

LDA X   | X IS THE LARGEST , ACC = X

BR END1

ELSE1: LDA Y    | ELSE Y IS LARGEST . ACC= Y

END1:STO MAX    | MAX=ACC LARGER PF X AND Y

LDA MAX

SUB Z      | ACC = MAX -Z

BRP ELSE2   | IF (MAX>Z)THEN

LDA Z    | Z IS LARGEST , ACC = Z

BR END2

ELSE2: LDA MAX |ELSE MAX IS LARGEST . ACC= MAX

END2: STO MAX   | MAX=ACC  LARGER  MAX AND Z

LDA MAX

OUT

HLT

X:     DAT 00

Y:     DAT 00

Z:     DAT 00

MAX:   DAT 00

 

 

Q14.    Write a Little Man program that accepts an indefinite number of input values. The output value will be the largest of the input values. You should use the value 0 as a flag to indicate the end of the input.

You are required to use symbolic addressing as described in Lecture 6. Do not use any direct mailbox addressing.

Note: Write the pseudocode first to perform this task and then write the LMC code.

 

Q15.    Write a Little Man program that outputs the sum of n number of input values.

You are required to use symbolic addressing as described in Lecture 6. Do not use any direct mailbox addressing.

Note: Write the pseudocode first to perform this task and then write the LMC code.

 

Q16.    For your LMC assembly language source codes written for Q1, Q2 and Q3, write the 5final machine code for each of these source codes using the following steps of the LMC two pass assembler:

  1. Draw the Symbol Table.
  2. Write the partial LMC machine code after the first pass.
  3. Write the final LMC machine code after the second pass.

 

find the cost of your paper