Email me at this address if my answer is selected or commented on:Email me if my answer is selected or commented on
*
answeredJul 28, 2020by (user.guest)

*

The four major functions of the computer are as listed below:

1.

You are watching: 4 major functions of a computer

Data processing: manipulation of input data to produce meaningful information 

2. Data storage: writing of processed output to memory

3. Data movement: movement of data from source to destination memory registers

4. Control: Data management and security 

Please leave a comment below and share with other students in your network if you found this answer helpful. Happy learning!


The RAM is a temporal storage area in the computer system that usually contains the data that are being processed by the CPU. Briefly describe how the CPU and the RAM interacts to carry out their operation.
Discuss the importance of interrupts in the functioning of a computer and explain how interrupts are handled in instruction execution.
Give two examples of government functions that are supported by complex sociotechnical systems and explain why, in the foreseeable future, these functions cannot be completely automated.
Discuss an example of a type of system where social and political factors might strongly influence the system requirements. Explain why these factors are import in your example.
Explain what is meant by the term or phenomenon ‘Register naming’ and show by a sequence of program outline how this is achieved in a computer architecture
What do you understand by “scalability”? Discuss the differences between scaling up and scaling out and explain when these different approaches to scalability may be used.
Requirements Elicitation is a difficult process in requirements engineering. In your own words, describe the steps can be taken to minimize the impact of the problems that are likely to be encountered during requirements elicitation.
Name the types of data dependencies that could be identified within the superscalar architecture and discuss their impact on computer architecture development by giving an example in each case.
By means of a clearly labeled Memory Hierarchy diagram, discuss the pro and cons of the use of the various memory segments in the design and build of a personal computer on a Intel based architecture.
In the IBM 360 Models 65 and 75, addresses are staggered in two separate main memory units (e. g., all even-numbered words in one unit and all odd-numbered words in another). Explain what might be the purpose of this technique
In your own words, explain why defects/bugs in a software product may not lead to software failures.
By means of suitable diagram, show how a CPU chip is interconnected to an I/O and a main memory in a simple Von Newman computer design bus system
Section 15.4 includes a C program that calculates the greatest common divisor of two integers. Describe the algorithm in words and show how the program does implement the Euclid algorithm approach to calculating the greatest common divisor.
List three major components ICs that contribute to the generation of heat as well power consumption and their effect in computer architecture.
Discuss the notion of stored-program architecture. How Von Neumann's architecture used this breakthrough idea in designing computer systems?
You have been tasked to develop a program which will enable users in different branches to communicate. Describe in your own words the Inter-process mechanism you will employ in your program giving reasons for your choice.
Define in your own words the following terms: agent, agent function, agent program, rationality, autonomy, reflex agent, model-based agent, goal-based agent, utility-based agent, learning agent.
Explain why are the concepts of number system important to the study of microcontrollers and computer systems in general?
Compare and contrast sequential access, direct access, and random access methods of accessing memory. Practically explain how these memory access methods are applied in modern storage systems. Give two examples in each case.
Write down the various steps are carried out while transmitting a file/message by a host to another host on the bus?
Some of the most important pieces of data stored in the RAM are the instructions which basically tells the CPU what to do at a particular time. Explain the concept of Instruction Set in the CPU and how it works.
Explain the following algorithms and discuss how relevant they are in developing artificial intelligence systems that solves problems in the health sector. I. K-Nearest Neighbour II. Support Vector Machine III. Naive Bayes IV. Random Forest
Discuss the “trinity of the computer system” and evaluate the technical functions of each of the trinity. .
A software system will be built to allow drones to autonomously herd cattle in farms. These drones can be remotely controlled by human operators. Explain how multiple architectural patterns can fit together to help build this kind of system.
Outline the major differences between Java (or any other computer language with which you are familiar) and English, commenting on the “understanding” problem in each case.
Discuss the problems of using natural language for defining user and system requirements, and show, using small examples, how structuring natural language into forms can help avoid some of these difficulties
ys are constant and which are variable? 4 Describe what is Web caching and how it can reduce the delay in receiving a requested object. Will Web caching reduce the delay for all objects requested 2 by a user or for only some of the objects? Why?
What's the need for the advent of the multiprocessor design in computer architecture and explain briefly what were the main basis for this shift from the single core development
Duplicate: Using your knowledge of how an ATM is used, write a set of non-functional requirements, setting out its expected reliability and response time.
What are the different types of stakeholder concern that may arise in a large system? How can aspects support the implementation of each of these types of concern?
With reference to the Processor performance equation, explain how both the RISC and CISC based computer architectures designs seek to increase processor performance.
To help counter terrorism, many countries are planning or have developed computer systems that track large numbers of their citizens and their actions. Discuss the ethics of this..
Consider the problem of software quality and programmer productivity, and explain whether a software crisis exists today. How has reuse contributed to the problem or the solution? Justify your answer
State any three limitations associated with Superscalar designs and discuss how each one is treated by superscalar designs
During data presentation there are three key issues to consider. Explain the relevance of each of these three issues stating an application for each in the engineering field.
Explain why it is practically impossible to validate reliability specifications when these are expressed in terms of a very small number of failures over the total lifetime of a system
Explain why it is practically impossible to validate reliability specifications when these are expressed in terms of a very small number of failures over the total lifetime of a system.

See more: Why Is It Necessary To Have Common Denominators When Adding Fractions


Briefly discuss the history and future of multimedia. How might multimedia be used to improve the lives of its users? How might it influence users in negative ways? What might be its shortcomings?
Explain what is meant by a ‘compensation action’ and, using an example, show why these actions may have to be included in workflows.
report this ad
report this ad
Welcome to smashville247.netSolution-oriented students of computer engineering on one platform to get you that

ONE SOLUTION