0% found this document useful (0 votes)
74 views

GCU 0103 Computer Platforms

During the fetch-execute cycle: A. Memory Address Register (MAR): Stores the memory address of the instruction to be fetched from memory. It changes during the fetch stage to hold the address of the next instruction. B. Memory Data Register (MDR): Stores the data (instruction opcode and operands) fetched from memory during the fetch stage. C. Accumulator: Stores intermediate arithmetic/logic results during the execute stage. It changes as it accumulates/stores the results of arithmetic/logic operations on the operands fetched.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
74 views

GCU 0103 Computer Platforms

During the fetch-execute cycle: A. Memory Address Register (MAR): Stores the memory address of the instruction to be fetched from memory. It changes during the fetch stage to hold the address of the next instruction. B. Memory Data Register (MDR): Stores the data (instruction opcode and operands) fetched from memory during the fetch stage. C. Accumulator: Stores intermediate arithmetic/logic results during the execute stage. It changes as it accumulates/stores the results of arithmetic/logic operations on the operands fetched.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 27

INTERNATIONAL DIPLOMA IN BUSINESS MANAGEMENT

ASSIGNMENT

STUDENT NAME : Sajeevan Siva kumar


EDHAT REGISTRATION NO. : 50493

PROGRAMME : INTERNATIONAL DIPLOMA IN BUSINESS


MANAGEMENT
SUBJECT CODE &TITLE : GCU 0103/ COMPUTER PLATFORMS

ASSIGNMENT TITLE : The ability to handle hardware correctly and safely


while following precautions to not harm the
equipment.

Summary of the Learning Outcomes covered:

1. Investigate computer systems


2. Investigate operating systems
3. Design a computer system
4. Test your computer system

ASSIGNMENT TYPE : Individual Assignment


ISSUED DATE :
DUE DATE :
DATE SUBMITTED :
ASSESSOR :
INTERNAL VERIFIER :

Student’s Signature: Date: _____/_____/ ___________

1|Page
Mark Range Grade Point Grading Representation
0 - 29 0.0 E
30 - 39 1.0 D
40 - 49 1.7 C-
50 - 54 2.0 C
55 - 59 2.3 B-
60 - 64 2.7 B
65 - 69 3.0 B+
70 - 74 3.3 A-
75 - 79 3.7 A
80 and above 4.0 A+

Task 01 – Task 02 – Task 03 – Task 04 – Total Marks


Marks Marks Marks Marks
TOTAL SCORE (Average of Grade Point Final Grading
the above/Overall Grading)

Assessor Comments:

Assessor: Signature: Date:_____/_____/ ___________

Internal Verifier’s Comments:

Internal Verifier: Signature: Date:____/____/ ________

2|Page
TASK 1 INVESTIGATE COMPUTER SYSTEMS(LO1)

A CPU is one of the biggest hardware factor affecting the computer performance. Processors
have a number of different specifications and statistics that factor in to their speed. But many
users don’t fully understand what they mean.

What are the most important factors affecting processor performance are

NUMBER OF CORES (PROCESSORS)


The CPU is where you’ll find the processing units, each one known as a core. Every core will
contain a control unit, ALU, and registers. Usually, a PC will have either two or four cores,
and the more you have, the more programs you can run at the same time.
However, if you think that you can double your computer speed by doubling the number of
cores, then think again! As they have to communicate with each other, this takes some of the
speed away, but in general, increasing the number of cores is a great idea and will boost
performance.
 
MULTIPLE APPLICATIONS AFFECTING COMPUTER SPEED
Any kind of computer speed test will indicate a decrease in performance with an increase in
the number of tasks running. Multitasking slows down your PC because applications have
less memory to themselves. The more apps running at the same time, the slower your PC will
be. It’s something to keep in mind when optimizing performance on your machine.
 
GRAPHICS CARD TYPE
When it comes to visuals, the user interface, pictures, videos, and more, a powerful graphics
card is imperative to good performance. If you are using your PC to process a lot of graphics,
you may want to know how to speed up computer performance by optimizing your graphics
card in the BIOS, or you could purchase a more up-to-date one and swap the old one out.
Graphics cards can be used to perform nonvisual computations, too, so don’t forget that they
are important for general performance.
 
DATA BUS WIDTH
Between the processor and main memory, you have a series of connectors or wires known as
the data bus. This is what helps transport data between these two components. When you
increase your bus from 32 to 64 bit, you will be able to transfer at least twice as much at any
given time. If you want to improve performance, think about increasing the size of your data
bus.
 
MEMORY CACHE
Computers often reuse actions, so in light of this, the cache is a type of memory that holds
temporary instructions so that they needn’t be computed unnecessarily. The CPU
automatically makes checks in the cache for any instructions before requesting data from the
RAM. By doing this, performance is increased because it saves using data unnecessarily.
These transfers take a lot less time than a transfer to and from the RAM. The larger the cache,
the more data can be stored close to the CPU.
 

3|Page
CLOCK SPEED
The clock rate, or clock speed, shows how fast the central processing unit can run. You will
find this measured in gigahertz or megahertz, depending on the computer you have. The
measurement is an indication of how many instruction cycles the CPU deals with every
second. As an example, a 2 GHz CPU can perform 2 billion calculations every second. The
larger this number is, the faster the CPU is, and the more heat is produced.
Maximum clock settings are hardcoded by default in PCs. However, you can tweak these by
manipulating the computer’s BIOS. If you manipulate to increase your clock speed faster
than what is advertised, this is known as overclocking. We would not recommend doing this
because there are genuine limits to how fast your CPU can run. There is no guarantee that its
circuitry will be able to meet the demands of overclocked speeds. If the speed is too fast, you
run the risk of not completing a computation before the next one is carried out. Data can
therefore become corrupted if the CPU is not able to keep up with the pace of its clock, and
damage can come from overheating the machine.
 
MALWARE
One of the best ways to speed up computer performance is actually to eliminate malware.
Malware, spyware, and viruses can monitor your activity, take control of your computer, and
create all sorts of complications that reduce performance.
Anything unwanted and malicious is going to seriously affect performance, so make sure that
you invest in a good antivirus to prevent such attacks on your computer. It will seriously help
in the long run, and make sure that you scan your computer at least once every week to keep
your antivirus updated and remove any unwanted junk from affecting the performance of
your computer.
 
DEFRAGMENTING
Sometimes memory isn’t stored efficiently. When you run a defragmenter, fragmented data is
rearranged so that your drives and disks can work more productively. With more space on
them, this will also improve performance. Most defragmenters run on a schedule, so if you
haven’t configured defragmentation to run regularly on your computer, then do so today.

T 1.1 - Explain how the address bus and the data bus are used in a computer.

Address Bus Control Bus Data Bus

Definition
It is the connections It is the physical connection It is a communication route
between CPU and main between CPU and other through which data can travel
memory. devices with the computer. between the computer’s CPU,
memory, and peripherals.
Purpose
It is used to identify It carriers control information Data can travel through the
particular locations in between the CPU and other data bus between the
the main devices within the computer. computer’s CPU, memory,
memory where data is and peripherals.
stored.

4|Page
Working example
The number of bits in the One line of the bus is used to The number of wires
address bus can indicate whether the CPU is determines the speed of data
determine the amount of currently reading from or traveling. Each wire transmits
memory, the CPU can writing to the main memory. a single bit at a time. So 8 bits
address.in modern PCs, bus can transfer 8 bits at a
there are 36 address lines time.
to access the 64 GB of
main memory
theoretically.

Address bus - carries memory addresses from the processor to other components such as
primary storage and input/output devices. The address bus is unidirectional . Data bus -
carries the data between the processor and other components. The data bus is bidirectional .

T 1.2 - Describe the use of the following special purpose registers and how they change
during the fetch-execute cycle

A. Memory Address Register:


In a computer, the memory address register (MAR) is the CPU register that either
stores the memory address from which data will be fetched to the CPU, or the
address to which data will be sent and stored.

B. Memory Data Register :


Unsourced material may be challenged and removed. A memory buffer register
(MBR) (also known as memory data register (MDR)) is the register in a computer's
processor, or central processing unit, CPU, that stores the data being
transferred to and from the immediate access storage.

C. Accumulator:
An accumulator is a register for short-term, intermediate storage of arithmetic
and logic data in a computer's CPU (central processing unit).

T 1.3 - Describe fetch/decode/execute/reset cycle when an ADD instruction is being


executed You should include
 Program Counter(PC)
 Memory Address Register(MAR)
 Memory Data Register
 Current Instruction Register
 Accumulator

5|Page
Registers and the Fetch-Decode-Execute cycle
Registers
A Von Neumann CPU (the type of CPU you get in nearly all personal computers) has a
number of 'registers'. These are very fast memory circuits. You can think of each register as a
box which holds a piece of data useful to the CPU. These pieces of data allow the CPU to
quickly 'fetch' and then 'decode' and then 'execute' the instuctions held in RAM that are part
of a program, one instruction at a time.
The registers you should know about include:

 Program Counter (PC) - this holds the address of the next instruction to be fetched
and executed.
 Current Instruction Register (CIR) - this holds the current instruction being
executed.
 Memory Address Register (MAR) - this holds the RAM address you want to read to
or write from.
 Memory Data Register (MDR) - this holds the data you have read from RAM or
want to write to RAM.
 Accumulators - these hold the data being worked on and the results of arithmetic and
logical operations.
 Status Register - this holds information about the last operation e.g. whether the
least sum done produced a negative result.
 Interrupt Register - this holds details about whether an interrupt has happened.
 Index register - this is a very fast counter, that is used e.g. when you have to work
though a block of data and need to keep track of which piece of data you are at.
Using registers to execute an instruction in a program.
Consider the following situation:
 

Note in the above that we have not used binary either for the RAM address or the contents, to
make things easier to understand!

6|Page
How are the registers used to read an instruction in a program?
FETCH

 The CPU reads the contents of the Program Counter to find the address of the next
instruction to be fetched, decoded and executed. In our case 3254.
 As soon as it is read, the PC increments. PC = PC + 1, or 3255
 The contents of 3254 are then put on the MAR.
 The address in the MAR is then located in RAM.
 The contents of this address are moved to the MDR.
 The MDR now holds the instruction that must be executed.
 The instruction in the MDR is then copied to the CIR, as we will often need to use the
MDR again to complete the executation of an instruction.
DECODE

 The contents of the CIR are divided. Part of the instruction might be an operation
(like ADD) and part of the instruction might be data, or in our case, an address where
data can be found, like 75567. The ADD part is known as the OPERATOR and the
data part is known as the OPERAND.
 The operator (ADD) is decoded by the Contol Unit in the CPU, so it knows what it
has to do (ADD in our case).
 The operand 75567 is put back on the MAR.
 The contents of 75567 is then found in RAM and put on the MDR.
EXECUTE

 The instruction can now be executed. Arithmetic and logical instructions are carried
out using the Accumulator(s) in a CPU.
 Signals are sent out to different parts of the CPU to execute the instruction ADD.
 In our example, this will result in adding 4500 to whatever is in the Accumulator, and
then over-writing the contents of the Accumulator with the result of the addition.
The way registers are used to run programs is often known as the FETCH - DECODE -
EXECUTE cycle. This is because that is all the CPU actually does. It fetches instructions,
decodes them and then executes them. It does this very quickly indeed, but that is all it does.
It is why you sometimes read that computers aren't very clever! 

7|Page
T 1.4 - What is Parallel Processing? Discuss two differences between Parallel
Computing and Distributed Computing

Parallel processing is a method in computing of running two or more processors (CPUs) to


handle separate parts of an overall task.

Difference between Parallel Computing and Distributed Computing

Parallel Computing :

In parallel computing multiple processors performs multiple tasks assigned to them


simultaneously. Memory in parallel systems can either be shared or distributed. Parallel
computing provides concurrency and saves time and money.

Distributed Computing :

In distributed computing we have multiple autonomous computers which seems to the user
as single system. In distributed systems there is no shared memory and computers
communicate with each other through message passing. In distributed computing a single
task is divided among different computers.

TASK 2 INVESTIGATE OPERATING SYSTEMS (LO2)

T 2.1 - What are the THREE main purposes of an operating system?

There are three main purpose of an operating system.


1. The first main purpose is User interface between hardware and users.

2. The second main purpose is to operate the internal parts of the computer properly and
systematically using binary code system in the form of 0 and 1.

3. The third main purpose is to provide an environment for development of an application


software and program to uses the hardware resources of the computer and connected to the
computer parts Which provides output to the user, the output from application software is
very useful for users.

Interface between user and hardware device

8|Page
The operating system uses all types of interface such as command line interface, batch
command interface and Graphical User Interface to interact with users to hardware peripheral
devices through the monitor screen.

Monitor has a big role making interface between hardware and users. Monitor visualization
of all types of operating system interface.

You can control your hardware through the operating system by using command or taking
any action using a graphical user interface such as install and uninstall drivers software of
hardware, change settings of bios (basic input output system), controlling volume of
speakers, create partition of storage devices etc.

What is the purpose of the "user interface" between hardware and users of an operating
system?
The purpose of the "user interface" between hardware and users of an operating system
You can interact with hardware by using system software.
It visualizes the hardware system.

The operating system in computer systems shows details of every hardware and peripheral
device. The user interface of hardware and users shows also performance of peripheral
devices. The peripheral devices are integrated into the motherboard.

The manager of the system software is known as manager of the task or task manager in all
operating systems shows real time performance of the integrated circuit and peripheral
devices such as RAM, cache memory, CPU etc over the motherboard of the computer
system.

You can see the hardware which you are attached to on the computer system, it visualizes the
notification after detecting the device that you are connected to the CPU ports such as storage
device, pen drive, Compact disc, DVD, portable hard drive etc.
You can see the interface of the internet with browser software.

You can see the interface between two networking devices with connection to the computer
system by the user interface property of the operating system.

With the user interface of the operating system you can control hardware devices easily.
The hardware can be operated accurately with some measurements such as you have ordered
the 4 pages to print out the text data as a hard-copy of data by using a printer.

Other data such as video with audio data you can play for 2 min only, you fix the time of clip
running. What are the uses of the user interface of the operating system between hardware
and users?
Uses of user interface of the operating system between hardware and users
You can use a mouse input device.

You can use a keyboard which is a very important device for giving commands through the
command line interface operating system.

You can see the hardware devices which are connected to the computer system CPU ( Central
Processing Unit) through the operating system by using monitor screen output.

9|Page
You can control all types of hardware which you have connected to the CPU of the computer
system.

You can Hardware devices performance on the monitor screen output device.

You can also see the results of real time performance of peripheral devices and all types of
devices that are connected to the CPU.

What are the advantages of the user interface of an operating system between hardware and
users?
The advantages of an operating system between hardware and users
You can take advantage of controlling all types of hardware that are connected to the CPU of
a computer system.

The user interface gives to the environment of developing applications software with new
ideas according to the uses of objects in daily life.

Operating system provides basic controlling application software which is used to control
installing and uninstalling new application software into the computer system.

Operating system gives the permission to application software to use to control devices which
are connected to the CPU.

Operating system compute the value of input instruction of input device gives output
instruction to the output device by using their peripheral devices and integrated devices chip
of functions during computing the value, after these procedures it also display the value with
100% accuracy of results which is perfect for users, if value is given to the CPU by input
device.

T 2.2 - Define the essential properties of the following types of operating system

A. Batch Operating System

B. Real-time Operating System

C. Network Operating System

A. Batch Operating System

10 | P a g e
Batch Operating system is one of the important type of operating system. The users who
using a batch operating system do not interact with the computer directly. Each user prepares
its job on an off-line device like punch cards and submits it to the computer operator

B. Real-time Operating System

A Real Time Operating System, commonly known as an RTOS, is a software component
that rapidly switches between tasks, giving the impression that multiple programs are
being executed at the same time on a single processing core.

C. Network Operating System

A network operating system (NOS) is a computer operating system (OS) that is designed
primarily to support workstations, personal computers and, in some instances, older terminals
that are connected on a local area network (LAN).

T 2.3 - Produce a user guide to explain how to make use of the following system tools in
Windows Professional operating system:

a. Backup
b. Disk clean up
c. Disk defragmenter
d. System restore

a. Backup

Use File History to back up to an external drive or network location. Select Start >
Settings > Update & Security > Backup > Add a drive , and then choose an external drive or
network location for your backups.

b. Disk clean up

Disk cleanup in Windows


1. In the search box on the taskbar, type disk cleanup, and select Disk Cleanup from the list
of results.
2. Select the drive you want to clean up, and then select OK.
3. Under Files to delete, select the file types to get rid of. To get a description of the file
type, select it.
4. Select OK.

c. Disk defragmenter

1. Click the Start menu or Windows button

11 | P a g e
2. Select Control Panel, then System and Security
3. Under Administrative Tools, click Defragment your hard drive
4. Select Analyze disk. The report you get will indicate if you need to defrag your disk.
5. If you need to manually defrag your disk, click Defragment disk

T 2.4 - List down TWO new technologies in each area of these platforms

Area of the platform New technologies


Networking Platform Amazon Web Services, Microsoft Azure
Computing Platform Windows, MAC
Human and Media Platform  the social-hype or last-generation

NEW TECHNOLOGIES IN NETWORKING PLATFORM

1. 5G and Wi Fi 6 technology –
5G or fifth generation cellular technology. It is characterized by increased speed, reduced
latency and improve flexibility in wireless services. It helps organizations to mobilize
workforces, extend automation, supporting new applications with increased network capacity
and high data rates. 5G gives seamless open roaming capabilities between cellular and Wi FI
access. 5G would solve the issue of many wireless devices connected at once – and IoT
makes it worse by slowing wireless network performance. Wi Fi 6 infrastructure is ready to
go however Wi Fi 6 capable devices such as computers and mobile phones manufacturers
need to adopt new standards.

2. Artificial Intelligence (AI) and Machine Learning (ML)


Complex network and business problems can be addressed in real time using AI and ML
capabilities. Application of user cases ranging from small cities, manufacturing, security, and
networking. ML can make predictions based on network data and AI can take intelligent
actions based on those prophecies. Advanced analytics into automation systems will bring in
self-operating networks.

3. Augmented reality and virtual reality


Augmented reality (AR) and virtual reality (VR) technologies empower the applications and
customer experiences. AR is mainly used on smartphone and tablets to present interior
design, allowing shopkeepers to have virtual presentation of furniture.

4. Cloud computing
Cloud allows faster transition to remote work and help to organize remote workplace more
efficiently and this contributed to business continuity during any crisis. Maintaining
consistent network and security policies across multiple clouds using multi cloud policy
management.

5. DevOps
DevOps is tied up to software development and IT. DevOps improve relationship between
network service designers and engineers to make operational changes to the services.

6. Digital transformation

12 | P a g e
It enables adoption of digital technology to transform services or businesses, by replacing on
digital or manual processes with digital processes. Process of digitization transforms into
digital forms that are processed, stored, and transmitted via digital devices and networks.

7. Intent-based networking (IBN)


This approach bridges the gap between business and IT. Business intent is captured and
continuously aligned to end to end network related to application service levels, security
policies, compliance, operational and business processes. Virtual segmentation of IoT devices
from remaining network will be one of the major tasks for Networking teams. The creation of
secure zones called Microsegments which will allow IoT devices to operate on same
corporate network and reducing the risks to other parts of the network.

8. Internet of Things (IoT)


IoT is all about connecting the unconnected. Majority of objects are unconnected however
with IoT devices are acquiring capabilities to communicate and connect with other devices
and people changing the way we work.

9. Data Security
usability and integrity of network is crucial to security. Effective network security manages
network access effectively and stops a variety of threats entering or spreading within the
network

10. SD-WAN
SD-WAN is a software-based approach to manage Wide Area networks (WANs). This
technology lowers operational costs and improvement in resource usage in multisite
deployments. Network administrator using this SD-WAN technology can use bandwidth
more efficiently and help to ensure enhanced performance for business-critical applications
without compromising data security and privacy.

NEW TECHNOLOGIES IN COMPUTING PLATFORM

1.Artificial Intelligence (AI)


Artificial Intelligence has made a lot of hype over the last decade. Still, it remains one of the
leading emerging technology developments because its significant impacts on how we live,
work, and play are still in their inception.

2.5G and enhanced connectivity


Faster and more stable internet means more than only loading webpages faster and spending
less time waiting for YouTube videos to load. From 3G onwards, each advancement of
mobile connectivity has opened up new internet use cases.

As bandwidths expanded, 3G enabled online access and data-driven services on mobile


devices; 4G enabled the increase of streaming video and music platforms; and 5G, likewise,
would expand what is possible.

3. Edge computing
Edge computing is a new technology that ensures low latency and high-speed data
processing. Edge computing allows computations to be carried out closer to data storage
systems, improving application performance.

13 | P a g e
Therefore, edge computing used to handle time-sensitive data stored in remote areas with
minimal access to the central location. Cloud computing and IoT applications would benefit
from the technology.

4. Internet of behaviors (IoB)


If you've heard of the Internet of Things (IoT), you should know that the IoT extends to the
Internet of behavior as well. The Internet of Things (IoT) is concerned with using data and
insights to influence behavior. IoT devices are possible as massive databases for Internet of
behavior (IoB) paradigms.

Businesses will be able to follow customer behavior and use IoB to benefit their respective
channels with the aid of IoB. For example, a health-tracking app may collect information
about your physical activity routine, diet, sleep, and other habits.

5.Quantum computing
Quantum computing, a form of computing that uses the power of quantum phenomena such
as superposition and quantum entanglement, is the next noteworthy technology trend.

Because of its capability to instantly question, track, interpret, and act on data, regardless of
source, this incredible technology trend also includes preventing the spread of the
coronavirus and developing potential vaccines.

6.Blockchain
Blockchain is another recent mainstream technology trend. Many people believe that
Blockchain is just about Cryptocurrency, which is not the case.

Bitcoin and other Cryptocurrencies are just a part of Blockchain technology as a whole. Apart
from Cryptocurrencies, it uses various other fields such as healthcare, supply chain and
logistics, advertising, etc.

7.Cybersecurity
Cybersecurity does not seem to be cutting-edge technology, but it progresses at the same rate
as other technologies. This is partly due to the constant emergence of new threats. Malicious
hackers attempting to gain unauthorized access to data would not give up quickly, and they
will continue to find ways to avoid even the most stringent protection measures. It's partly
due to the adoption of modern technologies to improve defense.

Since Cybersecurity will extend to guard against hackers as long as we have them,
Cybersecurity will remain a popular technology.

8.Human augmentation
Human augmentation is a broad term that encompasses innovations that seek to improve
human abilities and productivity. Physical augmentation, such as prosthetics, AR lenses, and
RFID tags infused inside humans, are all part of the field of human augmentation.

14 | P a g e
This can aid in the enhancement of human cognition, perception, and action abilities. This is
accomplished by sensing and actuation technology, information fusion and fission, and
artificial intelligence.

9.Distributed cloud
The Distributed Cloud technology trend is poised to take Cloud Computing to new heights. It
is concerned with distributing public cloud resources to various geographical locations,
processes, updates, delivery, and other relevant activities being handled centrally by the
original public cloud provider. Instead of offering a centralized solution, it would assist in
meeting the service needs of individual cloud locations separately. Meanwhile, companies
would undoubtedly benefit from this technological trend by decreasing latency, reducing the
risk of data loss, and lowering costs.

10.Augmented reality and virtual reality


Augmented Reality and Virtual Reality are two popular tech trends that have exploded in
popularity in recent years and expected to continue to do so in the coming years. When it
comes to these two technologies, Virtual Reality (VR) is concerned with creating a realistic
environment of the physical world using computer technologies, while Augmented Reality
(AR) is concerned with enhancing the environment using computer-generated elements.

NEW TECHNOLOGIES IN HUMAN & MEDIA PLATFORM

1. RFID – Radio Frequency Identification Tags


RFID, in layman terms, means a small computer chip that can store information about an
individual or object. Every chip comes with a unique serial number that can be tied to the
information present on the chip. Let us give you a practical application of this technology
through this example – Suppose you are at a music concert and you scan your RFID device
with an RFID device which has social features integrated into it. By simply bringing your
RFID device to the other one, you will be able to Like a band on Instagram or Facebook or
download a couple of their music tracks on your device.

The growing popularity of RFID in the event and ecommerce domain (through the mode of
NFC) has led to a number of social networking app development companies integrating RFID
into their mobile applications.

2. Augmented Reality
AR and mixed reality are some of the most popular social media application features. There
are a number of use cases that social media houses experiment with when integrating AR
with their applications but the one that has witnessed mass popularity is the use of face filters.
Popularized by Snapchat, AR-driven filters are used by both individuals and businesses to
deliver engaging content.

Another example of business-level usage of AR in social media can be seen in social media
advertisements. Last year, Snapchat created an AR-based app for Snap Original where Bhad
Bhabie interacted with the users as if they were interacting in the real world.

3. Artificial Intelligence
Out of all the new-age technologies that you will read about impacting the social media
sector, the one name which will be placed on the top is Artificial Intelligence.

15 | P a g e
AI is a prime component of every social media platform active in the market today. This is
the number one reason why the technology is now involved in the social media app
development cost on a default note.

Facebook utilizes advanced machine learning for a number of tasks: recognizing faces in poss
to targeting users for advertisements and even for strengthening their search functionality.
LinkedIn makes use of AI for offering job recommendations, suggesting people whom they’d
like to connect, and sending them specific posts for their feed.
Snapchat uses the capability of computer vision for tracking physical features and overlaying
filters that move with them in real-time.
These business examples are a validation of how AI is a crucial part of all the different genres
of the social media domain.

4. IoT
The last in our list of social media and technology trends is the Internet of Things. The
technology is used heavily for social media monitoring and marketing purposes by some of
the top names in the industry like N&W, Disney, and Tencent, etc.

Organizations are constantly on the lookout for an IoT skilled social media app development
company that would help them create solutions around real-time monitoring of data and
insights coming in from social media to help them make better business decisions.

TASK 3 :DESIGN A COMPUTER SYSTEM (LO3)

T 3.1 System design specification for Pubudu Ltd

The purpose of System Design is to create a technical solution that satisfies the functional
requirements for the system. At this point in the project lifecycle there should be a
Functional Specification, written primarily in business terminology, containing a complete
description of the operational needs of the various organizational entities that will use the
new system. The challenge is to translate all of this information into Technical Specifications
that accurately describe the design of the system, and that can be used as input to System
Construction.

The Functional Specification produced during System Requirements Analysis is transformed


into a physical architecture. System components are distributed across the physical
architecture, usable interfaces are designed and prototyped, and Technical Specifications are
created for the Application Developers, enabling them to build and test the system.

Many organizations look at System Design primarily as the preparation of the system
component specifications; however, constructing the various system components is only one
of a set of major steps in successfully building a system. The preparation of the environment
needed to build the system, the testing of the system, and the migration and preparation of the
data that will ultimately be used by the system are equally important. In addition to
designing the technical solution, System Design is the time to initiate focused planning
efforts for both the testing and data preparation activities.

16 | P a g e
17 | P a g e
The following table lists all System Design processes, some techniques available for use in
executing these processes, and process outcomes and deliverables.

Processes Techniques Process Deliverables


(Outcomes)

Prepare for System Interviews Established Team and


Design Site Walk-throughs Environment for System
Design
Define Technical Interviews Technical Architecture
Architecture Document Gathering and Reviews
Role/Authorization Analysis
Define System Interviews System Standards
Standards Brainstorming
Policy and Standards Reviews
Create Physical Formal Walk-throughs Databases and System Files
Database Standard Data Definition
Languages
Data Administration Techniques
(Data Normalization,
De-Normalization)
Prototype System Iterative Prototypes/Reviews Prototype and Proof of
Components Presentations Concept Results
GUI/Report Development Tools

Produce Technical Function Decomposition Technical Specifications


Specifications Expressing Logic: Pseudo Code,
Structured English, Object
Oriented Logic
Operational Requirements
Assessment
System Load Analysis
Business Impact Analysis
Potential Problem Analysis
Training Needs Decomposition

The skills needed by the Project Team to perform System Requirements Analysis processes
are dramatically different from those required to translate the requirements into a technical
design. While it is certainly possible for the current team to possess the range of skills
required for both phases, this assessment needs to be performed and the team profile adjusted
to match the needs of System Design.
Often, there is a distinct advantage to keeping as much of the original Project Team as
possible while progressing from each phase to the next, thereby retaining business knowledge
and functional expertise gained in prior phases. It is, however, also common for the team
size to expand as the project advances into the Design phase.

18 | P a g e
The initiation of a new project phase is also the right time to assess the training needs of the
existing team. Please refer to Section I, Project Planning, for a detailed approach to
developing your Project Team. It is the Project Manager’s responsibility to ensure that team
members have adequate equipment to perform their duties, that this equipment is configured
with the proper design tools, and that the team has access to the data repository that will be
used throughout design efforts. A key activity will be the definition of the mechanisms and
processes to be followed for creating and maintaining all System Design related materials,
similar to the repository that was utilized for all System Requirements work products and
deliverables.
This is also the time to begin to establish the environment that will likely be required when
the Project Team initiates the prototyping activities.
During this phase, the Project Team’s focus moves from business and functional areas to
technical issues. As a result, there is often less involvement on the part of those project
participants more closely aligned with the organization’s functional and operational needs
(the Stakeholders, Customer, Consumer, and Project Sponsor). These parties may begin to
feel isolated or removed from the project due to their reduced involvement and they may not
be immediately aware of much of the progress of the Project Team. While they are likely to
play an active role in the discussions surrounding test planning and data conversion, they
usually have limited involvement in the identification of the technical architecture and
standards and the development of Technical Specifications. This situation poses a challenge
for the Project Manager, since these individuals will ultimately be profoundly affected by all
of these activities. The Project Manager must maintain effective communications with these
individuals throughout this phase to ensure that they understand the implications of the
technical decisions being made.

T3.2 Sustainability of chosen specification


TASK 4:. TEST YOUR COMPUTER SYSTEM
T 4.1- Produce a test plan (What, When, Where, How, Who) for the main hardware
components.

Hardware Components Testing


The hardware testing is one of the hardest testing in the network since it involves a lot of
manual work. In this case, manual testing will be utilized to test if cables are well connected
and other components. A walkthrough will be performed to check if every hardware
component is physically connected as expected. This involves checking if servers and other
network devices have been secured into place, cables are connected to their ports, network
cards are well connected, power supplies are well connected to the slots of the device and
plugged to the power.
After making sure everything is connected into its place, another manual testing will be
conducted which involves physically turning on the hardware and making sure the device
doesn’t show errors through LEDs or any other interface (Guo et al., 2019).

19 | P a g e
Automated testing will be performed on hardware for specific features. The feature testing
will be used to test the hardware components such as memory sticks, storage drives, fan, and
power supplies among others. This test will rely on the inbuilt diagnostic tools like ones
found on BIOS to test the components. A good example is a SMART tool for testing hard
drives (Strichman & Tzoref-Brill, 2017). These tools will help a lot in identifying and
hardware component before proceeding to the next tests.

Software Components Testing


Most of the tests in software testing will be automated making it easier to perform the tests.
The better part is most of the software have diagnostic tools and report errors to the user. For
example, an operating system is capable of troubleshooting most of the minor errors and
provide hints to the user where a problem might be. This means it will be easy to automate
the tests and get results (Ammann & Offutt, 2016).
The software components will be tested to ensure the configuration done is working as
expected. It is important to have proper configurations to prevent incidents in the network.
Extensive testing will be done in integration testing to make sure various components and
systems can work with others correctly.
Testing scripts will be used to perform automated tests of the software components. Random
testing will be applied by using random functions in scripts to generate random test data.
Radom testing will ensure that various aspects have been tested without human bias.
Testing tools for automated testing will be used to test the software components. Testing
tools are easier to use since most of the tests are already defined in the tool. This reduces the
amount of time and resources needed to test the software components.
A few manual tests will be performed by the staff members to counter check if the system is
working fine. Manual testing will be performed for confirmation purposes. This will make
sure the components are fully tested. In case of an error, the software component will have to
be checked and troubleshoot to make sure the error is fixed and then tested again. The
dependency of the components has to be checked while testing. The independent components
have to tested first before tested the depending ones.

Integration Testing
Most components in Roadster Corp. are interconnected. Multiple programs are relying on
each other while hardware components are interconnected (Ammann & Offutt, 2016). It is for
this reason integration testing has to be done. Manual testing will be performed to check if
all the interconnected hardware components are communicating well. The process involves
checking indicators for the cable connections such as Ethernet if they are indicating there is
communication going on. This is part of interface testing making sure every interface is
working when connected with another interface.
Automated testing will be performed to ensure all components have the desired behavior. The
integration testing will be able to test critical configurations such as firewall rules. A tool like
Nmap will be used to map the network and check for open ports and closed ones. SNMP will

20 | P a g e
also play a role by using RMON probes to show which interfaces are up and down. Any issue
encountered will have to be rectified. Bandwidth test will have to perform in this section to
ensure there are no bottlenecks in the network.

Protocols Tests
Protocols are used by various applications to communicate in a network. It will be important
to test all the protocols used by Roadster Corp. Protocols such as HTTPS, SMTP and others
will be tested thoroughly. These protocols will be tested after integration testing to determine
if the protocols are useful across the network. Performing this test will ensure no protocol
required by the organization is blocked by firewalls. Nmap will be useful in performing this
test since it provides detailed information about the network.
Manual testing will be performed too. For example, a user will have to create a test email and
send it across the network to other branches as a way of testing the SMTP. This test will be
performed just for more clarification.

Corner Case Testing


Corner case testing will be performed to push the network to the limits and check if it will be
still useful. Network traffic will be generated from multiple devices in the network and then
send across the network simultaneously. The traffic will be higher than the one the Roadster
Corp. is expecting to have. If the network passes the test one more test will be performed.
This time, the traffic generated will be higher than the traffic the network can handle. This
means the traffic will take more bandwidth than the network interfaces can handle. If the test
goes through without failures then the system is ready to be used.

Acceptance Testing
It is important to test the network with real users in the real world environment and check if
users are comfortable with it. This is the final test and user feedback plays a key role in the
testing. If users are satisfied with the network then the test passes otherwise it is a fail and
something needs to be done (Ammann & Offutt, 2016).

21 | P a g e
T 4.2 - Explain what is white box testing and black box testing, based on your
experience which strategy would be more beneficial to a programmer and which would
be more suited to an end user

Black Box Testing White Box Testing

It is a way of software testing in which the It is a way of testing the software in which
internal structure or the program or the the tester has knowledge about the internal
code is hidden and nothing is known about structure or the code or the program of the
it. software.

It is mostly done by software testers. It is mostly done by software developers.


No knowledge of implementation is Knowledge of implementation is required.
needed.
It can be referred as outer or external It is the inner or the internal software
software testing. testing.
It is functional test of the software. It is structural test of the software.
This testing can be initiated on the basis of This type of testing of software is started
requirement specifications document. after detail design document.
No knowledge of programming is It is mandatory to have knowledge of
required. programming.
It is the behavior testing of the software. It is the logic testing of the software.
It is applicable to the higher levels of It is generally applicable to the lower levels
testing of software. of software testing.
It is also called closed testing. It is also called as clear box testing.
It is least time consuming. It is most time consuming.
It is not suitable or preferred for algorithm It is suitable for algorithm testing.
testing.
Can be done by trial and error ways and Data domains along with inner or internal
methods. boundaries can be better tested.
Example: search something on google Example: by input to check and verify loops
by using keywords
Types of Black Box Testing:  Types of White Box Testing: 
   
 A. Functional Testing   A. Path Testing 
   
 B. Non-functional testing   B. Loop Testing 
   
 C. Regression Testing  C. Condition testing
 

22 | P a g e
T 4.3 - Produce a test plan to test software components of one of the stand - alone PCs.
1.0 INTRODUCTION
It is a brief summary of the product that is being tested. Outline all the functions at a high
level.

2.0 OBJECTIVES AND TASKS


2.1 Objectives
Describe the objectives supported by the Master Test Plan, For Example, defining tasks and
responsibilities, a vehicle for communication, a document to be used as a service level
agreement, etc.

2.2 Tasks
List all the tasks identified by this Test Plan, i.e., testing, post-testing, problem reporting, etc.

3.0 SCOPE
General: This section describes what is being tested, which is new to all the functions of a
specific product, its existing interfaces, integration of all functions, etc.
Tactics: List here on how you will accomplish the items that you have listed in the “Scope”
section. For example, if you have mentioned that you will be testing the existing interfaces,
what would be the procedures that you would follow to notify the key people to represent
their respective areas, as well as allotting time in their schedule to assist you in accomplishing
your activity?

4.0 TESTING STRATEGY


Describe the overall approach to testing. For each major group of features or feature
combinations, specify the approach which will ensure that these feature groups are
adequately tested. Specify the major activities, techniques, and tools that are used to test the
designated groups of features.
The approach should be described with sufficient details to permit the identification of the
major testing tasks and estimation of the time required to do each one.

4.1 Unit Testing


Definition: Specify the minimum degree of comprehensiveness desired. Identify the
techniques that will be used to determine the comprehensiveness of the testing effort (for
example, determining which statements have been executed at least once).

23 | P a g e
Specify any additional completion criteria (for example, error frequency). The techniques to
be used to trace requirements should be specified.
Participants: List the names of the individuals/departments who would be responsible for
Unit Testing.
Methodology: Describe how unit testing will be conducted. Who will write the test scripts for
Unit Testing, what will be the sequence of events for Unit Testing and how will the testing
activity take place?

4.2 System and Integration Testing


Definition: List your understanding of System Testing and Integration Testing for your
project.
Participants: Who will be conducting System and Integration Testing on your project? List
the individuals who will be responsible for this activity.
Methodology: Describe how System & Integration testing will be conducted. Who will write
the test scripts for Unit Testing, what would be the sequence of events of System &
Integration Testing, and how will the testing activity take place?

4.3 Performance and Stress Testing


Definition: List your understanding of Stress Testing for your project.
Participants: Who will be conducting Stress Testing on your project? List the individuals who
will be responsible for this activity.
Methodology: Describe how Performance & Stress Testing will be conducted. Who will
write the test scripts for testing, what would be the sequence of events for Performance &
Stress Testing, and how will the testing activity take place?

4.4 User Acceptance Testing


Definition: The purpose of the acceptance test is to confirm that the system is ready for
operational use. During the Acceptance Test, end-users (customers) of the system compare
the system to its initial requirements.
Participants: Who will be responsible for User Acceptance Testing? List the names of the
individuals and their responsibilities.
Methodology: Describe how User Acceptance testing will be conducted. Who will write the
test scripts for testing, what will be the sequence of events for User Acceptance Testing, and
how will the testing activity take place?

24 | P a g e
4.5 Batch Testing
4.6 Automated Regression Testing
Definition: Regression testing is the selective retesting of a system or a component to verify
that the modifications have not caused unintended effects and that system or component still
works as specified in the requirements.
4.7 Beta Testing

5.0 HARDWARE REQUIREMENTS


Computers
Modems

6.0 ENVIRONMENT REQUIREMENTS


6.1 Main Frame
Specify both the necessary and desired properties of the test environment.
The specification should contain the physical characteristics of the facilities, including the
hardware, the communications, and system software, the mode of usage (For Example, stand-
alone), and any other software or supplies that are required to support the test. Also, specify
the level of security that must be provided for the test facility, system software, and
proprietary components such as software, data, and hardware. Identify the special test tools
that are required. Identify any other testing needs (for example, publications or office space).
Identify the source of all needs that are not currently available to your group.
6.2 Workstation

7.0 TEST SCHEDULE


Include all test milestones identified in the Software Project Schedule as well as all item
transmittal events. Define any additional test milestones required. Estimate the time required
to complete each testing task. Specify the schedule for each testing task and test milestone.
For each testing resource (that is, facilities, tools, and staff), specify its periods of use.

8.0 CONTROL PROCEDURES


Problem Reporting
Document the procedures to be followed when an incident is encountered during the testing
process. If a standard form is going to be used, attach a blank copy as an “Appendix” to the

25 | P a g e
Test Plan. In the event that you are using an automated incident logging system, write the
procedures.

Change Requests
Document the process of modifications to the software. Identify who will sign off on the
changes and what would be the criteria for including the changes to the current product. If the
changes will affect the existing programs, then these modules need to be identified.

9.0 FEATURES TO BE TESTED


Identify all the software features and combinations of the software features that will be tested.

10.0 FEATURES NOT TO BE TESTED


Identify all the features and significant combinations of features that will not be tested along
with the reasons.

REFERENCES
Hasler, E 2018, The built environment, Liverpool University Press, Liverpool.

Puccio, GJ, Cabra, JF & Schwagler, N 2018, Organizational creativity: a practical guide for
innovators & entrepreneurs, Sage, Thousand Oaks, CA.

Crauder, B, Evans, B, Johnson, J & Noell, A 2018, Quantitative literacy: thinking between
the lines, W.H. Freeman, New York, NY.

Style manual for authors, editors and printers 2002, 6th edn, AGPS, Canberra, ACT.

Smith, KL (ed.) 2018, Sociology of globalization

Jablonka, I 2018, History is a contemporary literature: manifesto for the social sciences,
trans. N Bracher, Cornell University Press, Ithaca, NY.

26 | P a g e
Declaration of Academic Honesty Instructions

1. You must submit a completed copy of this form every time you submit an
assignment.
2. You must submit this declaration electronically, either within your assignment,
file, or as a separate file.
3. If you do not submit this declaration, your work will not be assessed.
4. If any student is found to have been dishonest, then the student may face
disciplinary action as stated in the IDM Nations Campus Plagiarism Policy.

Student’s Full Name :


Date :
Assignment Title :

Declaration(Insert YES or NO here):

1. I confirm that this assignment is my own work:


2. I confirm that where ever I have used someone else’s words, concepts, graphics
or data in my work, I have clearly indicated exactly where I have done so, using
the Harvard referencing system. (insert yes or no here):
3. I confirm that I have indicated by referencing, where I have used someone else’s
words, concepts, graphics or data, irrespective of whether I have quoted verbatim
or I have paraphrased in my own words.
4. I have clearly indicated in my assignment any work that has been contributed by
another student.
5. I have clearly indicated in my assignment any work that has been carried out
collaboratively with another student.

……………………………………………..
Student Signature

27 | P a g e

You might also like