GCU 0103 Computer Platforms
GCU 0103 Computer Platforms
ASSIGNMENT
1|Page
Mark Range Grade Point Grading Representation
0 - 29 0.0 E
30 - 39 1.0 D
40 - 49 1.7 C-
50 - 54 2.0 C
55 - 59 2.3 B-
60 - 64 2.7 B
65 - 69 3.0 B+
70 - 74 3.3 A-
75 - 79 3.7 A
80 and above 4.0 A+
Assessor Comments:
2|Page
TASK 1 INVESTIGATE COMPUTER SYSTEMS(LO1)
A CPU is one of the biggest hardware factor affecting the computer performance. Processors
have a number of different specifications and statistics that factor in to their speed. But many
users don’t fully understand what they mean.
What are the most important factors affecting processor performance are
3|Page
CLOCK SPEED
The clock rate, or clock speed, shows how fast the central processing unit can run. You will
find this measured in gigahertz or megahertz, depending on the computer you have. The
measurement is an indication of how many instruction cycles the CPU deals with every
second. As an example, a 2 GHz CPU can perform 2 billion calculations every second. The
larger this number is, the faster the CPU is, and the more heat is produced.
Maximum clock settings are hardcoded by default in PCs. However, you can tweak these by
manipulating the computer’s BIOS. If you manipulate to increase your clock speed faster
than what is advertised, this is known as overclocking. We would not recommend doing this
because there are genuine limits to how fast your CPU can run. There is no guarantee that its
circuitry will be able to meet the demands of overclocked speeds. If the speed is too fast, you
run the risk of not completing a computation before the next one is carried out. Data can
therefore become corrupted if the CPU is not able to keep up with the pace of its clock, and
damage can come from overheating the machine.
MALWARE
One of the best ways to speed up computer performance is actually to eliminate malware.
Malware, spyware, and viruses can monitor your activity, take control of your computer, and
create all sorts of complications that reduce performance.
Anything unwanted and malicious is going to seriously affect performance, so make sure that
you invest in a good antivirus to prevent such attacks on your computer. It will seriously help
in the long run, and make sure that you scan your computer at least once every week to keep
your antivirus updated and remove any unwanted junk from affecting the performance of
your computer.
DEFRAGMENTING
Sometimes memory isn’t stored efficiently. When you run a defragmenter, fragmented data is
rearranged so that your drives and disks can work more productively. With more space on
them, this will also improve performance. Most defragmenters run on a schedule, so if you
haven’t configured defragmentation to run regularly on your computer, then do so today.
T 1.1 - Explain how the address bus and the data bus are used in a computer.
Definition
It is the connections It is the physical connection It is a communication route
between CPU and main between CPU and other through which data can travel
memory. devices with the computer. between the computer’s CPU,
memory, and peripherals.
Purpose
It is used to identify It carriers control information Data can travel through the
particular locations in between the CPU and other data bus between the
the main devices within the computer. computer’s CPU, memory,
memory where data is and peripherals.
stored.
4|Page
Working example
The number of bits in the One line of the bus is used to The number of wires
address bus can indicate whether the CPU is determines the speed of data
determine the amount of currently reading from or traveling. Each wire transmits
memory, the CPU can writing to the main memory. a single bit at a time. So 8 bits
address.in modern PCs, bus can transfer 8 bits at a
there are 36 address lines time.
to access the 64 GB of
main memory
theoretically.
Address bus - carries memory addresses from the processor to other components such as
primary storage and input/output devices. The address bus is unidirectional . Data bus -
carries the data between the processor and other components. The data bus is bidirectional .
T 1.2 - Describe the use of the following special purpose registers and how they change
during the fetch-execute cycle
C. Accumulator:
An accumulator is a register for short-term, intermediate storage of arithmetic
and logic data in a computer's CPU (central processing unit).
5|Page
Registers and the Fetch-Decode-Execute cycle
Registers
A Von Neumann CPU (the type of CPU you get in nearly all personal computers) has a
number of 'registers'. These are very fast memory circuits. You can think of each register as a
box which holds a piece of data useful to the CPU. These pieces of data allow the CPU to
quickly 'fetch' and then 'decode' and then 'execute' the instuctions held in RAM that are part
of a program, one instruction at a time.
The registers you should know about include:
Program Counter (PC) - this holds the address of the next instruction to be fetched
and executed.
Current Instruction Register (CIR) - this holds the current instruction being
executed.
Memory Address Register (MAR) - this holds the RAM address you want to read to
or write from.
Memory Data Register (MDR) - this holds the data you have read from RAM or
want to write to RAM.
Accumulators - these hold the data being worked on and the results of arithmetic and
logical operations.
Status Register - this holds information about the last operation e.g. whether the
least sum done produced a negative result.
Interrupt Register - this holds details about whether an interrupt has happened.
Index register - this is a very fast counter, that is used e.g. when you have to work
though a block of data and need to keep track of which piece of data you are at.
Using registers to execute an instruction in a program.
Consider the following situation:
Note in the above that we have not used binary either for the RAM address or the contents, to
make things easier to understand!
6|Page
How are the registers used to read an instruction in a program?
FETCH
The CPU reads the contents of the Program Counter to find the address of the next
instruction to be fetched, decoded and executed. In our case 3254.
As soon as it is read, the PC increments. PC = PC + 1, or 3255
The contents of 3254 are then put on the MAR.
The address in the MAR is then located in RAM.
The contents of this address are moved to the MDR.
The MDR now holds the instruction that must be executed.
The instruction in the MDR is then copied to the CIR, as we will often need to use the
MDR again to complete the executation of an instruction.
DECODE
The contents of the CIR are divided. Part of the instruction might be an operation
(like ADD) and part of the instruction might be data, or in our case, an address where
data can be found, like 75567. The ADD part is known as the OPERATOR and the
data part is known as the OPERAND.
The operator (ADD) is decoded by the Contol Unit in the CPU, so it knows what it
has to do (ADD in our case).
The operand 75567 is put back on the MAR.
The contents of 75567 is then found in RAM and put on the MDR.
EXECUTE
The instruction can now be executed. Arithmetic and logical instructions are carried
out using the Accumulator(s) in a CPU.
Signals are sent out to different parts of the CPU to execute the instruction ADD.
In our example, this will result in adding 4500 to whatever is in the Accumulator, and
then over-writing the contents of the Accumulator with the result of the addition.
The way registers are used to run programs is often known as the FETCH - DECODE -
EXECUTE cycle. This is because that is all the CPU actually does. It fetches instructions,
decodes them and then executes them. It does this very quickly indeed, but that is all it does.
It is why you sometimes read that computers aren't very clever!
7|Page
T 1.4 - What is Parallel Processing? Discuss two differences between Parallel
Computing and Distributed Computing
Parallel Computing :
Distributed Computing :
In distributed computing we have multiple autonomous computers which seems to the user
as single system. In distributed systems there is no shared memory and computers
communicate with each other through message passing. In distributed computing a single
task is divided among different computers.
2. The second main purpose is to operate the internal parts of the computer properly and
systematically using binary code system in the form of 0 and 1.
8|Page
The operating system uses all types of interface such as command line interface, batch
command interface and Graphical User Interface to interact with users to hardware peripheral
devices through the monitor screen.
Monitor has a big role making interface between hardware and users. Monitor visualization
of all types of operating system interface.
You can control your hardware through the operating system by using command or taking
any action using a graphical user interface such as install and uninstall drivers software of
hardware, change settings of bios (basic input output system), controlling volume of
speakers, create partition of storage devices etc.
What is the purpose of the "user interface" between hardware and users of an operating
system?
The purpose of the "user interface" between hardware and users of an operating system
You can interact with hardware by using system software.
It visualizes the hardware system.
The operating system in computer systems shows details of every hardware and peripheral
device. The user interface of hardware and users shows also performance of peripheral
devices. The peripheral devices are integrated into the motherboard.
The manager of the system software is known as manager of the task or task manager in all
operating systems shows real time performance of the integrated circuit and peripheral
devices such as RAM, cache memory, CPU etc over the motherboard of the computer
system.
You can see the hardware which you are attached to on the computer system, it visualizes the
notification after detecting the device that you are connected to the CPU ports such as storage
device, pen drive, Compact disc, DVD, portable hard drive etc.
You can see the interface of the internet with browser software.
You can see the interface between two networking devices with connection to the computer
system by the user interface property of the operating system.
With the user interface of the operating system you can control hardware devices easily.
The hardware can be operated accurately with some measurements such as you have ordered
the 4 pages to print out the text data as a hard-copy of data by using a printer.
Other data such as video with audio data you can play for 2 min only, you fix the time of clip
running. What are the uses of the user interface of the operating system between hardware
and users?
Uses of user interface of the operating system between hardware and users
You can use a mouse input device.
You can use a keyboard which is a very important device for giving commands through the
command line interface operating system.
You can see the hardware devices which are connected to the computer system CPU ( Central
Processing Unit) through the operating system by using monitor screen output.
9|Page
You can control all types of hardware which you have connected to the CPU of the computer
system.
You can Hardware devices performance on the monitor screen output device.
You can also see the results of real time performance of peripheral devices and all types of
devices that are connected to the CPU.
What are the advantages of the user interface of an operating system between hardware and
users?
The advantages of an operating system between hardware and users
You can take advantage of controlling all types of hardware that are connected to the CPU of
a computer system.
The user interface gives to the environment of developing applications software with new
ideas according to the uses of objects in daily life.
Operating system provides basic controlling application software which is used to control
installing and uninstalling new application software into the computer system.
Operating system gives the permission to application software to use to control devices which
are connected to the CPU.
Operating system compute the value of input instruction of input device gives output
instruction to the output device by using their peripheral devices and integrated devices chip
of functions during computing the value, after these procedures it also display the value with
100% accuracy of results which is perfect for users, if value is given to the CPU by input
device.
T 2.2 - Define the essential properties of the following types of operating system
10 | P a g e
Batch Operating system is one of the important type of operating system. The users who
using a batch operating system do not interact with the computer directly. Each user prepares
its job on an off-line device like punch cards and submits it to the computer operator
A Real Time Operating System, commonly known as an RTOS, is a software component
that rapidly switches between tasks, giving the impression that multiple programs are
being executed at the same time on a single processing core.
A network operating system (NOS) is a computer operating system (OS) that is designed
primarily to support workstations, personal computers and, in some instances, older terminals
that are connected on a local area network (LAN).
T 2.3 - Produce a user guide to explain how to make use of the following system tools in
Windows Professional operating system:
a. Backup
b. Disk clean up
c. Disk defragmenter
d. System restore
a. Backup
Use File History to back up to an external drive or network location. Select Start >
Settings > Update & Security > Backup > Add a drive , and then choose an external drive or
network location for your backups.
b. Disk clean up
c. Disk defragmenter
11 | P a g e
2. Select Control Panel, then System and Security
3. Under Administrative Tools, click Defragment your hard drive
4. Select Analyze disk. The report you get will indicate if you need to defrag your disk.
5. If you need to manually defrag your disk, click Defragment disk
T 2.4 - List down TWO new technologies in each area of these platforms
1. 5G and Wi Fi 6 technology –
5G or fifth generation cellular technology. It is characterized by increased speed, reduced
latency and improve flexibility in wireless services. It helps organizations to mobilize
workforces, extend automation, supporting new applications with increased network capacity
and high data rates. 5G gives seamless open roaming capabilities between cellular and Wi FI
access. 5G would solve the issue of many wireless devices connected at once – and IoT
makes it worse by slowing wireless network performance. Wi Fi 6 infrastructure is ready to
go however Wi Fi 6 capable devices such as computers and mobile phones manufacturers
need to adopt new standards.
4. Cloud computing
Cloud allows faster transition to remote work and help to organize remote workplace more
efficiently and this contributed to business continuity during any crisis. Maintaining
consistent network and security policies across multiple clouds using multi cloud policy
management.
5. DevOps
DevOps is tied up to software development and IT. DevOps improve relationship between
network service designers and engineers to make operational changes to the services.
6. Digital transformation
12 | P a g e
It enables adoption of digital technology to transform services or businesses, by replacing on
digital or manual processes with digital processes. Process of digitization transforms into
digital forms that are processed, stored, and transmitted via digital devices and networks.
9. Data Security
usability and integrity of network is crucial to security. Effective network security manages
network access effectively and stops a variety of threats entering or spreading within the
network
10. SD-WAN
SD-WAN is a software-based approach to manage Wide Area networks (WANs). This
technology lowers operational costs and improvement in resource usage in multisite
deployments. Network administrator using this SD-WAN technology can use bandwidth
more efficiently and help to ensure enhanced performance for business-critical applications
without compromising data security and privacy.
3. Edge computing
Edge computing is a new technology that ensures low latency and high-speed data
processing. Edge computing allows computations to be carried out closer to data storage
systems, improving application performance.
13 | P a g e
Therefore, edge computing used to handle time-sensitive data stored in remote areas with
minimal access to the central location. Cloud computing and IoT applications would benefit
from the technology.
Businesses will be able to follow customer behavior and use IoB to benefit their respective
channels with the aid of IoB. For example, a health-tracking app may collect information
about your physical activity routine, diet, sleep, and other habits.
5.Quantum computing
Quantum computing, a form of computing that uses the power of quantum phenomena such
as superposition and quantum entanglement, is the next noteworthy technology trend.
Because of its capability to instantly question, track, interpret, and act on data, regardless of
source, this incredible technology trend also includes preventing the spread of the
coronavirus and developing potential vaccines.
6.Blockchain
Blockchain is another recent mainstream technology trend. Many people believe that
Blockchain is just about Cryptocurrency, which is not the case.
Bitcoin and other Cryptocurrencies are just a part of Blockchain technology as a whole. Apart
from Cryptocurrencies, it uses various other fields such as healthcare, supply chain and
logistics, advertising, etc.
7.Cybersecurity
Cybersecurity does not seem to be cutting-edge technology, but it progresses at the same rate
as other technologies. This is partly due to the constant emergence of new threats. Malicious
hackers attempting to gain unauthorized access to data would not give up quickly, and they
will continue to find ways to avoid even the most stringent protection measures. It's partly
due to the adoption of modern technologies to improve defense.
Since Cybersecurity will extend to guard against hackers as long as we have them,
Cybersecurity will remain a popular technology.
8.Human augmentation
Human augmentation is a broad term that encompasses innovations that seek to improve
human abilities and productivity. Physical augmentation, such as prosthetics, AR lenses, and
RFID tags infused inside humans, are all part of the field of human augmentation.
14 | P a g e
This can aid in the enhancement of human cognition, perception, and action abilities. This is
accomplished by sensing and actuation technology, information fusion and fission, and
artificial intelligence.
9.Distributed cloud
The Distributed Cloud technology trend is poised to take Cloud Computing to new heights. It
is concerned with distributing public cloud resources to various geographical locations,
processes, updates, delivery, and other relevant activities being handled centrally by the
original public cloud provider. Instead of offering a centralized solution, it would assist in
meeting the service needs of individual cloud locations separately. Meanwhile, companies
would undoubtedly benefit from this technological trend by decreasing latency, reducing the
risk of data loss, and lowering costs.
The growing popularity of RFID in the event and ecommerce domain (through the mode of
NFC) has led to a number of social networking app development companies integrating RFID
into their mobile applications.
2. Augmented Reality
AR and mixed reality are some of the most popular social media application features. There
are a number of use cases that social media houses experiment with when integrating AR
with their applications but the one that has witnessed mass popularity is the use of face filters.
Popularized by Snapchat, AR-driven filters are used by both individuals and businesses to
deliver engaging content.
Another example of business-level usage of AR in social media can be seen in social media
advertisements. Last year, Snapchat created an AR-based app for Snap Original where Bhad
Bhabie interacted with the users as if they were interacting in the real world.
3. Artificial Intelligence
Out of all the new-age technologies that you will read about impacting the social media
sector, the one name which will be placed on the top is Artificial Intelligence.
15 | P a g e
AI is a prime component of every social media platform active in the market today. This is
the number one reason why the technology is now involved in the social media app
development cost on a default note.
Facebook utilizes advanced machine learning for a number of tasks: recognizing faces in poss
to targeting users for advertisements and even for strengthening their search functionality.
LinkedIn makes use of AI for offering job recommendations, suggesting people whom they’d
like to connect, and sending them specific posts for their feed.
Snapchat uses the capability of computer vision for tracking physical features and overlaying
filters that move with them in real-time.
These business examples are a validation of how AI is a crucial part of all the different genres
of the social media domain.
4. IoT
The last in our list of social media and technology trends is the Internet of Things. The
technology is used heavily for social media monitoring and marketing purposes by some of
the top names in the industry like N&W, Disney, and Tencent, etc.
Organizations are constantly on the lookout for an IoT skilled social media app development
company that would help them create solutions around real-time monitoring of data and
insights coming in from social media to help them make better business decisions.
The purpose of System Design is to create a technical solution that satisfies the functional
requirements for the system. At this point in the project lifecycle there should be a
Functional Specification, written primarily in business terminology, containing a complete
description of the operational needs of the various organizational entities that will use the
new system. The challenge is to translate all of this information into Technical Specifications
that accurately describe the design of the system, and that can be used as input to System
Construction.
Many organizations look at System Design primarily as the preparation of the system
component specifications; however, constructing the various system components is only one
of a set of major steps in successfully building a system. The preparation of the environment
needed to build the system, the testing of the system, and the migration and preparation of the
data that will ultimately be used by the system are equally important. In addition to
designing the technical solution, System Design is the time to initiate focused planning
efforts for both the testing and data preparation activities.
16 | P a g e
17 | P a g e
The following table lists all System Design processes, some techniques available for use in
executing these processes, and process outcomes and deliverables.
The skills needed by the Project Team to perform System Requirements Analysis processes
are dramatically different from those required to translate the requirements into a technical
design. While it is certainly possible for the current team to possess the range of skills
required for both phases, this assessment needs to be performed and the team profile adjusted
to match the needs of System Design.
Often, there is a distinct advantage to keeping as much of the original Project Team as
possible while progressing from each phase to the next, thereby retaining business knowledge
and functional expertise gained in prior phases. It is, however, also common for the team
size to expand as the project advances into the Design phase.
18 | P a g e
The initiation of a new project phase is also the right time to assess the training needs of the
existing team. Please refer to Section I, Project Planning, for a detailed approach to
developing your Project Team. It is the Project Manager’s responsibility to ensure that team
members have adequate equipment to perform their duties, that this equipment is configured
with the proper design tools, and that the team has access to the data repository that will be
used throughout design efforts. A key activity will be the definition of the mechanisms and
processes to be followed for creating and maintaining all System Design related materials,
similar to the repository that was utilized for all System Requirements work products and
deliverables.
This is also the time to begin to establish the environment that will likely be required when
the Project Team initiates the prototyping activities.
During this phase, the Project Team’s focus moves from business and functional areas to
technical issues. As a result, there is often less involvement on the part of those project
participants more closely aligned with the organization’s functional and operational needs
(the Stakeholders, Customer, Consumer, and Project Sponsor). These parties may begin to
feel isolated or removed from the project due to their reduced involvement and they may not
be immediately aware of much of the progress of the Project Team. While they are likely to
play an active role in the discussions surrounding test planning and data conversion, they
usually have limited involvement in the identification of the technical architecture and
standards and the development of Technical Specifications. This situation poses a challenge
for the Project Manager, since these individuals will ultimately be profoundly affected by all
of these activities. The Project Manager must maintain effective communications with these
individuals throughout this phase to ensure that they understand the implications of the
technical decisions being made.
19 | P a g e
Automated testing will be performed on hardware for specific features. The feature testing
will be used to test the hardware components such as memory sticks, storage drives, fan, and
power supplies among others. This test will rely on the inbuilt diagnostic tools like ones
found on BIOS to test the components. A good example is a SMART tool for testing hard
drives (Strichman & Tzoref-Brill, 2017). These tools will help a lot in identifying and
hardware component before proceeding to the next tests.
Integration Testing
Most components in Roadster Corp. are interconnected. Multiple programs are relying on
each other while hardware components are interconnected (Ammann & Offutt, 2016). It is for
this reason integration testing has to be done. Manual testing will be performed to check if
all the interconnected hardware components are communicating well. The process involves
checking indicators for the cable connections such as Ethernet if they are indicating there is
communication going on. This is part of interface testing making sure every interface is
working when connected with another interface.
Automated testing will be performed to ensure all components have the desired behavior. The
integration testing will be able to test critical configurations such as firewall rules. A tool like
Nmap will be used to map the network and check for open ports and closed ones. SNMP will
20 | P a g e
also play a role by using RMON probes to show which interfaces are up and down. Any issue
encountered will have to be rectified. Bandwidth test will have to perform in this section to
ensure there are no bottlenecks in the network.
Protocols Tests
Protocols are used by various applications to communicate in a network. It will be important
to test all the protocols used by Roadster Corp. Protocols such as HTTPS, SMTP and others
will be tested thoroughly. These protocols will be tested after integration testing to determine
if the protocols are useful across the network. Performing this test will ensure no protocol
required by the organization is blocked by firewalls. Nmap will be useful in performing this
test since it provides detailed information about the network.
Manual testing will be performed too. For example, a user will have to create a test email and
send it across the network to other branches as a way of testing the SMTP. This test will be
performed just for more clarification.
Acceptance Testing
It is important to test the network with real users in the real world environment and check if
users are comfortable with it. This is the final test and user feedback plays a key role in the
testing. If users are satisfied with the network then the test passes otherwise it is a fail and
something needs to be done (Ammann & Offutt, 2016).
21 | P a g e
T 4.2 - Explain what is white box testing and black box testing, based on your
experience which strategy would be more beneficial to a programmer and which would
be more suited to an end user
It is a way of software testing in which the It is a way of testing the software in which
internal structure or the program or the the tester has knowledge about the internal
code is hidden and nothing is known about structure or the code or the program of the
it. software.
22 | P a g e
T 4.3 - Produce a test plan to test software components of one of the stand - alone PCs.
1.0 INTRODUCTION
It is a brief summary of the product that is being tested. Outline all the functions at a high
level.
2.2 Tasks
List all the tasks identified by this Test Plan, i.e., testing, post-testing, problem reporting, etc.
3.0 SCOPE
General: This section describes what is being tested, which is new to all the functions of a
specific product, its existing interfaces, integration of all functions, etc.
Tactics: List here on how you will accomplish the items that you have listed in the “Scope”
section. For example, if you have mentioned that you will be testing the existing interfaces,
what would be the procedures that you would follow to notify the key people to represent
their respective areas, as well as allotting time in their schedule to assist you in accomplishing
your activity?
23 | P a g e
Specify any additional completion criteria (for example, error frequency). The techniques to
be used to trace requirements should be specified.
Participants: List the names of the individuals/departments who would be responsible for
Unit Testing.
Methodology: Describe how unit testing will be conducted. Who will write the test scripts for
Unit Testing, what will be the sequence of events for Unit Testing and how will the testing
activity take place?
24 | P a g e
4.5 Batch Testing
4.6 Automated Regression Testing
Definition: Regression testing is the selective retesting of a system or a component to verify
that the modifications have not caused unintended effects and that system or component still
works as specified in the requirements.
4.7 Beta Testing
25 | P a g e
Test Plan. In the event that you are using an automated incident logging system, write the
procedures.
Change Requests
Document the process of modifications to the software. Identify who will sign off on the
changes and what would be the criteria for including the changes to the current product. If the
changes will affect the existing programs, then these modules need to be identified.
REFERENCES
Hasler, E 2018, The built environment, Liverpool University Press, Liverpool.
Puccio, GJ, Cabra, JF & Schwagler, N 2018, Organizational creativity: a practical guide for
innovators & entrepreneurs, Sage, Thousand Oaks, CA.
Crauder, B, Evans, B, Johnson, J & Noell, A 2018, Quantitative literacy: thinking between
the lines, W.H. Freeman, New York, NY.
Style manual for authors, editors and printers 2002, 6th edn, AGPS, Canberra, ACT.
Jablonka, I 2018, History is a contemporary literature: manifesto for the social sciences,
trans. N Bracher, Cornell University Press, Ithaca, NY.
26 | P a g e
Declaration of Academic Honesty Instructions
1. You must submit a completed copy of this form every time you submit an
assignment.
2. You must submit this declaration electronically, either within your assignment,
file, or as a separate file.
3. If you do not submit this declaration, your work will not be assessed.
4. If any student is found to have been dishonest, then the student may face
disciplinary action as stated in the IDM Nations Campus Plagiarism Policy.
……………………………………………..
Student Signature
27 | P a g e