- Review questions
- The computer bus provides a communication channel for control signals and data that moves along the components of the computer system. A computer bus performs its roles by combining the responsibilities of control, data, and address buses. The data bus playa the purpose of carrying actual data between the peripherals, the processor, and the memory. The address bus specifies the locations of the memory for the data that is transferred. The main difference between the data bus and the address bus is that the data bus helps the computer system in sending and receiving data while the address bus helps in transferring addresses of the memory.
- Green computing aims at attaining economic viability enhancing the use of computing devices. The practices of green computing include the use of computers that are energy efficient, developing production practices that are sustainable to the environment, and improving the procedures of recycling and disposal. Green computing has the goal of cutting down the use of energy in computing. Also, it has the goal of minimizing the addition of destructive materials. Additionally, green computing has the purpose of extending the useful life of the equipment. An example of a successful case in the industry on the goals of green computing is the use of energy saving computers. There is an increase in the production of energy-saving computers in the industry where bodies rate the products found in the market. For instance, the Green Electronics Council in the United States oversees the purchase of equipment which meets its rating scheme. Such measures enhance the credentials of green computing thus the achievement of its goals.
- Random access is whereby the computer can write and read information anywhere in the data file. It involves reading directly from the dick without reading the previous records. In random access, the order of storing documents is irrelevant. The random access method is significant for airline booking systems and computerized information services. The type of device that offers random access is random access memory. In sequential access, the operation of the computer writes or reads information in the file data chronologically, that is from the beginning to the end sequentially. In this method, there is the retrieval of data in the order in which it was recorded on the storage. Sequential access is suitable in conditions where there is a need to access the files for processing like in the production of payrolls. The type of sequential access is the sequential access memory like the optical and magnetic storages.
- A cache memory comprises of a high-speed memory which a processor can access quickly than the main memory or the conventional random access memory. A cache memory stores data that is used continuously and program instructions.
- Solid state memory devices
Advantages
- It consumes less power. Solid state memory devices do not have moving parts, and they do not need mechanical works for them to be operational; hence they save energy. Thus, solid-state memory devices are suitable for consumer devices and computers which use energy efficiently.
- The solid-state memory devices are faster than magnetic memory devices because they do not have mechanical parts. Data fragmentation in the solid state is negligible making it be faster than other storages.
Disadvantages
- Solid state memory devices have a limited capacity to store information. Computers with these storages have a base storage size of 128GB.
- Solid state memory devices have a limited number of write cycles as compared to magnetic memory devices. The cells of the solid-state memory become useless after going through the periods.
Magnetic memory devices
Advantages
- Magnetic memory devices have a large storage capacity than solid state memory devices. They can store massive amount of information in a small space.
- Magnetic memory devices are cost-effective. The prices of magnetic devices have come down making it affordable to the users.
Disadvantages
- Magnetic memory devices are slow. The accessibility of data using the machines is slow since its accesses are sequential. When looking for specific data, one has to access all the blocks of data first.
- It is hard to recover or find specific files in a backup since they have to be searched from one end to another. Also, the restoration of data is difficult due to the medium of storage.
- The role of the main memory is to store data temporarily while the secondary data performs the purpose of storing data permanently. Besides, the main memory can be accessed directly by the Central Processing Unit (CPU) while the second memory cannot access directly to the Central Processing Unit.
- Read case study 1 on page(s) 130-131 and answer the following questions.
3 driving forces
To enhance efficiency in the business
Technological changes. The changes in technology necessitated the changes
To reorganize to competitiveness. ARM wanted to offer quality services to customers.
3 restraining forces
Disruptive. The company felt that it might disrupt its operations.
Economic implications. The costs of designing the processors were high.
Fear for the unknown. ARM was not aware of the outcome of the new processor design.
To address disruption force, the company will have to educate it members on how they can manage the change without disrupting the function of ARM.
ARM should consider the costs involved in the design of the processor and weigh it with the advantages.
ARM should do a feasibility study to determine the viability of the design to avoid resistance.
Competitive advantages of ARM over its competitors
ARM is the leading player in mobile technology while its competitors are struggling to acquire a market share.
ARM generates more revenue as compared to Intel.
Competitive advantages of Intel over ARM
Intel has large manufacturing capacity. It is the leading in the production of chips where it produces on a large scale
Intel has the highest level of integration. Its high levels of integration helps in ensuring the compatibility of its products.
- Intel can benefit from the model by penetrating the market outside the country. Besides, it will help Intel to expand its presence in the globe and recognition of its bland without capital expenses.
- ARM’s licensing will change to meet the needs of people by stimulating the human brain with the changes in technology. The licensing will help in the advancement of mobile and processing technology.
- a)
- Data security. The initiation of remotely hosted backups enhances data security. Hence it is difficult for intruders to access data unlike in tape backup. Additionally, the data is saved from damages unlike in the tape storages.
- Remote access to the company. The IT staff can access and manage the servers of the company remotely. The employees can access the servers of the company from any place and at any time.
III. Simplification of its tasks. The update of technology simplifies the operations of the company. The simplification of the process saves time and costs making it be competitive.
B Tth
Pros of in-house email
- Vivobarefoot will have physical control over the backup.
- It is secure. In-house email protects the data of the company from access to the third party.
III. Vicobarefoot will have not to depend on internet connectivity to access data.
Cons of in-house email
- In-house email requires a considerable capital investment in infrastructure and hardware.
- In-house email is susceptible to loss of data during disasters.
III. There are no recovery time or uptime guarantees.
Pros of outsourcing email services
- Minimizes loss of data during disasters since there is the backing of data in the cloud at regular intervals.
- There is no need for onsite infrastructures and hardware hence no capital expenses.
III. The company staff can backup and restore data anywhere using smartphones, laptops, or computers.
Cons of outsourcing email services
- The company cannot access its information in case there is the failure of the internet on its side or the side of the cloud provider.
- Recovering full data consumes a lot of time.
III. There can be a limit in the amount of data that will be stored in the cloud due to costs and availability of storage space.
I will choose outsourcing email option because it guarantees the safety of data.
c.
Cybercrime challenge. During the sharing of information, hackers may get access to confidential information of the companies which threatens the security of data. In addressing cybercrime, the companies should hire providers who offer encryption, who keep their employees away from the IDs of the companies
Administrative challenges. Issues of the owner of data may arise more particularly in data collected by different organizations. Additionally, data policies differ across different companies. In dealing with this challenge, the companies should have uniform guidelines on data sharing.
Loss of data. There is a loss of data in case of internet and power failure. In dealing with this issue, the companies should put in place backups and alternative sources of power to prevent data loss.
D
Hacking. Hackers may access the system of the organization and steal data since personal information, passwords, and hardware and software technology no longer protect trade secrets.
Compliance violations. If the vendor stops providing support on security compliance, the company may fall out of respect when there is a discovery of new vulnerabilities.
Increase in operating costs. The company will use resources meant for running the business to maintain external-purchased hardware and software.
Do you need high quality Custom Essay Writing Services?