Computer Structures

723 words | 3 page(s)

#1.�In the case of an interactive processing, the user has the capability of interacting with the program being used. This is done in the form of a dialogue, further facilitated by remote terminals strategically put in place. It is characterised by the users’ capability of typing in inputs and waiting for replies from the computer, in most cases, on a printed paper. The term real-time processing goes hand in hand with its name. Everything processed is done in a timely fashion in accordance with the required results. A good example would be the way we use the word processer to type our work. Imagine if it took it more time to show you what you have typed. A real time processer shows the results as soon as they have been typed in.

�#2.�In most cases while using a computer, people tend to want their results shown immediately they work on them. On the other hand, this is never the case. Back in the 60s and 70s, this situation was much worse hence time-sharing. They had to find a system that would execute more than one job at a time. Time-sharing enabled multiple users to share a machine at the same time. The results and execution of each and every job in process is done in a systematic way. A job can easily be set aside in order for another to be continued or initiated.

puzzles puzzles
Your 20% discount here.

Use your promo and get a custom paper on
"Computer Structures".

Order Now
Promocode: custom20

�#3. �For a better understanding of a millisecond, we need to recognise the fact that one is equal to 1000 microseconds. In the case of 5000 instructions and 20milliseconds, 100,000 instructions can be completed during this given period. This is reached by multiplying 20 by 5000.

#4.�Technology has allowed users to do a lot while on the net. People are able to do things like payments and even online applications. In some cases, the activities come in the form or either animations or merely as a form that needs to be filled. This come be done on their client or even the server side of the operation. These activities are greatly connected to the operations of the browser and even the web server in order to operate efficiently. The browser and the web server form the difference between the client -side and the server-side activities respectively. In the case of a travel agent, when they are able to choose their destination in a web page, this is an example of a client-side activity. A server-side activity would be constructing an appropriate web page after a customer’s activity. This is completed when it is sent to the customer’s browser page.

Another client-side activity example would be seen when using a typical search engine. The information got and searched for require activities from both parties, client and server. The server bit of it comes when the person searching on the engine is able to input the specifics of the search, hence client-side activities. The server-side activity comes in when this information is transferred to the customized web page. After the document is identified, possible interests are put together to enable the client to get the results asked for( Server-side activities).

#5In most cases, when it comes to the use of the internet, there is always a client and a server involved. With this in mind, it goes without say that security and privacy issues may rise from both sides. A client might damage the server maliciously while on the other hand, the server can end up damaging its operations in the same way. Security issues arise when the information from the clients are not well handled and secured by the server. The server can let down its clients when it fails to properly secure the information provided to them by the clients. Another major internet and privacy issue would involve other users who are out to hack into a system and get their information. This exposes both the server operators and clients in danger.

#6When trying to differentiate between a worm and a virus, it is important to look at the way they operate. A virus is known to repeat itself hence spread throughout a system while on the other hand, a worm is characterised by mounting to a paralysis of the whole system. Both of them have negative effects on the operations of a network.

    References
  • Brookshire, G. (2012). Computer science: An overview. New York: Sage Publications .

puzzles puzzles
Attract Only the Top Grades

Have a team of vetted experts take you to the top, with professionally written papers in every area of study.

Order Now