Question

Client Server Architecture

A Client-server is an Architecture that performs both the functions of client and server to promote the sharing of information between them. It allows many users to have access to the same information at the same time. You are to research and prepare a professional looking paper, which provides information about Client-Server Architecture. Your paper must contain the following minimum requirements: 1) Explain: a) The history of Computer programming. b) The Hardware architecture used by modern computers (Von Neumann Architecture) 

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer to (a)

The History Of computer Programing

after 1822 Charle's babbage Differene Engine could perform tasks by moving gears physically later on physically movement was replaced by electrical signals after ENIAC in 1942 but those was a tedious job as it involves many presetting switches and entire rewiring of system.

in 1945 John Von Neummane developed Shared-program technique which allowed complex instructions to execute the commands and run program

In 1949, a few years after John Von Neumman’s work, the language Short Code appeared that was the first computer language for electronic devices and it required the programmer to change its statements into 0’s and 1’s by hand. Still, it was the first step towards the complex languages of today.

In 1951, Grace Hopper wrote the first compiler, A-0 A compiler is a program that turns the language’s statements into 0’s and 1’s for the computer to understand which led to faster programming, as the programmer no longer had to do the work by himself.

In 1957, the first of the major languages appeared in the form of FORTRAN( FORmula TRANslating). designed by IBM for scientific computing. The components were very simples and restrictive as it only included IF, DO, and GOTO statements, but at the time, these commands were a big step forward.

The transition in usage from the first major languages to the major languages of today occurred with the transition between Pascal and C.C was developed in 1972 by Dennis Ritchie while working at Bell Labs in New Jersey. All of the features of Pascal, including the new ones such as the CASE statement are available in C. C uses pointers extensively and hard to read. But because it fixed most of the mistakes Pascal had, it won over former-Pascal users quite rapidly.

Ritchie developed C for the new Unix system being created at the same time. Because of this, C and Unix go hand in hand. Unix gives C such advanced features as dynamic variables, multitasking, interrupt handling, forking, and strong, low-level, input-output.

C++ was designed to organize the raw power of C using OOP, but maintain the speed of C and be able to run on many different types of computers. C++ is most often used in simulations, such as games.

Visual Basic is often taught as a first programming language today as it is based on the BASIC language developed in 1964 by John Kemeny and Thomas Kurtz. BASIC is a very limited language and was designed for non-computer science people. Statements are chiefly run sequentially, but program control can change based on IF..THEN, and GOSUB statements which execute a certain block of code and then return to the original point in the program’s flow.

Microsoft has extended BASIC in its Visual Basic (VB) product. The heart of VB is the form, or blank window on which you drag and drop components such as menus, pictures, and slider bars. These items are known as “widgets.” Widgets have properties (such as its color) and events (such as clicks and double-clicks) and are central to building any user interface today in any language.

Programming languages have been under development for years and will remain so for many years to come. They got their start with a list of steps to wire a computer to perform a task. These steps eventually found their way into software and began to acquire newer and better features.

Answer to (b)

Von Neumann architecture was first published by John von Neumann in 1945.

Von Neumann architecture is based on the stored-program computer concept, where instruction data and program data are stored in the same memory. This design is still used in most computers produced today.

The basic concept behind the von Neumann architecture is the ability to store program instructions in
memory along with the data on which those instructions operate. Until von Neumann proposed this
possibility, each computing machine was designed and built for a single predetermined purpose. All
programming of the machine required the manual rewiring of circuits, a tedious and error-prone process. If
mistakes were made, they were difficult to detect and hard to correct.

His computer architecture design consists of a Control Unit, Arithmetic and Logic Unit (ALU), Memory Unit, Registers and Inputs/Outputs.

  1. The CPU, which can be considered the heart of the computing system, includes three main components: the control unit (CU), one or more arithmetic logic units (ALUs), and various registers.

  2. The control unit determines the order in which instructions should be executed and

controls the retrieval of the proper operands. It interprets the instructions of the machine. The
execution of each instruction is determined by a sequence of control signals produced by the
control unit. Each operation caused by a control signal iscalled a microoperation (MO).

ALUs perform all mathematical and Boolean operations. The
registers are temporary storage locations to quickly store and transfer the data and instructions
being used. Because the registers are often on the same chip and directly connected to the CU, the
registers have faster access time than memory.  A CPU that is implemented on a single chip is called a microprocessor.


2. The computer's memory is used to store program instructions and data. Two of the commonly used
type of memories are RAM (random-access memory) referred to as primary or main memory. Unlike a hard drive (secondary memory), this memory is fast and also directly accessible by the CPU. RAM stores the data and general-purpose programs that the machine executes.

RAM is split into partitions. Each partition consists of an address and its contents.The address will uniquely identify every location in the memory.Loading data from permanent memory (hard drive), into the faster and directly accessible temporary memory (RAM), allows the CPU to operate much quicker.

RAM is temporary; that is, its
contents can be changed at any time and it is erased when power to the computer is turned off.
ROM is permanent and is used to store the initial boot up instructions of the machine.


3. The I/O interfaces allow the computer's memory to receive information and send data to output
devices. Also, they allow the computer to communicate to the user and to secondary storage
devices like disk and tape drive

Registers
Registers are high speed storage areas in the CPU. All data must be stored in a register before it can be processed.

Buses
Buses are the means by which data is transmitted from one part of a computer to another, connecting all major internal components to the CPU and memory.



answered by: Zahidul Hossain
Add a comment
Know the answer?
Add Answer to:
Client Server Architecture
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Client server Computing

    1)Explain differences in Delivery Systems - Thick –v- Thin Client Programming  a. Browser based –v- Desktop Executable applications b. Software distribution issues (pluses and minuses) for each2) Provide Illustrations and explanations of the Architectures.3)Explain:  a) The history of Computer programming. b) The Hardware architecture used by modern computers (Von Neumann       Architecture) c) Structured Programming – How it works/ Why we use it d) Compiler –v- interpreter –v- Hybrid (Just in time)4)Explain in detail the history and overview of the Client-Server Architecture a) Client-Server b) 3 Tier Systems c)...

  • Draw a schematic of the client server architecture of a university’s information system(s). Ident...

    Draw a schematic of the client server architecture of a university’s information system(s). Identify the three (or more) tiers of that architecture. List the hardware and software choices that were made in that particular implementation.

  • Group B Word Pool IL. A computer application that allows the user to enter demographic information,...

    Group B Word Pool IL. A computer application that allows the user to enter demographic information, schedule appointments, maintain lists of computer network data server local area network dumb terminal. insurance payers, perform billing tasks, and generate reports 12 Asystem that links personal computers and peripheral devices to share information and resources router practice management software redundancy Ethernet wide area network 13. Peripheral computer hardware that connects to the router to provide Internet access to the network or computer modem...

  • Networking fundamentals ICLOUU10P 1. A(n) is a set of peer computers that share resources such as...

    Networking fundamentals ICLOUU10P 1. A(n) is a set of peer computers that share resources such as files and hardware. 2. A(n). is a logical grouping of users and equipment as defined by the network administrator. 3. Microsoft server editions have interfaces similar to the current was new for Windows Server 2008 and Windows 7 and is designed to improve network performance by storing information downloaded from the Internet or a web server onto a local area network client. 5. An...

  • i need answers to all of them. please solve as many as u can the questions...

    i need answers to all of them. please solve as many as u can the questions need to bw answered on the basis of the paragraph on the top. I need answers to the first 8 questions ASSESSMENT 1 - Project You are working as an IT consultant for Nubex Pty Ltd. The Company has assigned you to develop the New Network infrastructure for New Branch of Harbour College located in York Street. New Branch of Harbour College will have...

  • CIS - WINDOWS SERVER ADMIN - KNOWLEDGE BASED ASSESSMENT [101-BASICS] Additional Questions (5) Total. 210. What...

    CIS - WINDOWS SERVER ADMIN - KNOWLEDGE BASED ASSESSMENT [101-BASICS] Additional Questions (5) Total. 210. What is the PowerShell command to get the PowerShell version on Server 2016? Select one: a. Get-Version b. Get-PSVersion c. Get-Host d. Get-HostVersion 211. Server 2016 supports volume size up to _____ for storage replication. Select one: a. 256GB b. 64TB c. 128TB d. 1 PB 212. Which of these commands is used to get Windows OS information using Powershell? Select one: a. Get-SystemInfo b....

  • F 2. Data mining provides management with daily operational reports: True or False? 3. A Data...

    F 2. Data mining provides management with daily operational reports: True or False? 3. A Data Base Management System (DBMS) function is to-provide a company with F 1. A computer's Operating System (O/s) is always in volatile mode: True or access and control of its Operating System software 4. A computer's Operating System performs the Data Mining function: True or False? ru 5. Data travels via the Internet at 186,282 megabytes per second: Trus or False? 6. The World Wide...

  • Name: Date Identify the following statements as true or false (5 % each question) 1. Transistors...

    Name: Date Identify the following statements as true or false (5 % each question) 1. Transistors were invented in the First generation to replace the vacuum tubes False 2. Instruction Set Architecture (ISA) is the interface between operating system and hardware 3. The number 666 and the number in quotes "666" is the same to a computer 4. The binary number of 218 in BCD code is 0010 0001 1000 5. In the early 17 century, the term "Computer" was...

  • 1. Which of the following commands will locate all of the program files on a computer...

    1. Which of the following commands will locate all of the program files on a computer on which the SUID bit is set? Select one: a. find / -type SUID b. find / -perm +4000 -type f c. find / -perm +SUID -type f d. find / -suid 2. A server/computer combination appears in both hosts.allow and hosts.deny. What's the result of this configuration when TCP wrappers runs? Select one: a. TCP wrappers refuses to run and logs an error...

  • Rocky Mountain Corporation (RMC) has relocated to a new building that was previously wired and set...

    Rocky Mountain Corporation (RMC) has relocated to a new building that was previously wired and set up for a local area network (LAN). The company implemented a 50-user client/server-based wireless network, using WPA in which all printers, folders, and other resources are shared; everyone has access to everything and there is no security outside of the defaults that were in place when the system was set up. You have been hired to secure the RMC network and ensure that the...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT