logo

Impact of Computer Organization and Operating System, Networking and Internet Security on IT Company

   

Added on  2023-03-31

19 Pages3716 Words376 Views
Computer Network
Impact of Computer Organization and Operating System, Networking and Internet Security on IT Company_1
Table of Contents
Task 1 Evaluation Report.................................................................................................................3
Abstract............................................................................................................................................3
Background......................................................................................................................................3
Advantages and disadvantages .......................................................................................................5
Legal and Ethical ............................................................................................................................6
Conclusion.......................................................................................................................................7
Task 3.............................................................................................................................................14
Portfolio (computer organization and operating system)...............................................................14
Introduction....................................................................................................................................14
Analysis..........................................................................................................................................14
Conclusion.....................................................................................................................................15
Portfolio (Networking and Internet Security)................................................................................16
Introduction....................................................................................................................................16
Analysis..........................................................................................................................................16
Conclusion.....................................................................................................................................17
References......................................................................................................................................18
Impact of Computer Organization and Operating System, Networking and Internet Security on IT Company_2
Task 1 Evaluation Report
Abstract
In this the report impact of computer organization and operating system, networking and
internet security on any IT company which analysis the process and the flow of data and
instructions on the basis of architecture. And various hierarchical systems are considered that
helps us in modulating the software system into logical fragments that helps us in identifying the
hierarchic architecture style of the software in which different process uses different approaches
such as in main-subroutine the software is divided in to fragments, in master-slave divide and
conquer asspproach is used where in virtual machine a virtual system is created by the software.
In networking various networking protocols are used that helps in communicating or share the
information with the system (Bhuyan, and Agrawal, 1984). This can also be used for resource
sharing purpose. It provides lots of protocols for the transferring the files from source to
destination with guarantee and many other protocols are provides that can helps in uploading and
downloading the mails. And internet security in which security is provided during internet
browsing, online banking transaction, while uploading and downloading the files. Because
during this period various threats such as virus, worms, trojan harms may damage your data and
corrupt your file. And may cause the situation where data loss takes place.
Background
Computer organization deals with hardware of the computer such input devices, output
devices and CPU. In which computer organize its devices in a way that they make the processing
of the device smooth. Such as the CPU perform the fetching and execution process of the
instruction using program counter that holds the address of instruction into memory. Input and
output devices are used to organize the process of receiving and transmitting the process and also
use to store the information into the memory of the device. In Harvard architecture separate
memories are provided for both date and instruction (Jain, and Routhier, 1986.). It also provide
two set of address buses or data buses that is presented between CPU and memory. In Harvard
two simultaneous fetching of memory is allowed. Harvard architecture are still used by many
companies because it provides greater memory bandwidth. Where in Von Neumann architecture
common memory is provided to store the data and instruction instead of separate memory. It
have single set of address bus between CPU and memory due to which the size of memory
Impact of Computer Organization and Operating System, Networking and Internet Security on IT Company_3
bandwidth get reduced. In this report John Lewis Partnership is an IT company that uses the
most efficient architecture in order to increase the speed (Davis,. 2001).
Operating systems are used to control and manage the computation of resources. The
services that are offered by the operating system are file system in which files are arranged in the
form of directory, folders and files into the device. Another process of the operating system is
providing commands that are used to manipulate the file system such insertion, deletion, copy
and update. And the last but most important work of operating system is to manage the
processing of the system. In operating system one of the important topic is system software
hierarchy in which the software system is divided into small logical units at different levels. The
system id divided such as main-subroutine, master-slave and virtual machine. In main-subroutine
module the software is fragmented according to the functionality of the system. In master-slave
module divide and conquer approach is used. In this method the task is divided into small parts
until we get the solution and once we get the desired result combine the result. In virtual machine
a virtual system is created which does not have any physical existence.
Networking concept is used for connecting computers through other devices using
switches, routers, gateways and other types of access points. .This can be considered as an
important part because it enable the communication between the system by enabling the
communication channel between them. EE Limited work to provide the internet services. For
this communication various Internet protocols are used such as TCP, UDP, FTP, HTTP, SMTP&
POP3 and much more. TCP (Transmission Control Protocol) in which information is braked into
small pieces of information packets and then transmission takes place and once they reached at
the destination pockets are recombine again. UDP (User Datagram Protocol) this protocol is
same as the previous one but in this we can transmit more than one at a time. SMTP(Simple
mail Transfer Protocol) &POP3( Post Office Protocol) which help in uploading and downloading
the e-mails (Roberts, and Wessler, 1970).
Internet security can be considered as an important branch of computer security in this
security is concern at the time of browsing internet, using online banking transactions,
downloading files. EE limited uses the feature of internet security. Internet security deals with all
kinds of virus, worms , threats and hackers also. In this context cloud computing security is very
important because in this the services are provided by the service provider and used by the
Impact of Computer Organization and Operating System, Networking and Internet Security on IT Company_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Self- paced Learning Plan Topic 2022
|10
|2323
|20

Key Features and Services of Operating Systems : Technical Evaluation
|7
|983
|13

Examination of Computer System Components
|33
|10663
|81

Computer Systems Architecture
|14
|452
|16

Server Availability Monitoring Tools
|13
|2568
|82

Computer Organization and Network Analysis
|27
|5085
|18