Free Essay

Unit 1 Assingment 1

In:

Submitted By yingvang209
Words 315
Pages 2
Intel Processor Model Year Transistor count
Intel 4004 1971 2,300
Intel 8008 1972 3,500
Intel 8080 1974 4,500
Intel 8085 1976 6,500
Intel 8086 1978 29,000
Intel 8088 1979 29,000
Intel 80186 1982 55,000
Intel 80286 1982 134,000
Intel 80386 1985 275,000
Intel 80486 1989 1,180,235
Pentium 1993 3,100,000
Pentium Pro 1995 5,500,000
Pentium II 1997 7,500,000
Pentium III 1999 9,500,000
Pentium 4 2000 42,000,000
Atom 2008 47,000,000
Itanium 2 McKinley 2002 22,000,000
Core 2 Duo 2006 291,000,000
Itanium 2 Madison 6M 2003 410,000,000
Itanium 2 with 9MB cache 2004 592,000,000
Core i7 (Quad) 2008 731,000,000
Quad-Core + GPU Core i7 2011 1,160,000,000
Six-Core Core i7 (Gulftown) 2010 1,170,000,000
Quad-Core + GPU Core i7 2012 1,400,000,000
Dual-Core Itanium 2 2006 1,700,000,000
Six-Core Xeon 7400 2008 1,900,000,000
Quad-Core Itanium Tukwila 2010 2,000,000,000
Six-Core core i7/8-Core Xeon E5 2011 2,270,000,000
8-Core Xeon Nehalem-EX 2010 2,300,000,000
10-Core Xeon Westmere-EX 2011 2,600,000,000
8-Core Itanium Poulson 2012 3,100,000,000
62-Core Xeon Phi 2012 5,000,000,000

3. 2010 Intel Itanium Quad Core Processor had 2 billion transistors placed on a single processor chip.
5. This growth in transistor is reasonable according to Moore’s Law. The growth of transistors is surprisingly fast. Predicting when it will reach 100 billion or even one trillion would be very hard, as technology is changing and who knows how they would even fit that many transistors on a single chip.

Reference
http://www.antiessays.com/free-essays/172403.html

Similar Documents

Premium Essay

Assingment 1 Unit 1

...1. Explain the difference between operating system software, application software, and utility software. The difference between the 3 programs is that the operating system is the central control for all programs on a computer. The utility software is what keeps the operating system and application working normal without clutter or virus. Then the application software is what issued in the operating system to interact with the hardware to make the computer my user friendly. 2. Explain the concept of virtual memory and why it is needed. Virtual memory is the use of hard drive space for program data that is currently not in use. So that the program that does need the ram memory can use it without being hinder. 3. What would be a possible cause of disk “thrashing”? Disk thrashing could be possible if you have to mean application open at once. Which could over run your ram and your virtual memory? This could cause considerable damage to the hard drive do to the transferred data back and forth over it. 4. How is the Windows registry organized? Keys and sub keys 5. How would you change mouse parameters like double-click speed? To change the parameters you would first go to the start button on bottom left of your screen. From there find the control panel and click it. The go to the hardware and sound button were you will find the mouse button. Once you’re in mouse properties under the buttons tab you will see the double-click speed option to change it. 6. Why...

Words: 501 - Pages: 3

Free Essay

Unit 10 Assingment 1

...1. Aaaa KEY TERMS: Transmission Control Protocol - is one of the core protocols of the Internet protocol suite (IP), and is so common that the entire suite is often called TCP/IP. TCP provides reliable, ordered, error-checked delivery of a stream of octets between programs running on computers connected to a local area network, intranet or the public Internet. It resides at the transport layer. User Datagram Protocol flow - is one of the core members of the Internet protocol suite (the set of network protocols used for the Internet). With UDP, computer applications can send messages, in this case referred to as datagrams, to other hosts on an Internet Protocol (IP) network without prior communications to set up special transmission channels or data paths TCP Segment - consists of a segment header and a data section. The TCP header contains 10 mandatory fields, and an optional extension field UDP datagram - is one of the core members of the Internet protocol suite (the set of network protocols used for the Internet). With UDP, computer applications can send messages, in this case referred to as datagrams, to other hosts on an Internet Protocol (IP) network without prior communications to set up special transmission channels or data paths. Source port – the port from which data is sent Destination port – the port to which data is to be sent Well-Known port number – example port 21 is usually the printer port Dynamic port - is an on-demand method of traversing a firewall/NAT...

Words: 449 - Pages: 2

Premium Essay

Nt 1310 Unit 1 Assingment 1

...1. Cell phones a. Cell phones are on a voice network for the most part b. Cell phones do use data services. c. Cellphones can access networks for internet an voice 2. Landline Phones a. This is a Voice network b. No power is needed to use this network c. The network actually builds electricity why moving thought the house 3. SMS/Text Messaging a. SMS (Short message service) is a mechanism of delivery of short messages over the mobile networks. b. It is a store and forward way of transmitting messages to and from mobiles. c. The message (text only) from the sending mobile is stored in a central short message center (SMS) which then forwards it to the destination mobile. 4. Fax Machine a. Voice, although the two are becoming one and the same thing to a certain extent now. b. Internally all the large telephone companies are switching to unified data networks to carry all of their traffic, and tweaking the parameters for best results with each distinct type of traffic going onto the network. c. Fax Machines are not used nearly as much as email is used today 5. Pagers a. A way to notify individuals of incoming calls by a tone, it uses a data signal. b. Was also used to relay short messages to doctors in hospitels c. Was only capable of receaving signals not capable of sending them again. 6. VOIP (voice over IP) Phones a. Uses digital technology to make phone calls on the Internet rather than through phone lines. b. A VoIP phone allows us to bypass the phone...

Words: 326 - Pages: 2

Premium Essay

Unit 6 Assingment 1: Cable Testers

...Assignment 1: Cable Testers Wire-Map Testers A wire-map tester transmits signals through each wire in a copper twisted-pair cable to determine if it is connected to the correct pin at each end. Wire-map testers detect transposed wires, opens, and shorts which are all problems that can render a cable useless. A wire-map tester consists of a remote unit that you attach to the far end of a connection and the battery-operated, handheld main unit that displays the results. Typically, the tester displays various codes to describe the type of faults it finds, so you know which part of the cable you messed up on or what else may be wrong with it. Tone Generators Tone generators are the simplest type of copper cable tester. A tone generator is made up of two parts, a tone generator and a probe. These are sometimes referred to as a fox and hound wire tracer. With a standard jack, you connect to the cable the unit that transmits a signal, or, with an alligator clip, you connect the unit to an individual wire. The other unit is an inductive amplifier, which is a pen like probe that emits an audible tone when touched to the other end of the conductor. Tone generators are most often used to locate a specific connection in a punch-down block. Using a tone generator is extremely time-consuming and it is nearly as prone to errors as the cable installation. Time-Domain Reflectometers A TDR is the primary tool used to determine the length of a copper cable and to locate the impedance variations...

Words: 360 - Pages: 2

Premium Essay

Unit 9 Assingment 1 Executive Summery to Risk Mitigation

...Legal Issues in Information Security 14 Executive Summery on Risk Mitigation Unit 9 ASSIGNMENT 1 ASSIGNMENT The protection of records that pertain to students is crucial in ensuring that their safety is not compromised. In doing so the following three things must be addressed in a very detailed and stringent manner. Confidentiality, Integrity, and Availability. These three facets of security are detrimental in the handling of information, whether it is student records or bank transaction records. C-I-A is a good practice when maintaining information and insuring the proper handling of said information. We will discuss here how C-I-A combined with FERPA will help to reduce mishandling and misuse of information, and how to deal with breach and loss as well. The confidentiality of information is vital to keep your students anonymity on line. Confidentiality means that only people with the right permissions can access and use the information. To ensure the confidentiality of the information, the location that it is stored will be secured by password protection. The principle of least privilege will be used as well in determining who has access to the information as well. Physically there will be endpoint encryption as well. All data that is stored in the servers will be encrypted as well. The integrity of the information is vital to ensure that any tampering of the information can be readily detected if it should occur. The integrity of the information is defined...

Words: 578 - Pages: 3

Premium Essay

Cool

...UNIT 1 ASSINGMENT: HOMEWORK . Describe the role of software for computers? Computer software tells the hardware what to do Identify the hardware associated with a computer? Monitor, mouse, keyboard, computer data storage, hard disk drive (HDD), system unit (graphic cards, sound cards, memory, motherboard and chips Describe how computer store data First, data is converted to simple numbers that are easy for a computer to store. Second, the numbers are recorded by hardware inside the computer. Third, the numbers are organized, moved to temporary storage and manipulated by programs, or software. Explain how programs work Computer programs work as a translator between operator and computer. This way the operator can tell the computer what to do. Difference among machine language, assembly language, and high-level languages? Machine language- is the bits that are used to control the cpu Assembly language- compilers High- level language- mathematical operations Differentiate between compilers and interpreters COMPILER- is a program that translates a high-level language program into a separate machine language program. INTERPRETER- is a program that both translates and executes the instructions in a high-level language program Identify the different types of software SHORT ANSWER 1. Why is the CPU the most important component in a computer? CPU runs the programs 2. What number does a bit that is turned on represent? What number does a bit...

Words: 356 - Pages: 2

Premium Essay

Case Study Accounts

...|[pic] | |ASSIGNMENT COVER SHEET | | | |Electronic or manual submission | | | | | |UNIT |NAME OF STUDENT (PRINT CLEARLY) |STUDENT ID. NO. | |Code: ACC1100D |SHamithri Ratanyake and Janani Jisangar |RASHD142 | |name: Accounting | |jijab32 | | | | | | | | | | |FAMILY NAME FIRST NAME | | |NAME OF LECTURER (PRINT...

Words: 678 - Pages: 3

Premium Essay

(a) with the Help of Figure, Explain Three Economics Concepts That Are Represented in the Production Possibilities Frontier.

...BBC403: MICROECONOMICS FINAL GROUP ASSINGMENT Group A1 DANIYA ILYASSOVA SAMAL KUSSANOVA MAOOTAZ TORKMAN BEB140007 YUNUSMETOV RUSLAN BEA130004 AZRIANNA ALYSSA AZMIL BEE140005 BBC403: MICROECONOMICS FINAL GROUP ASSINGMENT Question 1 (a) With the help of figure, explain three economics concepts that are represented in the production possibilities frontier. (b) The following events occur in the market for Malaysian Airline System (MAS). I. The crash of MAS flight MH17 in Ukraine. II. The wage rate paid to MAS captain and cabin workers decreases. III. The price of Air Asia tickets increase. IV. People expect the price of MAS economic class tickets to fall next school holidays. With the help of figures, explain the effect of each event on the market equilibrium of MAS service. Answer (a) With the help of figure, explain three economics concepts that are represented in the production possibilities frontier. The Production Possibilities Frontier (PPF) shows the various combinations of goods and services produced within the specified time, given available factors of production and state of technology. It is the boundary between the combinations of goods and services that can be produced and the combinations that cannot be produced. Used to explain basic economic concepts: Scarcity, Choices and Opportunity cost. Scarcity is defined as wants always exceeds limited resources...

Words: 1712 - Pages: 7

Free Essay

Assignment Brief

...ASSESSMENT FEEDBACK FRONT SHEET | |STUDENTS NAME: | |Edexcel BTEC Level 3 |Unit no & Title: 10: Caring for Children and Young People | |Health and Social Care | | |[pic] | | | |Assignment no & title: 10: Know how care is provided for looked after children and young people | | |Date Brief IV’d: | | |Marking Tutor : | | |Handout Date : | | |Submission Date : | | |Feedback Date due: ...

Words: 2095 - Pages: 9

Premium Essay

Java

... Machine Language Problem Oriented Languages Pascal ‘C’ WHY YOU SHOULD ADOPT ‘C’ LANGUAGE:  General Purpose Language.  Structured Programming Language  Flexibility towards Systems Programming.  Flexibility towards Application Programming.  Availability of large number of operators.  Has small instruction set.  Availability of extensive library function enhancing basic function.  Availability for computer of all types.  Program highly portable onto multiple platforms.  PROGRAM STUCTURE IN ‘C’     It is modular programming called function. Out of all function one should be main (). Components of each function Function Heading: Function Name. 1. List of Arguments. 2. List of Argument Declaration. 3. Compound statements. C programming 1 Fortran Naresh i Technologies SIMPLE REQUIREMENTS OF ‘C’ PROGRAM:  Each compound statement should be enclosed in a pair of Braces {}.  Braces can contain one or more elementary statements and other compound statements.  Compound statements can be nested or individual.  Each expression statement must end with a semicolon (;).  Comments should be used and can be used anywhere in the program /*…*/  APPROACHES OF LANGUAGES: *Procedural * logical * Artificial Intelligence * Object oriented. CHARACTERISTICS OF A PROGRAM  Should posses Integrity.  Should posses’ clarity.  Should posses Simplicity.  Must contain absolute efficiency.  Should be specific to Modularity...

Words: 3176 - Pages: 13

Free Essay

Guideline for Optim

...Drop Call scenarios RF issue – Interference / Dominance / Coverage – Missing Neighbours System issue BTS – Sudden “CC Disconnect” due to “DL RRC Connection Release” – Sudden drop to idle, no disconnect messaging System issue RNC – Sudden “CC Disconnect” due to “DL RRC Connection Release” KPI Definitions The KPIs to be monitored from the RAN could be: – Cell availability – Call Setup Success Rate (CSSR) – Call Drop rate – SHO/ISHO/HSPA SCC success rate – Packet Session setup/success rate (NRT, HSDPA, HSUPA) In NOLS: – RNC counter description – NetAct DB description for RNC measurements – WCDMA RAN Key Performance Indicators – Key Indicator Changes – Measurement Changes Presentation / Author / Date AMR CS Call Phases UE WBTS DRNC 1. Cell search, BCCH decoding & RACH access 2. RRC connection set-up 3. UE <--> CS-CN signalling 4. RAB set-up 5....

Words: 5805 - Pages: 24

Free Essay

Compensation Management

...East West University TERM PAPER On Compensation strategy of RAHIMAFROOZ HRM412 Submitted to: SSM Sadrul Huda Assistant Professor Department of Business Administration Submitted by: Mahbuba Chowdhury 2004-3-10-013 Sec-01 Md. Tarekul Islam 2005-2-10-161 Sec-01 Shamsun Nahar Airin 2005-2-10-231 Sec-02 Tangina Jesmin 2005-3-10-029 Sec-02 Date of Submission: 14.08.2008 Acknowledgment At first we present our due regards to the Almighty, who has provided us the brilliant opportunity to build and complete this term paper successfully with good health & sound mind. We would like to acknowledge our instructor SSM Sadrul Huda for his guidance starting to data collection and preparing for the writing; our regards and heartfelt thanks to him. Moreover, we are grateful to our administration as they provide us with the facility to use computer lab for browsing net & study room for teamwork. May be it would have been impossible to finish the report in time if we didn’t get the facility. Letter of Transmittal August 10, 2010 SSM Sadrul Huda Assistant Professor Dept of Business Administration East West University 45 Mohakhali C/A, Dhaka 1212 Dear Sir, Here is the term paper that you have asked us to prepare as a group for our course Compensation Management (HRM- 412). We have done group work for this term paper and did it as per as the rule. We are encouraged...

Words: 4510 - Pages: 19

Premium Essay

Nokia

...1. Provide a brief background of the company and the industry Background of company: History of company Nokia Company was founded in Finland in year 1865 and was a pioneer manufacturer of pulp and paper. Nokia set up a division to develop design and manufacturing capabilities in data processing, industrial automation, and communications systems in 1967 (Nokia, n.d.). By 1987, Nokia introduced their first handheld phone for GSM, the European standard for digital mobile technology (Fundinguniverse, n.d.). Nokia started to focus on mobile phones and network infrastructure. The world’s most popular phone was launched in year 2003 which is Nokia 1100 (Refer to Image 1.1). The total sales are over 250 million units, even more than iPhone and Samsung Galaxy (Allsopp, 2014). Image 1.1 Nokia 1100 Current Company Previously, Nokia smartphone was used the Symbian operating system and performing well in the global market. Since 2010, Android system and Apple’s iOS were getting into the phone market actively. Nokia made an announcement which switched to the Microsoft Window OS in February 2011 (Nokia, n.d.). After switching to Microsoft operating system, Nokia and Microsoft launched the first Windows Phone 7 which called Lumia in 26 October 2011 (Weber, 2011). The company wish to lead the smartphone market, but when compared to the previous 2 years, the sales was another declines. Nokia net income has shown a negative sign in second-quarter of 2011 to fourth-quarter of 2013, only...

Words: 4058 - Pages: 17

Free Essay

Project

...Mauritius ASSINGMENT COUNTARY: MAURITIOUS Submitted To: Prof. AMNA SHAFQAT Submitted By: HASEEB IFTIKHAR L1F07BBAM0208 ABDULLAH ISHFAQ L1F07BBAM0201 REHAN AKRAM L1F07BBAM MAURITIOUS CONTENTS * THE COUNTRY 1. LAND AND CLIMATE 4-5 2. HISTORY AND GOVERNMENT 6-10 3. ECONOMY 10-11 4. EDUCATION 11-15 5. TRANSPORTATION 16 6. HEALTH 16-18 * THE PEOPLE OF THE COUNTRY 1. POPULATION 18-19 2. LANGUAGE 19 3. RELIGION 20 4. HOLIDAYS ...

Words: 5551 - Pages: 23

Premium Essay

Best P

...racticeBriefing Notes: Best Practices in Professional Development Introduction A firm interested in increasing its employees’ skills and competencies while deepening their employees’ commitment to the organization should c onsider three interventions: the nature of the job, formal training and the mentoring/co aching process. This paper on best practices outlines the issues firms fa ce in developing programs in these three areas and disc usses which practices, program designs or methods firms should take up in response to these issues. The Job Research in firms suggests that younger professionals are drawn to two different kinds of firms: the firm with a great reputation in the field, and the smaller, often less reputable, firms that offer younger people a broader range of opportunities. They usually favor the former when they regard their first or secon d job as a way station to a longer-term career in another company or setting and want to garner the “halo” effect of having worked at a great firm. This phenomenon o c curs in other professional services as well. For example, many consultants are happy to go to M cKinsey for their first five years of employment even though the prospect of becoming a partner and then a director are quite limited, and the work itself is extremely taxing. Many firms, however, cannot rely exclusively on the limited supply of skills within the firm to create opportunities for learning and growth. Therefore, these firms must...

Words: 7272 - Pages: 30