CARC103 Broad Analysis Of Computer Architecture: Content Analysis Assessment 3 Answer

pages Pages: 4word Words: 890

Question :


COURSE:Bachelor of Information Technology
Computer Architecture
Unit Code:
Type of Assessment:
Assessment 3 – Content Analysis (Reflective Journal)
3,000 words

Unit Learning Outcomes addressed:
Upon successful completion of this unit students should be able to:
  1. Describe the elements of IT including hardware, software, communications and networks
  2. Describe and evaluate concepts and elements of operating systems
  3. Describe and illustrate appropriate use of data storage and manipulation
  4. Describe and illustrate the use of operating systems in device management, process management, scheduling and dispatching
  5. Describe the major issues in enterprise integration platform selection
Assessment Task:
Students are required to analyse the weekly lecture material of weeks 1 to 11 and create concise content analysis summaries of the theoretical concepts contained in the course lecture slides.
Total Mark:
50 marks
50% of the unit total marks


Students are required to analyse the weekly lecture material of weeks 1 to 11 and create concise content analysis summaries of the theoretical concepts contained in the course lecture slides.

Where the lab content or information contained in technical articles from the Internet or books helps to fully describe the lecture slide content, discussion of such theoretical articles or discussion of the lab material should be included in the content analysis.

The document structure is as follows (3000 Words):

  1. Title Page
  2. Introduction (100 words)
  3. Background (100 words)
  4. Content analysis (reflective journals) for each week from 1 to 11 (2750 words; 250 words per week):
    1. Theoretical Discussion
      1. Important topics covered
      2. Definitions
  5. Interpretations of the contents
    1. What are the most important/useful/relevant information about the content?
  6. Outcome
    1. What have I learned from this?
  7. Conclusion (50 words)

Your report must include:

  • At least five references, out of which, three references must be from academic resources.
  • Harvard Australian referencing for any sources you use.
  • Refer to the Academic Learning Skills student guide on Referencing.
Show More

Answer :


Computer architecture in software engineering is a system of principles and procedures that define different types of online' functionality, organization, and implementation. It is defined by other design as specifying the functionality and programming representation of the system, if not an ongoing clinical one. Software project contains details of rule production design, microcontroller layout, system architecture, and other principles being applied.

Computer architecture is associated with managing a computer network efficiency, efficiency, expense, and consistency. To demonstrate the equilibrium of these competing factors, it is necessary to be using the example of instruction set design. More complicated implementations allow users to create more storage-efficient programs, because certain higher-level concepts (such as the x86 Loop instruction) can be encoded by a standalone system. Longer and more complicated commands, though, take much longer for the machine to decipher and could be more costly to fully execute. When instructions behave in unexpected ways, the additional competition of a large processor architecture also provides space for inaccuracy.

Background Information

Computer architectures reflect the way of interconnectedness for the hardware part of the computer system, as well as the displayed mode of transmission and processing of information. In order to accelerate the flow of data, numerous computer design architectures have been created, resulting in increased data analysis. With an accomplishing a specific and input / output system on each hand of the CPU, the proposed framework has the CPU at the heart.

Computer architecture is the arrangement of the elements that make up a computer network and the interpretation or context of its function-guiding processes. Even so, the development of a group of processors is governed by the modern computer and defines the functional interface addressing computer languages and their implementations. The report sets the combination of organizational departments as well as the structure of their interconnectedness which the structure is constructed.

Content Analysis

Week 1(Information Systems)

Theoretical Discussion

In order for all recent investigations to concentrate on another area, information systems are considered a key area and the companies compete to recognize latest tech, services to help this area. The data which has been analyzed as the essence of such structures is the driver component of this area. The styles of IS and the manner of function should be identified by highly efficient accomplishment.

Information systems (IS) is an interconnected hardware , software, and peoples environment that primarily functions for the intent of collecting data for useful information by implementing a set of data collection process, thus extracting knowledge . data through IS processes and clearly stating the distinction between data and information. The data is raw resources and the software is the subsequent production information.

Interpretations of the contents

Transaction-processing systems

In comparison to a process particular process and file management, a transaction process system and transaction processing are also compared, in which several transactions are all conducted simultaneously. The system means a user's interaction, while comes with the following doesn't really involve information dissemination. The effects of each payment are not available immediately throughout batch systems. In fact, there is a delay in organizing, processing and eventually implementing the many requests. There is no pause in transaction processing and the outcomes for every payment are immediately accessible. Errors can happen mostly during holding time for batch processing. While problems can occur in the billing process, they are rare and accepted, but do not require the whole process to be close down.

Information technology administration

The principles of information technology, systems engineering, business analytics, computer programming, digital electrical engineering and the use of information technology are often confused. MIS is a group of information systems that are unified. In effort to expand valuation, MIS is more focused that use leading technologies. MIS is much more organizational. Machine learning addresses the technologies that could be used in MIS with a much more technology-focused approach. Product-focused electromagnetic computer science primarily includes the design overdue processor networks.Business analytics system is a subclass of MIS, and the work predominantly of an IT department, that may include MIS, refers to IT management.


In commercial enterprise, the 3 main responsibilities of information systems are:

  • Operations: In assistance of activities, a business analysis performs different functions, such as payroll, employee record storage, preparation and processing of business records and storage of checking accounts. The management system will plan processes and operations if the company operates a manufacturing process while keeping good documents.
  • Controls: A central role of information systems is tracking and managing employee activities. In particular, this applies to money transfers in which leadership has a tendency to consider fraud and corruption. The safety of the information system is crucial in this position, as management depend on it to monitor payments received from customers and suppliers' invoices.
  • Decisions: Managers should get from the structure all the data they have around business operations. Full, accurate numbers means that organizational decisions are more effective. More sophisticated capabilities can go beyond delivering information to operating situations.

Week 2 (Computers: The Machines Behind Computing and Data Communication: Delivering Information Anywhere and Anytime)

Theoretical Discussion

A computer is a device that can constantly be directed through computer science to perform chains of arithmetic and logical processes. Desktop systems have the capacity; set consists, to follow generalized sets of operations. Such programmers allow computers to carry out an incredibly large range of responsibilities. A computer system, along with the hardware, operating system (main software), and auxiliary infrastructure necessary or used for "full" activity, may be referred to it as a "full" computer. For a collection of linked and cooperative computers, particularly a computer network or computer cluster, this term may also be used.

The term data refers to information provided by the individuals producing using the data in whichever form is agreed upon. Data communication is the transmission of data through some cable or wireless medium, including a wired cable, among two devices. Information transmission should be aware of a communication infrastructure consisting up of a collection of hardware (physical equipment) and software (programs) in order for data communications to occur. Four fundamental performance depends on the efficacy of a data communication system: transmission, precision, timeliness and jitter.

Interpretations of the contents

A computer is described as a machine which accepts information as input, processes information without human help using documented procedures, and survey participation. The directions, also called a programme, are step-by - step instructions for a particular work to be completed, recorded in a language understood by the computer.

By means of data transmission circuits, a data communication device can collect data from the environment and then transmit the processed results to remote locations. The figure offers a wider overview of networks for data communication. The numerous data communication techniques that are currently in common use have steadily evolved, either to improve existing data communication techniques or to replace them with better options and features.

data communication


Efficiency relies on multiple essential elements of data communication.

  • Delivery: Data must be sent to the right location in the right order.
  • Accuracy: Data must be correctly delivered.
  • Timeliness: The information must be supplied in a reasonable time. Data supplied late is pointless.
  • Jitter: The inconsistent lag in the start date of the packet creates irregular consistency.

Week 3 (Database Systems, Data Warehouses, and Data Marts)

Theoretical Discussion

An information auction is a framework / connects sequence that used collect client-facing data that is precise to data warehouse climates. The information auction is a subcategory of the information granary and is generally focused on a particular line or squad of firms. Although data warehouses have a company-wide reach, the data in data marts belongs towards a single agency. The holder of its data mart, including all hardware, software and data, in some deployments, is defined since each unit or business computer. This allows each division to separate their information use, exploitation and development. This product line control would not necessarily apply for shared measurements such as client, product, etc., in many other implementations where conformed dimensions are used.

Interpretations of the contents

Justifications why a data mart is built:

  • Free access to regularly relevant information
  • Generates a collective opinion by a set of folks
  • Enhances response time for end-users
  • Production ease
  • Cheaper margin than a complete data warehouse implementation
  • Potential users are identified more explicitly than in a complete data warehouse.
  • Contains only business critical data and is less cluttered.


Storage server is a large collection of related data gathered from multiple outlets, whereas Data Mart is a data warehouse subtype only. In a business , Data Warehouse reflects on all divisions, while structured data reflects on a specific division. The Data Warehouse 's design process is complicated, whereas it is easy to design the Data Mart process. Data Warehouse requires a long time for data handling, while Data Mart takes a short time for data handling.

The storage server is 100 GB to 1 TB+ in size, while the structured data is less than 100 GB in size. The cloud service deployment process takes 1 month to 1 year, although Data Mart requires a few months to finish the development process.

Week 4 (Protecting Information Resources)

Theoretical Discussion

A person or organization has many ways to protect itself from malware , phishing, hackers, and other types of unwanted theft of information. Keeping the operating system and computer information systems up to date is one of the simplest methods. Ignoring an upgrade request is often easy, but upgrades often include substantial lines of code intended to cover up bugs and backdoors in the current code. Hackers also try to manipulate the reluctance of users to upgrade their apps.

Interpretations of the contents

In the case of a catastrophic device failure, fault-tolerant devices integrate hardware and software to maximise reliability. In order to safeguard data, fault-tolerant systems combine uninterruptible power supplies to ensure a constant supply of power to a system with a variety of data backup options. As an additional protection against potential theft or fire damage affecting a business, backed-up data information can optionally be stored off-site.

In the event of a blackout or power loss, the Uninterruptible Power Supply (UPS) provides uninterrupted electric power. Not only does an uninterruptible power supply maintain a computer running after a power failure, it gives a system administrator time to fully power down all processes, rather than losing vital information suddenly.

Backing up data can take several forms: specialised hard drives store data on several discs, making it easier to recover missing data should it be missing. Nevertheless, certain company owners have to physically back up their critical data to hard drives. In the event of a fire or break-in, these external drives may be transported off site.


To protect our information following steps maybe taken:

  • Download and apply biometric steps to cable locks.
  • Place classified data only when required,.
  • Usage PINs.
  • Encode documents.
  • Enable processors for protection.

Week 5 (Emerging Trends, Technologies, and Application)

Theoretical Discussion

The world is changing extremely rapidly, which means that when something else may become outdated, something becomes fashionable. One might argue That these modifications take place at the pace of a noise with the IT industry. Centered on the advances in technology in 2019 (IoT origins and rapid growth, AI heyday, introduction of block chain, etc.), we can foresee what patterns are and would be during 2020.

Interpretations of the contents

Block chain

Based on LinkedIn analysis, Block chain has taken the foremost position between rising skill tendencies in 2020. Having originated as a technology for storing crypto currency transactions along with crypto currency, block chain has developed into something far larger and has become a growth.

Cloud computing

In recent years, also on increase, cloud computing model has also been and appears to be one of the biggest developments in software growth, as there is much more cloud computing data processing, economical for businesses, rather than sustaining their own Those facilities. Cloud computing also include processing, and also file sharing, communication, the implementation of new technologies, and normal work applications.

Artificial intelligence

In the past decade, machine learning is among the greatest in the world. developments now tech industry and In 2020, it does not seem to lose momentum in. In order to render videos and photographs as realistic as possible, AI would be useful for computer graphics. Another trend in artificial intelligence, which will be reasonably common in 2020, is deeply false. In addition, it has the capacity to make users' experiences more tailored.


Those are the following big IoT patterns for 2020:

  • Big Data would be closely linked to it.
  • In the coming years, Information technology, a computer framework that helps make more relevant information computational and storage where it is really required, will be closely linked to the Internet of Things. Edge computing makes data processing quicker and more cost-effective on the Internet.
  • With the help of block chain-like technology, it is very likely that machine learning will become highly automated over the next 10 years.

Week 6 (Enterprise Systems)

Theoretical Discussion

An application framework is an inter - departmental integrated system that manages and integrates core business processes and systems and needs to prepare the resources of the firm, also known as an enterprise resource planning system. With the assistance of enterprise resource planning programmes, knowledge can spread seamlessly through the organization. It is also possible to integrate various business processes, including distribution, manufacturing, growth, logistics, and human resources, into company-wide business processes.

Interpretations of the contents

The greatest benefit of a management structure is that it makes it much easier for executives and people who work. These identified factors routine business operations in order to help customers more effective. For eg, these systems can send sales emails, process employee compensation or even place automated inventory orders.

At the very same time, for quick access, such structures effectively organize critical details in a situation, regardless of origin. This means the employees has exposure to the appropriate skills to do their employment, even if we work from home or do field work.


One of the benefits of enterprise systems is that in a single location they make it easy for the employees to access the data they need. Although this allows the operational workers to communicate more in their day-to-day jobs, managers benefit from it even more. That's because these systems make it easy to review key details directly from an online dashboard about inventory levels, project status, financial reporting and employee performance indicators immediately.

Week 7 (E-Commerce)

Theoretical Discussion

E-commerce is the process of electronically buying or selling products, either online or over the telephone. In electronic commerce, technology such as mobile commerce, electronic money transfer, supply chain management , Internet marketing , online transaction processing, electronic data interchange, inventory management systems and automated data collection systems are used. E-commerce, in turn, is powered by the technological advances of the semiconductor industry and is the electronics industry's largest field.

Interpretations of the contents

For e-commerce, there's many four key types of prototypes that can reflect just about exchange between clients and businesses.

  • Business to Consumer (B2C): When a business makes a good or service to a particular consumer (for example, you buy shoes from an online store).
  • Business to Business (B2B): When a business sells a product or service to some other business (e.g. when a company purchases apps-as-a-service for the other companies for using).
  • Market to Consumer (C2C): Whenever a buyer offers a consumer a good or service (for instance, on eBay, you offer your antique clothes to the other consumer).
  • Consumer to Business (C2B): When a customer sells their specific items and/or services to a business or firm (e.g. an influencer offers exposure to their online audience in exchange for a fee, or a photographer licences their photo for a business to use).


The following benefits are provided by e-commerce to consumers:

  • Practicality. E-commerce will happen seven days a week, 24 hours a day.
  • Heightened range. Many shops sell a broader variety of goods online than their brick-and - mortar counterparts do. And several stores that only operate online may sell exclusive merchandise to customers that are not available elsewhere.

Week 8 (Building Successful Information Systems)

Theoretical Discussion

A vital component of business performance today is information systems. Sadly, many organizations do not even understand what an information system is, where, where and how it should be implemented, or how it should be implemented. The effectiveness of implementing it into the business. We are continuing, as such, To see projects' horror stores of implementation run amuck-going over Or information systems that are never completely implemented over time and over budget, requiring "work-around" by workers to get stuff.

Interpretations of the contents

Due to greater recognition and complexity of expected use, information technology (IS) continues to become more and more complex. the CIO and his team are becoming more and more aware of the issues surrounding the efficacy of such software projects. In addition, with the increasing perception that the introduction of progressive and ambitious software projects within companies cannot inherently improve organizational efficiency and contribute to a competitive advantage that cannot be overtaken by rivals, it becomes more important for IT / Its Service Providers. There is a greater awareness of the critical measures for the effectiveness of data systems so that problems can be addressed at the community level.


The problems nearby the efficacy of this kind of ventures for software are becoming even more important As details, to the Project manager and his staff Technology (IS) continues to be even more multifaceted because of better acceptance or complexity of deliberate use. Moreover, with the increasing perception that introduction of progressive and ambitious projects in Tech within companies may not inherently increase organizational competitiveness and contribute to a competitive advantage that cannot be overtaken by rivals, it becomes more important for IT / Its Service Providers. There is a better understanding of the essential steps for the efficacy of information systems so that issues can be resolved at the grassroots level.

Week 9 (Management Support Systems)

Theoretical Discussion

A computer-based information system is a management information system ( MIS). that generates routine reports and also allows managers to view current and historical information online, primarily at mid- and first-line levels.

Interpretations of the contents

Researchers regard MIS as a broad term that encompasses all of the organizational structures that serve the organization’s functional areas. Kenneth Laudon and Jane Price Laudon, however, tend to use computer-based information systems (CBIS) as the umbrella term for all information systems and to view information management systems as those directly dedicated to functions at the management level.

Week 10 (Intelligent Information Systems)

Theoretical Discussion

A number of industries, including transport and logistics, defense, and manufacturing, are being revolutionized by intelligent systems. They help to increase the efficiency, consistency and versatility of these systems in terms of resources. Intelligent systems, Machine learning, encryption, big data, integrated CPUs, edge computing, mobile communication and visual communication, speech recognition, are complex and use a broad variety of technologies.

Interpretations of the contents

Intelligent systems are an approach to decision making that is computer-based. In particular, they are used in autonomous transportation systems and communicate with the globe in a manner that lets people get safely from point A to point B.

Week 11 (The Internet, Intranets, and Extranets)

Theoretical Discussion

An embedded system is a computer system run by a large wide variety of organizations that is separated from the worldwide web but uses digital technology.

An extranet is an intranet that is obtainable or likely shared by more than one organization by certain individuals from outside the business.

Interpretations of the contents

In-house networks have been used by many organizations for decades to link their computers and make applications available to their employees. Such networks are also costly and can be difficult to use. Its networking software became widely accessible and, typically, free when the internet became popular. Therefore, it made sense to use the same programmer for internal use by organizations.


The primary concern of this assignment is to have a broad analysis of computer architecture with particular focus on the layout of computers with lowered processor architecture, having learners apply the fundamentals and compromises behind its development of new computer systems, such as cost / performance or pace / versatility. This assignment lays a framework for narrowing the gap among coding and the internal implications of the computer.