Sample in Use
Sample in Use
Quantum computing is a branch of computer science that applies the ideas of quantum physics
to address problems that are beyond the scope of traditional computers. Quantum X, a potent
desktop quantum computer with cutting-edge hardware, software integration, and remarkable
processing power and efficiency with a customized operating system, was created using this
technology. ([Link], 2025)
CPU
Tasks including carrying out computations, carrying out commands, and controlling data
flow between various computer components are handled by the CPU. To make a computer
work, commands from programs and software must be followed.
The Quantum X computer has a multi-core CPU, which is sometimes referred to as the
"brain" of a computer system. This indicates that it has multiple separate processing units,
or cores, each of which is able to carry out commands independently.
As a result, the Quantum X PC has improved multitasking and faster processing because
it uses multiple cores instead of just one. ([Link], 2025)
Ram
The hardware in a computer device known as random access memory (RAM) serves as
temporary storage for the operating system (OS), applications, and any other data that is
currently being used so that the CPU may access it rapidly. In contrast to the processor
cache or other forms of memory, the RAM is frequently referred to as a computer's main
memory.
1
The Quantum X computer, which uses DDR4 (Double Data Rate 4), has faster speeds
than previous generations like DDR3, usually between 2133 MHz and 3200 MHz. It is
capable of handling demanding applications and heavy multitasking that are common in
domains like data science, software development, and gaming. DDR5 can
accommodate considerably more memory, with modules supporting up to 128 GB or
more. so as not to slow down the system.
([Link], 2025)
Storage
Digital data is often stored and retrieved using storage. Hard disk drives (HDDs), optical
disc drives, flash-based solid-state drives (SSDs), tape systems, and other media types
are examples of storage devices. One kind of storage device that stores data using flash
memory is the solid-state drive (SSD). Boot times, file transfers, and application
performance are all enhanced by the SSD's speed and instantaneous access to data.
([Link], 2025)
Micro computer
Mainframe
Mainframe computers are robust devices used by banks, governments, and businesses
for processing enormous amounts of data. They manage large storage, multi-user
support, and fast transactions while guaranteeing efficiency, security, and dependability.
([Link], 2025)
Microcomputers and mainframes share various traits, but some notable characteristics
of each include:
2
Microcomputer
➢ Microcomputers can be used in a range of situations since they are frequently energy-
efficient. ([Link], 2025)
➢ Microcomputers are appropriate for simple computing tasks due to their limited
processing power. ([Link], 2025)
Mainframe computers
➢ Allows thousands of users to access, process, and store data simultaneously without
performance degradation, ensuring seamless enterprise functionality. ([Link],
2025)
3
Users usually accommodates a tiny can accommodate thousands
network or a single user. of users at once.
([Link], 2025)
Mainframes
• Security: The security of these computers is very high. As these computers are used in
banks so the security is very important. In banks, these computers are used for
managing online transactions, processing of credit and debit cards. ([Link],
2025)
• Real-time monitoring and control: If any fault comes in the system, then the
administrator of the system is notified instantly. Suppose there is hardware failure then
that hardware should be replaced to resume the work. ([Link], 2025)
Micro computers
• Stock Exchange: In the old days, stock exchange business is mostly done by phone
calls. But nowadays, every investor has the software installed on their PC by which they
can buy/sell stocks in the stock market. ([Link], 2025)
• Maintenance is easy: Most of the PC users knows how to fix the problem in the PC e.g.
if there is something wrong happen in the PC then you can simply reinstall the operating
system. Replacing hardware parts of the PC is also easy. ([Link], 2025)
Mainframe
4
• Hardware/software is expensive: Windows and mac are not run-on mainframe
computers. These computers have custom software and hardware that are expensive for
the normal user. ([Link], 2025)
• High technical staff: For maintaining mainframe computer specialized staff is needed.
A normal computer user cannot operate and debug the system. ([Link], 2025)
Micro computers
• Weak in performance: Many PC’s have low processor that will effect computer
performance e.g. playing games and running big software is difficult on that PCs.
([Link], 2025)
• Lack of security: Hackers can hack your computer if it is connected to the internet and
your sensitive data can be stolen or loss by virus attack. ([Link], 2025)
5
Task 1 B
Three functionalities of a modern operating system crucial for a computer like the QuantumX in
a tech start-up are device management, user interface, and networking.
Furthermore, in a start-up, this is vital as QuantumX might use specialized hardware for
development. e.g., high-end graphics cards, multiple monitors.
The user interface provides an intuitive way for employees to interact with the system, boosting
productivity. An intuitive OS allows everyone to use the QuantumX efficiently, regardless of their
technical expertise, maximizing productivity and reducing training time.
Lastly, networking capabilities allow seamless collaboration and data sharing within the start-up
and externally with clients and partners. Modern OSes provide robust networking capabilities to
ensure smooth workflow and efficient communication, for a fast-paced environment. ([Link],
2025). ([Link], 2025)
Resource Allocation: The OS manages the computer's resources, including CPU time,
memory, storage, and network bandwidth. It employs scheduling algorithms (e.g., round-robin,
priority-based) to allocate CPU time fairly among competing processes. Memory management
techniques (e.g., paging, segmentation) ensure efficient use of RAM, preventing conflicts and
maximizing application performance. ([Link], 2025).
Error Handling: The OS incorporates mechanisms to detect and handle errors arising from
hardware malfunctions or software bugs. This includes interrupt handling (responding to
hardware signals indicating problems), exception handling (managing software errors), and
system logging (recording events for debugging). A robust error-handling system is crucial for
system stability and data integrity. ([Link], 2025)
6
I/O Device Management: The OS manages communication between the CPU and peripheral
devices (printers, keyboards, hard drives, etc.). It provides a uniform interface (device drivers)
that allows applications to interact with devices without needing to know the specifics of each
device's hardware. ([Link], 2025)
Conclusion
The operating system's role in harmonizing with computer hardware is multifaceted and crucial
for system functionality and performance. Through resource allocation, error handling, I/O
device management, and driver utilization, the OS ensures efficient and reliable operation.
([Link], 2025)
7
Task 2
Application Software
The most frequently used software is application software, which is a computer software
package that performs a specific function for a user or, in some cases, for another application.
An application can be self-contained, or it can be a group of programs that run the application
for the user. ([Link], 2025)
These functions range from basic data entry and storage to complex processes like data
analysis, reporting, and automation of business workflows. It also allows users to create, store,
retrieve, and manage data efficiently. ([Link], 2025)
System Software
These software programs are designed to run a computer's application programs and hardware.
System software coordinates the activities and functions of the hardware and software. In
addition, it controls the operations of the computer hardware and provides an environment or
platform for all the other types of software to work in. ([Link], 2025)
System software sits between the computer hardware and the application software. Users don't
interact directly with system software as it runs in the background, handling the basic functions
of the computer. ([Link], 2025)
Development Software
Software development refers to a set of computer science activities that are dedicated to the
process of creating, designing, deploying and supporting software. The goal of software
development is to create a product that meets user needs and business objectives in an
efficient, repeatable and secure way. ([Link], 2025)
8
Functionality of Development software
➢ Microsoft Word: is a word processing tool used for creating, editing, and formatting
documents. It helps businesses produce professional reports, resumes, and
presentations efficiently. ([Link], 2025)
➢ Adobe Photoshop: A powerful image editing software for graphic design and
photography. It also enables photo manipulation, digital art creation, and professional
visual design. ([Link], 2025)
Windows 11
Linux
9
➢ A lightweight but powerful code editor for programming in various languages. It also
supports debugging, syntax highlighting, and extensions for enhanced productivity.
([Link], 2025)
MySQL
➢ A database management system used for storing and retrieving data in software
applications that supports structured queries and efficient data handling. ([Link],
2025)
There are FOUR (4) main types of application software that exist (productivity,
multimedia, communication, entertainment)
Multimedia
Users can create, edit, and interact with a variety of media, such as audio, video,
animation, and photographs, using multimedia software. These programs frequently
include with features for digital art, graphic design, music production, and video editing.
Audacity for audio editing, Final Cut Pro for video creation, and Adobe Photoshop for
image editing are a few examples. ([Link], 2025)
This kind of software makes it easier for people or groups to communicate across many
platforms and gadgets. It consists of email clients, video conferencing equipment,
messaging apps, and platforms for group communication. Microsoft Teams, Zoom,
10
Gmail, and Slack are a few examples that facilitate smooth remote and instantaneous
collaboration. ([Link], 2025)
Gaming, media streaming, and virtual experiences are just a few of the leisure and
recreational activities for which entertainment software is made. Immersion material,
high-resolution streaming, and interactive gameplay are typical features. Spotify for
music enjoyment, Steam for gaming, and Netflix for streaming movies and TV series are
a few examples. ([Link], 2025)
How software is executed by the CPU and how it interface with other systems
CPU Execution:
The CPU executes software instructions in a cycle. The CPU begins the execution
process by retrieving an instruction from stored memory sources.
The instruction goes through decoding so the CPU can determine the required
operation. After decoding, the processor executes commands that entail both arithmetic
operations as well as data movement and control flow modifications. The cycle
continuously operates to enable CPUs to execute advanced tasks according to software
specifications. ([Link], 2025)
Operating system (OS) functions as a platform to connect software to hardware and regulates
resources such as memory along with storage and I/O devices.
Software utilizes RAM as temporary storage for active data in operation before it stores program
files and data on storage devices including SSD and HDD.
The program maintains a relationship with all peripherals through Input/Output Devices allowing
users to both supply instructions to the system through keyboards and mice and view content
on displays and printers.
11
Specific tasks get delegated to the Graphics Processing Unit (GPU) for performance
improvement during the processing of complex graphics such as video editing and gaming
applications and AI computations. ([Link], 2025)
The Compiler
It first converts program source code written in a high-level C++ language into executable
machine code which CPU processors can execute. Compilers produce efficient executable files
because of their optimization process. ([Link], 2025)
The interpreter
Software developers utilize Integrated Development Environment (IDE) to obtain all necessary
tools needed for development from code editors to debuggers and compilers/interpreters and
build tools. IDE provides a set of development tools that improve project management efficiency
throughout the development cycle. Example: Visual Studio, Eclipse. ([Link], 2025)
It tracks changes in source code through time which enables effective development
collaboration while permitting version reverting options. VCS offers a solution to handle
extensive projects and avoid conflicts across teamwork. Example: Git. ([Link], 2025)
12
Task 3- Networking Opportunities
Compare network configurations and how it works and their differences between them
Purpose: The primary usage of LAN technology serves to unite devices within confined spaces
such as homes or offices or buildings to allow resource access and communication.
How it works: A central switch or router together with Ethernet or Wi-Fi infrastructure enables
data transfer and access to network resources between its connected devices within the
network.
Main differences: The network operates within a limited space and supports quick transfers at
affordable rates through private ownership. ([Link], 2025)
The purpose: The purpose of WAN (Wide Area Network) is to create long-distance network
connections for extensive geographical areas (including cities countries and continents) to
support communication operations and data transfer processes.
How it works: The establishment of WAN connections functions through MPLS in addition to
VPNs and Internet technologies which link physical distances between separate LANs or
individual devices.
Main differences: A WAN manages the largest areas and moves data at reduced speeds at
greater expense through the support of third-party network operators. ([Link], 2025)
The purpose: MAN (Metropolitan Area Network) serves to unite local networks in a
metropolitan region for fast data exchange and common resource utilization.
How it works: A METALINK consists of LAN connections through fiber optics or high-speed
wireless links to achieve faster speeds together with greater bandwidth than Wide Area
Networks.
13
Main difference: This network operates through medium-size areas with medium
communication speeds and possesses moderate buying costs yet belongs to unified
management entities or consortium organizations. ([Link], 2025)
Bus Topology:
Bus Topology provides cost-effective initial implementation but struggles with scalability
disadvantages and has one vulnerable point in the network. ([Link], 2025)
Conclusion
Each network type serves a distinct purpose because it operates at three separate distance
ranges with varying performance specifications. The star topology LAN presents itself as the
most appropriate initial choice for Quantum tech. New business ventures can extend their
network infrastructure through this architecture as their customer base grows. The centralized
system makes it easier to fix any problems and perform equipment maintenance. A single
device failure within the network cannot result in complete shutdown because of the fault
tolerance measures installed. The system operates as a dependable and easy-to-manage
solution particularly for businesses of small size. ([Link], 2025)
B. Here are descriptions of four network topologies (star, tree, mesh, and hybrid) applied
to a LAN network configuration, highlighting their differences in terms of reliability,
scalability, and ease of maintenance:
Star topology: In a star topology, all devices (nodes) in the network connect to a central hub or
switch. ([Link], 2025)
Reliability: The reliability of a star topology depends heavily on the central hub or switch. If the
central device fails, the entire network goes down. ([Link], 2025)
Scalability: Star topologies are relatively easy to scale. Adding new nodes involves simply
connecting them to the central hub/switch. The capacity of the central device may eventually
become a bottleneck as the network grows. ([Link], 2025)
14
Tree topology: A tree topology combines characteristics of bus and star topologies.
([Link], 2025)
Reliability: The reliability of a tree topology depends on the hierarchy. If the root node fails, the
entire network is affected. If an intermediate node fails, it affects the segment of the network
below it. ([Link], 2025)
Scalability: Tree topologies offer good scalability. New branches (star networks) can be added
to the tree. However, as the tree grows, managing the network can become more complex.
([Link], 2025)
Ease of maintenance: Maintenance can be more complex than in a star topology due to the
hierarchical structure. ([Link], 2025)
Mesh topology: Maintenance can be more complex than in a star topology due to the
hierarchical structure. ([Link], 2025)
Reliability: Mesh topologies are highly reliable. The multiple connections provide redundancy,
so if one connection fails, data can be rerouted through another path. ([Link], 2025)
Scalability: Mesh topologies can be difficult to scale, especially full mesh topologies. The
number of connections required increases dramatically as the number of nodes increases,
making it expensive and complex to implement. ([Link], 2025)
Ease of Maintenance: Troubleshooting can be complex due to the multiple paths between
nodes. However, the redundancy makes it easier to isolate and repair faults without disrupting
the entire network. ([Link], 2025)
15
Hybrid topology: A hybrid topology combines two or more different network topologies.
([Link], 2025)
Reliability: The reliability of a hybrid topology depends on the specific topologies that are
combined. ([Link], 2025)
Scalability: Hybrid topologies can be very scalable, as they allow you to choose the best
topology for each part of the network. This flexibility allows you to optimize the network for
different needs and growth patterns. ([Link], 2025)
1. Layered Structure – Dividing communication into seven distinct layers allows different
technologies to operate independently while still working together. ([Link],
2025)
16
4. Supports Multiple Protocols – The OSI model accommodates numerous networking
protocols, including TCP/IP, enabling wide-scale compatibility. ([Link], 2025)
5. Universal Adoption – While modern networks primarily use TCP/IP, the OSI model
remains a foundational reference for designing, maintaining, and analyzing networks
globally. ([Link], 2025)
Since QuantumX systems come pre-loaded with a custom operating system, ensuring
consistent communication across a network is crucial. Adhering to OSI principles allows
QuantumX devices to seamlessly integrate into existing infrastructures, making
interoperability more efficient, reducing network errors, and maintaining data security.
([Link], 2025)
17
Task 4- Future computing
Distributed computing involves breaking down a complex problem into smaller tasks that are
executed concurrently on multiple computers (nodes) connected via a network. ([Link],
2025)
Quantum Tech can harness the combined processing power of multiple machines to tackle
computationally intensive tasks, such as simulations, data analysis, or complex calculations,
more quickly than a single machine could. ([Link], 2025)
Client-Server Model: In this model, a central server provides resources (data, processing
power, services) to multiple clients. Clients request services from the server, and the server
responds to these requests. This model is suitable for applications where centralized control
and management are important. Examples include web servers, database servers, and file
servers. ([Link], 2025)
Peer-to-Peer Model: In this model, all computers (peers) in the network have equal capabilities
and responsibilities. Each peer can act as both a client and a server, sharing resources and
communicating directly with other peers. This model is suitable for applications where
decentralization and resource sharing are important. Examples include file-sharing networks,
blockchain networks, and some collaborative applications. ([Link], 2025)
B. Definition of quantum
Speed: Quantum computers can perform certain calculations much faster than classical
computers. This speed advantage arises from the ability of quantum bits (qubits) to exist in
18
multiple states simultaneously (superposition) and to interact with each other in ways that are
impossible for classical bits. For example, Shor's algorithm, a quantum algorithm, can factor
large numbers exponentially faster than the best-known classical algorithms, which has
significant implications for cryptography. ([Link], 2025)
Optimization: Quantum algorithms are particularly well-suited for optimization problems. These
are problems where the goal is to find the best solution from a large set of possible solutions.
Quantum annealing, for example, is a quantum computing technique used to find the minimum
energy state of a system, which can be applied to various optimization problems in fields like
finance, logistics, and machine learning. ([Link], 2025)
19
3. Quantum Key Distribution (QKD): Quantum computing enables the development of
QKD protocols, such as BB84, which use the principles of quantum mechanics to
securely distribute encryption keys. Any attempt to eavesdrop on the key exchange
introduces detectable disturbances, guaranteeing secure communication.
([Link], 2025)
Summary
20
References
Ncc, 2020. Ncc. In: Ncc, ed. Ncc. London: Ncc, pp. 1-23.
21
[Link], 2025. [Link]. [Online]
Available at: [Link]
[Accessed 15 April 2025].
22