0% found this document useful (0 votes)
77 views22 pages

Sample in Use

The document discusses quantum computing, specifically the Quantum X computer, highlighting its hardware components such as CPU, RAM, and storage, and comparing microcomputers and mainframes. It also covers the functionalities of operating systems, application software, system software, and development software, emphasizing their roles in resource management, user interaction, and software execution. Additionally, it outlines the advantages and disadvantages of mainframes and microcomputers, as well as areas for expansion in mainframe technology.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
77 views22 pages

Sample in Use

The document discusses quantum computing, specifically the Quantum X computer, highlighting its hardware components such as CPU, RAM, and storage, and comparing microcomputers and mainframes. It also covers the functionalities of operating systems, application software, system software, and development software, emphasizing their roles in resource management, user interaction, and software execution. Additionally, it outlines the advantages and disadvantages of mainframes and microcomputers, as well as areas for expansion in mainframe technology.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Task 1

Quantum computing is a branch of computer science that applies the ideas of quantum physics
to address problems that are beyond the scope of traditional computers. Quantum X, a potent
desktop quantum computer with cutting-edge hardware, software integration, and remarkable
processing power and efficiency with a customized operating system, was created using this
technology. ([Link], 2025)

The Quantum X computer stands out as a high-performance PC due to its three


main hardware components: the CPU, storage, and RAM, all of which contribute to
its exceptional capabilities.

CPU

Tasks including carrying out computations, carrying out commands, and controlling data
flow between various computer components are handled by the CPU. To make a computer
work, commands from programs and software must be followed.
The Quantum X computer has a multi-core CPU, which is sometimes referred to as the
"brain" of a computer system. This indicates that it has multiple separate processing units,
or cores, each of which is able to carry out commands independently.
As a result, the Quantum X PC has improved multitasking and faster processing because
it uses multiple cores instead of just one. ([Link], 2025)

Ram

The hardware in a computer device known as random access memory (RAM) serves as
temporary storage for the operating system (OS), applications, and any other data that is
currently being used so that the CPU may access it rapidly. In contrast to the processor
cache or other forms of memory, the RAM is frequently referred to as a computer's main
memory.

It is regarded as a component of the primary memory of a computer.


Compared to secondary storage like optical drives, solid-state drives, or hard disk drives
(HDDs), it is far faster to read from and write to. RAM is volatile, though. Data is only
stored while the computer is powered on.
([Link], 2025)

1
The Quantum X computer, which uses DDR4 (Double Data Rate 4), has faster speeds
than previous generations like DDR3, usually between 2133 MHz and 3200 MHz. It is
capable of handling demanding applications and heavy multitasking that are common in
domains like data science, software development, and gaming. DDR5 can
accommodate considerably more memory, with modules supporting up to 128 GB or
more. so as not to slow down the system.

([Link], 2025)

Storage

Digital data is often stored and retrieved using storage. Hard disk drives (HDDs), optical
disc drives, flash-based solid-state drives (SSDs), tape systems, and other media types
are examples of storage devices. One kind of storage device that stores data using flash
memory is the solid-state drive (SSD). Boot times, file transfers, and application
performance are all enhanced by the SSD's speed and instantaneous access to data.
([Link], 2025)

Micro computer

Microcomputers are compact, reasonably priced personal computers with limited


scalability and moderate processing capability. Modern computers run operating
systems like Windows or Linux and have a microprocessor, memory, and storage. They
are accessible but have less computing capacity than larger systems, which are used in
homes, offices, and companies. ([Link], 2025)

Mainframe
Mainframe computers are robust devices used by banks, governments, and businesses
for processing enormous amounts of data. They manage large storage, multi-user
support, and fast transactions while guaranteeing efficiency, security, and dependability.
([Link], 2025)

Characteristics of microcomputers and mainframes

Microcomputers and mainframes share various traits, but some notable characteristics
of each include:

2
Microcomputer

➢ Microcomputers can be used in a range of situations since they are frequently energy-
efficient. ([Link], 2025)

➢ Microcomputers are easy to operate because of their user-friendly interface.


([Link], 2025)

➢ Microcomputers are appropriate for simple computing tasks due to their limited
processing power. ([Link], 2025)

➢ Because of their modest processing capability, microcomputers are appropriate for


simple computing tasks. ([Link], 2025)

Mainframe computers

➢ Mainframes are highly scalable, allowing organizations to easily increase processing


power and storage capacity as needed and it help with the speed of their work.
([Link], 2025)

➢ Handles vast arithmetic efficiently, making it suitable for enterprise-scale operations


requiring complex calculations and data management. ([Link], 2025)

➢ Allows thousands of users to access, process, and store data simultaneously without
performance degradation, ensuring seamless enterprise functionality. ([Link],
2025)

Feature Microcomputer Mainframe


Size Compact, fits on a desk or Large, often room-sized
lap
Processing power Moderate, sufficient for incredibly high, able to
individual or small-business manage enormous volumes
tasks of data

3
Users usually accommodates a tiny can accommodate thousands
network or a single user. of users at once.

Reliability Dependent on the quality of High dependability using


the hardware, moderate systems that are fault-tolerant
reliability and redundant

Usage Applications for personal, Large-scale computer jobs in


professional, and recreational government, banking, and
use research

([Link], 2025)

Advantages of mainframe and microcomputer

Mainframes

• Security: The security of these computers is very high. As these computers are used in
banks so the security is very important. In banks, these computers are used for
managing online transactions, processing of credit and debit cards. ([Link],
2025)

• Real-time monitoring and control: If any fault comes in the system, then the
administrator of the system is notified instantly. Suppose there is hardware failure then
that hardware should be replaced to resume the work. ([Link], 2025)

Micro computers

• Stock Exchange: In the old days, stock exchange business is mostly done by phone
calls. But nowadays, every investor has the software installed on their PC by which they
can buy/sell stocks in the stock market. ([Link], 2025)

• Maintenance is easy: Most of the PC users knows how to fix the problem in the PC e.g.
if there is something wrong happen in the PC then you can simply reinstall the operating
system. Replacing hardware parts of the PC is also easy. ([Link], 2025)

Disadvantages of mainframe and micro computers

Mainframe

4
• Hardware/software is expensive: Windows and mac are not run-on mainframe
computers. These computers have custom software and hardware that are expensive for
the normal user. ([Link], 2025)

• High technical staff: For maintaining mainframe computer specialized staff is needed.
A normal computer user cannot operate and debug the system. ([Link], 2025)

Micro computers

• Weak in performance: Many PC’s have low processor that will effect computer
performance e.g. playing games and running big software is difficult on that PCs.
([Link], 2025)

• Lack of security: Hackers can hack your computer if it is connected to the internet and
your sensitive data can be stolen or loss by virus attack. ([Link], 2025)

Areas of expansion for mainframes and networking

• Security and compliance enhancing mainframe security and compliance capabilities to


protect sensitive data and meet regulatory requirements. ([Link], 2025)

• Implementing intent-based networking to simplify network management and improve


alignment with business objectives. ([Link], 2025)

Justification between mainframe and networking

➢ Mainframes are used by large organizations as their central transaction processing


system. Transaction processing in this context requires high availability, security,
performance, and responsiveness. For example, 8 Introduction to the New Mainframe.
They expect those transactions to be safe and they don’t expect to be left standing at the
checkout waiting for it to all happen. ([Link], 2025)

5
Task 1 B

Three functionalities of a modern operating system crucial for a computer like the QuantumX in
a tech start-up are device management, user interface, and networking.

Device management ensures all hardware components work together seamlessly.

Furthermore, in a start-up, this is vital as QuantumX might use specialized hardware for
development. e.g., high-end graphics cards, multiple monitors.

The user interface provides an intuitive way for employees to interact with the system, boosting
productivity. An intuitive OS allows everyone to use the QuantumX efficiently, regardless of their
technical expertise, maximizing productivity and reducing training time.

Lastly, networking capabilities allow seamless collaboration and data sharing within the start-up
and externally with clients and partners. Modern OSes provide robust networking capabilities to
ensure smooth workflow and efficient communication, for a fast-paced environment. ([Link],
2025). ([Link], 2025)

Operating system & hardware harmony

Resource Allocation: The OS manages the computer's resources, including CPU time,
memory, storage, and network bandwidth. It employs scheduling algorithms (e.g., round-robin,
priority-based) to allocate CPU time fairly among competing processes. Memory management
techniques (e.g., paging, segmentation) ensure efficient use of RAM, preventing conflicts and
maximizing application performance. ([Link], 2025).

Error Handling: The OS incorporates mechanisms to detect and handle errors arising from
hardware malfunctions or software bugs. This includes interrupt handling (responding to
hardware signals indicating problems), exception handling (managing software errors), and
system logging (recording events for debugging). A robust error-handling system is crucial for
system stability and data integrity. ([Link], 2025)

6
I/O Device Management: The OS manages communication between the CPU and peripheral
devices (printers, keyboards, hard drives, etc.). It provides a uniform interface (device drivers)
that allows applications to interact with devices without needing to know the specifics of each
device's hardware. ([Link], 2025)

Conclusion

The operating system's role in harmonizing with computer hardware is multifaceted and crucial
for system functionality and performance. Through resource allocation, error handling, I/O
device management, and driver utilization, the OS ensures efficient and reliable operation.
([Link], 2025)

7
Task 2

Application Software

The most frequently used software is application software, which is a computer software
package that performs a specific function for a user or, in some cases, for another application.
An application can be self-contained, or it can be a group of programs that run the application
for the user. ([Link], 2025)

Functionality of Application Software

These functions range from basic data entry and storage to complex processes like data
analysis, reporting, and automation of business workflows. It also allows users to create, store,
retrieve, and manage data efficiently. ([Link], 2025)

System Software

These software programs are designed to run a computer's application programs and hardware.
System software coordinates the activities and functions of the hardware and software. In
addition, it controls the operations of the computer hardware and provides an environment or
platform for all the other types of software to work in. ([Link], 2025)

Functionality of System Software

System software sits between the computer hardware and the application software. Users don't
interact directly with system software as it runs in the background, handling the basic functions
of the computer. ([Link], 2025)

Development Software

Software development refers to a set of computer science activities that are dedicated to the
process of creating, designing, deploying and supporting software. The goal of software
development is to create a product that meets user needs and business objectives in an
efficient, repeatable and secure way. ([Link], 2025)

8
Functionality of Development software

Functionality of development software is crucial and enhancing developers to focus


on continuous integration and continuous delivery, processes that use automation to deploy,
frequent updates to continually to improve software performance. ([Link], 2025)

Application software types and functionalities

➢ Microsoft Word: is a word processing tool used for creating, editing, and formatting
documents. It helps businesses produce professional reports, resumes, and
presentations efficiently. ([Link], 2025)

➢ Adobe Photoshop: A powerful image editing software for graphic design and
photography. It also enables photo manipulation, digital art creation, and professional
visual design. ([Link], 2025)

System software types and their functionalities

Windows 11

➢ A widely used operating system that manages computer resources, supports


applications, and enhances security. It also provides a graphical user interface (GUI) for
easy interaction. ([Link], 2025)

Linux

➢ A free, open-source OS used for servers, programming, and cybersecurity. It is known


for flexibility, stability, and robust command-line capabilities. ([Link], 2025)

Development software types and their functionalities

Visual Studio Code

9
➢ A lightweight but powerful code editor for programming in various languages. It also
supports debugging, syntax highlighting, and extensions for enhanced productivity.
([Link], 2025)

MySQL

➢ A database management system used for storing and retrieving data in software
applications that supports structured queries and efficient data handling. ([Link],
2025)

There are FOUR (4) main types of application software that exist (productivity,
multimedia, communication, entertainment)

Software for Productivity

The purpose of productivity software is to assist users in completing work-related tasks


effectively. Document generation, data analysis spreadsheets, presentation tools, task
management, and database management are examples of common features. Trello,
Google Workspace, and the Microsoft Office Suite (Word, Excel, and PowerPoint) are a
few examples that improve collaboration and workflow. ([Link], 2025)

Multimedia

Users can create, edit, and interact with a variety of media, such as audio, video,
animation, and photographs, using multimedia software. These programs frequently
include with features for digital art, graphic design, music production, and video editing.
Audacity for audio editing, Final Cut Pro for video creation, and Adobe Photoshop for
image editing are a few examples. ([Link], 2025)

Software for Communication

This kind of software makes it easier for people or groups to communicate across many
platforms and gadgets. It consists of email clients, video conferencing equipment,
messaging apps, and platforms for group communication. Microsoft Teams, Zoom,

10
Gmail, and Slack are a few examples that facilitate smooth remote and instantaneous
collaboration. ([Link], 2025)

Software for Entertainment

Gaming, media streaming, and virtual experiences are just a few of the leisure and
recreational activities for which entertainment software is made. Immersion material,
high-resolution streaming, and interactive gameplay are typical features. Spotify for
music enjoyment, Steam for gaming, and Netflix for streaming movies and TV series are
a few examples. ([Link], 2025)

How software is executed by the CPU and how it interface with other systems

CPU Execution:

The CPU executes software instructions in a cycle. The CPU begins the execution
process by retrieving an instruction from stored memory sources.

The instruction goes through decoding so the CPU can determine the required
operation. After decoding, the processor executes commands that entail both arithmetic
operations as well as data movement and control flow modifications. The cycle
continuously operates to enable CPUs to execute advanced tasks according to software
specifications. ([Link], 2025)

How software interface with other system

Operating system (OS) functions as a platform to connect software to hardware and regulates
resources such as memory along with storage and I/O devices.

Software utilizes RAM as temporary storage for active data in operation before it stores program
files and data on storage devices including SSD and HDD.

The program maintains a relationship with all peripherals through Input/Output Devices allowing
users to both supply instructions to the system through keyboards and mice and view content
on displays and printers.

11
Specific tasks get delegated to the Graphics Processing Unit (GPU) for performance
improvement during the processing of complex graphics such as video editing and gaming
applications and AI computations. ([Link], 2025)

B. Development tools that would be useful to a programmer

The Compiler

It first converts program source code written in a high-level C++ language into executable
machine code which CPU processors can execute. Compilers produce efficient executable files
because of their optimization process. ([Link], 2025)

The interpreter

It performs line-by-line execution of source code without generating an independent executable


program file. The interpreter rapidly executes source code but creates less running efficiency
when compared to compiled code. ([Link], 2025)

Integrated Development Environment (IDE)

Software developers utilize Integrated Development Environment (IDE) to obtain all necessary
tools needed for development from code editors to debuggers and compilers/interpreters and
build tools. IDE provides a set of development tools that improve project management efficiency
throughout the development cycle. Example: Visual Studio, Eclipse. ([Link], 2025)

The Version Control System (VCS)

It tracks changes in source code through time which enables effective development
collaboration while permitting version reverting options. VCS offers a solution to handle
extensive projects and avoid conflicts across teamwork. Example: Git. ([Link], 2025)

12
Task 3- Networking Opportunities

Compare network configurations and how it works and their differences between them

LAN (Local Area Network):

Purpose: The primary usage of LAN technology serves to unite devices within confined spaces
such as homes or offices or buildings to allow resource access and communication.

How it works: A central switch or router together with Ethernet or Wi-Fi infrastructure enables
data transfer and access to network resources between its connected devices within the
network.

Main differences: The network operates within a limited space and supports quick transfers at
affordable rates through private ownership. ([Link], 2025)

WAN (Wide Area Network):

The purpose: The purpose of WAN (Wide Area Network) is to create long-distance network
connections for extensive geographical areas (including cities countries and continents) to
support communication operations and data transfer processes.

How it works: The establishment of WAN connections functions through MPLS in addition to
VPNs and Internet technologies which link physical distances between separate LANs or
individual devices.

Main differences: A WAN manages the largest areas and moves data at reduced speeds at
greater expense through the support of third-party network operators. ([Link], 2025)

MAN (Metropolitan Area Network):

The purpose: MAN (Metropolitan Area Network) serves to unite local networks in a
metropolitan region for fast data exchange and common resource utilization.

How it works: A METALINK consists of LAN connections through fiber optics or high-speed
wireless links to achieve faster speeds together with greater bandwidth than Wide Area
Networks.

13
Main difference: This network operates through medium-size areas with medium
communication speeds and possesses moderate buying costs yet belongs to unified
management entities or consortium organizations. ([Link], 2025)

Bus Topology:

Bus Topology provides cost-effective initial implementation but struggles with scalability
disadvantages and has one vulnerable point in the network. ([Link], 2025)

Conclusion

Each network type serves a distinct purpose because it operates at three separate distance
ranges with varying performance specifications. The star topology LAN presents itself as the
most appropriate initial choice for Quantum tech. New business ventures can extend their
network infrastructure through this architecture as their customer base grows. The centralized
system makes it easier to fix any problems and perform equipment maintenance. A single
device failure within the network cannot result in complete shutdown because of the fault
tolerance measures installed. The system operates as a dependable and easy-to-manage
solution particularly for businesses of small size. ([Link], 2025)

B. Here are descriptions of four network topologies (star, tree, mesh, and hybrid) applied
to a LAN network configuration, highlighting their differences in terms of reliability,
scalability, and ease of maintenance:

Star topology: In a star topology, all devices (nodes) in the network connect to a central hub or
switch. ([Link], 2025)

Reliability: The reliability of a star topology depends heavily on the central hub or switch. If the
central device fails, the entire network goes down. ([Link], 2025)

Scalability: Star topologies are relatively easy to scale. Adding new nodes involves simply
connecting them to the central hub/switch. The capacity of the central device may eventually
become a bottleneck as the network grows. ([Link], 2025)

Ease of maintenance: Star topologies are easy to maintain. Troubleshooting is simplified


because all connections lead to the central point. It's easy to isolate faults and replace faulty
cables or nodes without disrupting the entire network. ([Link], 2025)

14
Tree topology: A tree topology combines characteristics of bus and star topologies.
([Link], 2025)

Reliability: The reliability of a tree topology depends on the hierarchy. If the root node fails, the
entire network is affected. If an intermediate node fails, it affects the segment of the network
below it. ([Link], 2025)

Scalability: Tree topologies offer good scalability. New branches (star networks) can be added
to the tree. However, as the tree grows, managing the network can become more complex.
([Link], 2025)

Ease of maintenance: Maintenance can be more complex than in a star topology due to the
hierarchical structure. ([Link], 2025)

Mesh topology: Maintenance can be more complex than in a star topology due to the
hierarchical structure. ([Link], 2025)

Reliability: Mesh topologies are highly reliable. The multiple connections provide redundancy,
so if one connection fails, data can be rerouted through another path. ([Link], 2025)

Scalability: Mesh topologies can be difficult to scale, especially full mesh topologies. The
number of connections required increases dramatically as the number of nodes increases,
making it expensive and complex to implement. ([Link], 2025)

Ease of Maintenance: Troubleshooting can be complex due to the multiple paths between
nodes. However, the redundancy makes it easier to isolate and repair faults without disrupting
the entire network. ([Link], 2025)

15
Hybrid topology: A hybrid topology combines two or more different network topologies.
([Link], 2025)

Reliability: The reliability of a hybrid topology depends on the specific topologies that are
combined. ([Link], 2025)

Scalability: Hybrid topologies can be very scalable, as they allow you to choose the best
topology for each part of the network. This flexibility allows you to optimize the network for
different needs and growth patterns. ([Link], 2025)

Ease of maintenance: Maintenance can be complex, as it requires understanding and


managing the different topologies that are combined. It also needs troubleshooting of each of
the topology characteristics. ([Link], 2025)

C. Overview of OSI: The OSI Model is a conceptual framework that standardizes


communication between devices over a network. It consists of seven layers, each handling a
specific aspect of data transmission. ([Link], 2025)

How the model OSI ensures the global standard communications

1. Layered Structure – Dividing communication into seven distinct layers allows different
technologies to operate independently while still working together. ([Link],
2025)

2. Interoperability – Devices from various vendors can communicate seamlessly by


following the standardized rules defined by the OSI model. ([Link], 2025)

3. Troubleshooting and Security – With a clear separation of functions, network issues


can be diagnosed more easily, and security measures can be enforced at multiple
levels. ([Link], 2025)

16
4. Supports Multiple Protocols – The OSI model accommodates numerous networking
protocols, including TCP/IP, enabling wide-scale compatibility. ([Link], 2025)

5. Universal Adoption – While modern networks primarily use TCP/IP, the OSI model
remains a foundational reference for designing, maintaining, and analyzing networks
globally. ([Link], 2025)

Why it matters to quantum x

Since QuantumX systems come pre-loaded with a custom operating system, ensuring
consistent communication across a network is crucial. Adhering to OSI principles allows
QuantumX devices to seamlessly integrate into existing infrastructures, making
interoperability more efficient, reducing network errors, and maintaining data security.
([Link], 2025)

17
Task 4- Future computing

Definition of distributed computing

Distributed computing involves breaking down a complex problem into smaller tasks that are
executed concurrently on multiple computers (nodes) connected via a network. ([Link],
2025)

Why it will help quantum x

Quantum Tech can harness the combined processing power of multiple machines to tackle
computationally intensive tasks, such as simulations, data analysis, or complex calculations,
more quickly than a single machine could. ([Link], 2025)

Client-Server Model: In this model, a central server provides resources (data, processing
power, services) to multiple clients. Clients request services from the server, and the server
responds to these requests. This model is suitable for applications where centralized control
and management are important. Examples include web servers, database servers, and file
servers. ([Link], 2025)

Peer-to-Peer Model: In this model, all computers (peers) in the network have equal capabilities
and responsibilities. Each peer can act as both a client and a server, sharing resources and
communicating directly with other peers. This model is suitable for applications where
decentralization and resource sharing are important. Examples include file-sharing networks,
blockchain networks, and some collaborative applications. ([Link], 2025)

B. Definition of quantum

Quantum computing is a type of computation that harnesses the principles of quantum


mechanics to solve complex problems that are beyond the capabilities of classical computers.
([Link], 2025)

Three advantages of quantum computing over conventional computing are speed,


parallel computing, and optimization. ([Link], 2025)

Speed: Quantum computers can perform certain calculations much faster than classical
computers. This speed advantage arises from the ability of quantum bits (qubits) to exist in

18
multiple states simultaneously (superposition) and to interact with each other in ways that are
impossible for classical bits. For example, Shor's algorithm, a quantum algorithm, can factor
large numbers exponentially faster than the best-known classical algorithms, which has
significant implications for cryptography. ([Link], 2025)

Parallel Computing: Quantum computers inherently perform parallel computations. Because


qubits can exist in a superposition of states, a quantum computer can explore many potential
solutions simultaneously. This is in contrast to classical computers, which process information
sequentially. This parallelism allows quantum computers to tackle problems with a vast number
of possibilities more efficiently. ([Link], 2025)

Optimization: Quantum algorithms are particularly well-suited for optimization problems. These
are problems where the goal is to find the best solution from a large set of possible solutions.
Quantum annealing, for example, is a quantum computing technique used to find the minimum
energy state of a system, which can be applied to various optimization problems in fields like
finance, logistics, and machine learning. ([Link], 2025)

Why quantum computer is suited to crypto graph

Quantum computing's unique capabilities in performing complex calculations and exploiting


quantum phenomena like superposition and entanglement make it exceptionally well-suited for
both breaking existing cryptographic systems and developing new, quantum-resistant ones.
([Link], 2025)

1. Shor's Algorithm and Factoring: Quantum computers, leveraging Shor's algorithm,


can efficiently factor large numbers. This poses a direct threat to widely used public-key
cryptosystems like RSA, which rely on the computational difficulty of factoring large
numbers into their prime factors. ([Link], 2025)

2. Grover's Algorithm and Symmetric-Key Cryptography: Grover's algorithm provides a


quadratic speedup for searching unsorted databases. While it doesn't break symmetric-
key algorithms like AES outright, it reduces the key space that needs to be searched,
effectively halving the key length's security. For example, a 128-bit key would offer
approximately the security of a 64-bit key against a quantum computer using Grover's
algorithm. ([Link], 2025)

19
3. Quantum Key Distribution (QKD): Quantum computing enables the development of
QKD protocols, such as BB84, which use the principles of quantum mechanics to
securely distribute encryption keys. Any attempt to eavesdrop on the key exchange
introduces detectable disturbances, guaranteeing secure communication.
([Link], 2025)

Summary

Quantum computing leverages quantum mechanics to achieve significant advantages over


classical computing. The speed advantage comes from superposition and quantum algorithms
like Shor's. Parallel computing is inherent in the nature of qubits, allowing for simultaneous
exploration of solutions. ([Link], 2025)

20
References

[Link], 2025. /[Link]/net-admin/network-topologies-


advantages-disadvantages/. [Online]
Available at: [Link]
disadvantages/
[Accessed 21 february 2025].

[Link], 2025. /[Link]/courses/DSC516/notes/slides2-


[Link]. [Online]
Available at: [Link]
[Accessed 3 march 2025].

[Link], 2025. [Link]/software-systems-types/. [Online]


Available at: [Link]
[Accessed 20 february 2025].

[Link], 2025. [Link]/6-factors-when-choosing-a-network-topology/.


[Online]
Available at: [Link]
[Accessed 20 february 2025].

Ncc, 2020. Ncc. In: Ncc, ed. Ncc. London: Ncc, pp. 1-23.

[Link], 2025. [Link]/quantum-parallelism/.


[Online]
Available at: [Link]
[Accessed 12 march 2025].

[Link], 2025. [Link]/the-impact-of-operating-systems-on-


networking-and-communication/. [Online]
Available at: [Link]
communication/
[Accessed 21 february 2025].

[Link], 2025. [Link]. [Online]


Available at: [Link]
operating-system-works-in-harmony-with-the-computer
[Accessed 15 april 2025].

21
[Link], 2025. [Link]. [Online]
Available at: [Link]
[Accessed 15 April 2025].

[Link], 2025. [Link]. [Online]


Available at: [Link]
[Accessed 15 April 2025].

22

You might also like