Write My Paper Button

WhatsApp Widget

ASU Computing Environments Basic Security Implications Discussion

Share this post on:

ASU Computing Environments Basic Security Implications Discussion – Description

Course Reflection
For this final course discussion post, take a moment to review and reflect on the five-course outcomes for Advanced Computer Architecture:

Evaluate the hardware components of modern computing environments and their individual functions.
Review the basic security implications of modern computing environments.
Review foundational cybersecurity concepts and the federal, state and local cyber defense partners/structures.
Research the applicable laws and policies related to cyber defense and describe the major components of each pertaining to the storage and transmission of data.
Examine responsibilities related to the handling of data as it pertains to legal, ethical and/or agency auditing issues, and how the type of dispute affects the evidence used to resolve it.

Please respond to the following:

Identify the three to five core lessons you learned from taking this course.
Describe how you plan to integrate these core lessons into your daily life.
Determine the methods you will use to retain and revisit this information.

Please respond to at least one other post:
Post that you have to reply from Necosa
Hello Everyone,
My takeaways from this class are Computer architecture is a science or a set of rules stating how computer software standards and hardware instructions and technology infrastructure are joined together and interact to make a computer work. It defines how computer systems, platforms and programs operate. In other words, computer architecture defines system’s functionality, design, and performance. Creating a computer’s architecture requires IT professionals to first determine the needs of users, technology limitations and process requirements. 
I learned about Instruction Set Architecture (ISA), RISC and CISC architecture, Computer Organization. 
The Instruction Set Architecture (ISA) is the part of the processor that is visible to the programmer or compiler writer. The ISA serves as the boundary between software and hardware. A reduced instruction set computer is a computer that only uses simple commands that can be divided into several instructions that achieve low-level operation within a single CLK cycle, as its name proposes Reduced Instruction Set. The term CISC stands for ‘’Complex Instruction Set Computer’’. It is a CPU design plan based on single commands, which are skilled in executing multi-step operations. Computer organization refers to the operational units and their interconnection that realize the architecture specification.
I am a computer forensic analyst I am learning everyday so this class is just adding the knowledge to what I do everyday. This is a great class for someone who in the IT field to help them brush up on their knowledge.

The post ASU Computing Environments Basic Security Implications Discussion first appeared on .

Share this post on:

Affordable and Dependable Platform for Your Academic Assignments

X