Download as pdf or txt
Download as pdf or txt
You are on page 1of 60

Computer Architecture - CSE4001 “Operating Principles of the Computer Architecture”

Sineth Anuhas
CL/HDCSE/CMU/119/84
FEEDBACK FORM

INTERNATIONAL COLLEGE OF BUSINESS & TECHNOLOGY

Module: Computer Architecture - CSE4001

Student: K.G.S.Anuhas

Assessor:MS.Thilini

Assignment: Operating Principles of the Computer Architecture

Strong features of your work:

Areas for improvement:

Marks Awarded:
Acknowledgement

I would want to thank Ms. Thilini, our computer architecture lecturer, from the bottom of my heart for helping
me through this course. I couldn't have finished the assignment effectively without her help.

I would want to sincerely thank Cardiff Metropolitan University and ICBT University for giving me the tools
I needed to study and for giving me this amazing chance.

Lastly, I want to express my gratitude to my friends and family for their inspiration and assistance. They
helped me celebrate my successes and helped me get past obstacles. Without their assistance, I would not
have succeeded.
Table of Contents

Table of Contents

1. Number system .................................................................................................................. 1-2

a) Hexadecimal ...................................................................................................... 1

Question 1 .................................................................................................................................... 1

Question 2 .................................................................................................................................... 1

b) Decimal & Binary Convert ................................................................................ 1

Question 1 .................................................................................................................................... 1

Question 2 .................................................................................................................................... 1

c) 8-bit 2's complement representation .................................................................. 1

Question 1 .................................................................................................................................... 1

Question 2 .................................................................................................................................... 1

d) 12-bit 2's complement representation ................................................................ 1

Question 1 .................................................................................................................................... 2

Question 2 .................................................................................................................................... 2

e) 16-bit 2's complement representation ................................................................ 2

Question 1 .................................................................................................................................... 2

Question 2 .................................................................................................................................... 2

2. arithmetic operations using the 2’s complement ............................................................ 2-3

a) Question[Sum] ................................................................................................... 2

b) Question[Sum] ................................................................................................... 3

c) Question[Multiplication] ................................................................................... 3

d) Question[Multiplication] ................................................................................... 3

e) Question [Division]............................................................................................ 3

3. microprocessor ..................................................................................................................4-5

a) common components ......................................................................................... 4


b) function .............................................................................................................. 4

c) how the processor components make the computer faster................................. 5

4. Operating System .............................................................................................................. 5-6

a) What is an Operating System............................................................................. 5

b) Operating System types ..................................................................................... 5

c) Hardware Protections ......................................................................................... 6

5. control system ....................................................................................................................... 7

a) Truth table .......................................................................................................... 7

1. Gryffindor private educational institute in Kandy ...................................................... 8-23

1) computer systems .......................................................................................... 8-13

2) user requirement and software requirements ..............................................13-18

3) system design specifications .......................................................................18-21

4) assessment ................................................................................................... 21-23


List Of Tables And Figures

Table 1.0 Comuter Systems…………………………………………………………..8-13


Part 01
Task 01
1.
a)
i. 7348
734 = 111 011 100 = 1 1101 1100 = 1 D C

ii. 63548
= 6 3 5 4 = 110 011 101 100 = 1100 1110 1100 = C E C
b)
i. 11101110110
= (1 × 2¹⁰) + (1 × 2⁹) + (1 × 2⁸) + (0 × 2⁷) + (1 × 2⁶) + (1 × 2⁵) + (1 × 2⁴) +
(0 × 2³) + (1 × 2²) + (1 × 2¹) + (0 × 2⁰)
= 191010
111011101102 = 191010

ii. 1100110012 = 40910

c) i. . -79
7910 = 010011112

-79 = 10110000

8-bit 2's complement = 10110001

ii. 127

12710 = 011111112

8-bit 2's complement = 01111111

d)

i. 1024

102410 = 100000000002

12-bit 2's complement = 010000000000


ii. -128

12810 = 100000002

=000010000000

=111101111111

=111110000000

12-bit 2's complement = 111110000000

e)

i. -16384

1638410 = 1000000000000002

= 0100000000000000

=1011111111111111

=1100000000000000

16-bit 2's complement = 1100000000000000

ii. 8192

819210 = 100000000000002

= 0010000000000000

16-bit 2's complement is 0010000000000000

2) a) Sum of -9 and 25
Binary representation of 9 = 00001001
Invert the bits= 11110110
Add 1 to the inverted bits= 11110111

Binary representation of 25= 00011001


binary addition :-

11110111 + 00011001 = 100100100


Result: -34

b) Sum of -20 and -15


Binary representation of 20 = 00010100
Invert the bits= 11101011
Add 1 to the inverted bits= 11101100
-15 in 8-bit 2's complement form =
• Binary representation of 15 = 00001111
• Invert the bits= 11110000
• Add 1 to the inverted bits = 11110001

binary addition:

11101100 + 11110001 =111111101


Result: -35

C) Multiplication of -3 by -8
3×8=24
Since both numbers are negative, the result is positive.
Result: 24

d) Multiplication of -12 by -5

12×5=60
Since both numbers are negative, the result is positive.
Result: 60

e) Division of -40 by -4
40÷4=
Since both numbers are negative, the result is positive.
Result: 10
3). a)

➢ Control Unit,I/O Units,Arithmetic Logic Unit (ALU),Registers,Cache

b)

The primary function of a microprocessor is as the central processing unit (CPU) of a computer system. It is
responsible for executing instructions, performing mathematical and logical operations and controlling the flow of
data in the computer. Below mentioned functions are the key functions of a microprocessor

➢ Execute instruction: -

Program instructions are received from the computer by the memory. The microprocessor retrieves each of these
instructions one at a time from memory locations in order to execute them.

➢ Control flow: -

By executing unconditional and conditional instructions,The microprocessor controls the flow of instructions.

➢ Manage input/output (I/O):-

Peripheral devices that can interface with the processor include mouse, keyboards, displays, and storage devices.
Data is transferred between the processor and external devices through input/output instructions.

➢ Clock Comparison: -

To coordinate its work, the microprocessor is connected to the system clock. The clock generator generates
regular pulses, each pulse corresponding to one clock cycle. The clock speed of a microprocessor determines
how quickly it can execute instructions.

c)

➢ Arithmetic Logic Unit (ALU)

The ALU performs arithmetic and logical operations. Fast ALU Contributes to overall computing speed by
ensuring processor completion. Logical comparisons and mathematical calculations are faster.

➢ Registers

Registers are small, fast storages within the processor that temporarily store data during execution. Having
enough registers reduces the slow memory access. Efficient use of registers minimizes data transfer between
different storage tiers, increasing overall processing speed.
➢ I/O Unit
The I/O Unit is the section of a computer system that manages communications between external components,
including the CPU, peripherals, and storage devices. To enhance user experience and system performance, the
I/O module is necessary. Though important, experience is not directly related to processing speed. Consequently,
the I/O module aids in increasing the computer's speed.
➢ Clock Speed

Clock speed is the speed at which the microprocessor executes instructions and is measured in hertz (Hz) or
gigahertz (GHz). A higher clock Hz means the processor can do more instructions in a given of time. Increasing
the clock Hz usually results in speedest calculations and improved overall performance.

4.a)
A software application known as an operating system (OS) is bridge between computer hardware it’s users. It
offers an interface and a range of services to make managing hardware resources and running application
software easier. It acts as a translator, converting instructions from human to a language that computers can
understand. Because the OS is essential to the entire operation of the system.
b)
There are many different kinds of operating systems out there. These are a few different types of operating
systems.
Batch OS
This type of operating system and the computer are not directly related. The batch operating system is based on
the first-come, first-served principle.
Network OS
This operating system is also known as a tightly paired system. since users of different network operating
systems are conversant with one other's network topologies. Run on servers, this operating system regulates
network activities.
Mobile OS
As its name implies, this operating system is designed for tablets and smartphones. This operating system allows
a mobile device to run a wide range of applications.
Multitasking OS
Operating system for time sharing. This is another application for operations. Multitasking system. Because there
is a limited time to complete each task. All of them are gradually being completed. Access to this operating
system is possible for more users. Tasks completed by a particular user.

c) The operating system's hardware security mechanisms are designed to ensure the security of the computer's
hardware components. These mechanisms prevent unauthorized access, interference, or misuse of hardware
resources by various processes or users.
Here are the main hardware security features
CPU protection
CPU Protection Detecting the CPU does more than just prevent it from being monitored. But this prevents other
processes from running. The processor is controlled by the time it takes to execute these instructions, not by their
duration. To solve this problem, CPU processing time is limited to 1 minute. A signal indicating that the whole
thing is stopping, so the processor cannot be held for any time.

Memory protection
Modern operating systems use memory segmentation to divide a program's address space into different
components such as code, data, and stack. To prevent unwanted access and modification of storage areas, each
partition has unique read, write, and execute permissions.
I/O protection
Operating system I/O security ensures secure and efficient communication with hardware devices. Data transfer
is optimized through buffering and caching, and system security is enhanced by techniques such as port access
control and well-designed device drivers. I/O security protects against both unauthorized access and tampering
with input and output operations in general.

Hardware security is critical to the overall security and stability of the operating system. They form the basis for
providing access control, process isolation, and preventing unintentional interference with critical system
resources. Operating systems use these hardware-level features to implement effective security policies and
ensure the reliability of the computing environment.

5.
a)
Cooling – Y
Dehumidifier U
Lighting – L
Irrigation – I
A B C D Y U L I
0 0 0 0 0 0 0 0
0 0 0 1 0 1 1 0
0 0 1 0 0 0 0 1
0 0 1 1 1 1 0 1
0 1 0 0 0 0 0 0
0 1 0 1 1 1 1 0
0 1 1 0 0 0 0 1
0 1 1 1 1 1 0 1
1 0 0 0 0 0 0 0
1 0 0 1 0 1 1 0
1 0 1 0 0 0 0 1
1 0 1 1 1 1 0 1
1 1 0 0 0 0 0 0
1 1 0 1 1 1 1 0
1 1 1 0 0 0 0 1
1 1 1 1 1 1 0 1

Part 2

1. Branch Manager • PC:


• CPU: Intel Core i5 or
i7
• Motherboard:
Compatible with the
selected CPU
• GPU: Integrated
graphics would be
sufficient
• Storage: 256GB SSD
• Memory: 8GB RAM

•Laptop:
• CPU: Intel Core i5 or
i7
• GPU: Integrated
graphics
• Storage: 512GB SSD
• Memory: 16GB
RAM
Recommendation
PC
a. Dell OptiPlex 7000 Series
i. CPU: Intel Core i5 or
i7
ii. GPU: Integrated
graphics
iii. Storage: 256GB SSD
iv. Memory: 8GB RAM

Justification: The branch manager needs a


reliable desktop for regular office tasks And
this pc with these specs are best for it.

Laptop
a.Dell XPS 13 or XPS 15
i. CPU: Intel Core i5 or
i7
ii. GPU: Integrated
graphics
iii. Storage: 512GB SSD
iv. Memory: 16GB

Justification The branch manager needs a


powerful laptop for on-the-go work and
meetings. This is the best option for it.
2. Lecturers • CPU: AMD Ryzen 5 or Intel
Core i5
• Motherboard: Compatible
with the selected CPU
• GPU: Integrated graphics
• Storage: 512GB SSD
• Memory: 16GB RAM

Recommendation

• HP EliteDesk 800 G6
• CPU: AMD Ryzen 5
or Intel Core i5
• GPU: Integrated
graphics
• Storage: 512GB SSD
• Memory: 16GB
Justification: Lecturers may need a slightly
more powerful system for tasks like
preparing presentations and handling
documents.

3. Front Office • CPU: Intel Core i5


• Motherboard: Compatible
with the selected CPU
• GPU: Integrated graphics
• Storage: 256GB SSD
• Memory: 8GB RAM

Recommendation

• Lenovo ThinkCentre M90n


• CPU: Intel Core i5
• GPU: Integrated
graphics
• Storage: 256GB SSD
• Memory: 8GB RAM
Justification: Front office staff generally
require standard office machines for tasks
such as document handling and
communication.
4. Counselors • CPU: Intel Core i5
• Motherboard: Compatible
with the selected CPU
• GPU: Integrated graphics
• Storage: 256GB SSD
• Memory: 8GB RAM

Recommendation

• HP ProDesk 400 G6
• CPU: Intel Core i5
• GPU: Integrated graphics
• Storage: 256GB SSD
• Memory: 8GB RAM
Justification: Similar to front office staff,
counselors can work efficiently with
standard office machines.

5. IT Administrators • Servers:
• CPU: Dual Intel
Xeon processors
• Motherboard: Server-
grade motherboard
• GPU: Not needed
(server environment)
• Storage: RAID-
configured HDDs or
SSDs for redundancy
(total capacity based
on needs)
• Memory: 32GB to
64GB ECC RAM
• IT Administrator PCs:
• CPU: Intel Core i7 or
AMD Ryzen 7
• Motherboard:
Compatible with the
selected CPU
• GPU: Dedicated GPU
for management tasks
• Storage: 512GB SSD
• Memory: 16GB
RAM
Recommendation

1. IT Administrators (Servers):
Dell PowerEdge R740
• CPU: Dual Intel Xeon processors
• GPU: Not applicable
• Storage: RAID-configured HDDs or
SSDs (as needed)
• Memory: 32GB to 64GB ECC RAm

2. IT Administrators (PC):

Lenovo ThinkStation P340


• CPU: Intel Core i7 or AMD Ryzen 7
• GPU: Dedicated GPU for
management tasks
• Storage: 512GB SSD
• Memory: 16GB RAM
Justification: Servers need to be robust with
redundancy features, while IT
administrators need powerful PCs for
network management and troubleshooting.

6. Administration • CPU: Intel Core i5


• Motherboard: Compatible
with the selected CPU
• GPU: Integrated graphics
• Storage: 256GB SSD
• Memory: 8GB RAM

Recommendation

HP ProDesk 600 G6
• CPU: Intel Core i5
• GPU: Integrated graphics
• Storage: 256GB SSD
• Memory: 8GB RAM

Justification: Standard office machines are


suitable for administrative tasks.

7.Library • CPU: Intel Core i5


• Motherboard: Compatible
with the selected CPU
• GPU: Integrated graphics
• Storage: 512GB SSD
• Memory: 8GB RAM

Recommendation

Lenovo ThinkCentre M80q


• CPU: Intel Core i7 or AMD Ryzen 7
• GPU: Dedicated GPU
• Storage: 512GB SSD
• Memory: 16GB RAM

Justification: Lecture halls may need


slightly more powerful configurations for
multimedia presentations and educational
software
7. Lecture Halls (05): • CPU: Intel Core i7 or AMD
Ryzen 7
• Motherboard: Compatible
with the selected CPU
• GPU: Dedicated GPU
• Storage: 512GB SSD
• Memory: 16GB RAM

Recommendation

Lenovo ThinkCentre M80q


• CPU: Intel Core i7 or AMD Ryzen 7
• GPU: Dedicated GPU
• Storage: 512GB SSD
• Memory: 16GB RAM

Justification: Lecture halls may need


slightly more powerful configurations for
multimedia presentations and educational
software.
8. Recreational Area (1 PC for •
CPU: Intel Core i5
Guests): • Motherboard: Compatible
with the selected CPU
• GPU: Integrated graphics
• Storage: 256GB SSD
• Memory: 8GB RAM
Recommendation

Dell Inspiron 3000 Series


• CPU: Intel Core i5
• GPU: Integrated graphics
• Storage: 256GB SSD
• Memory: 8GB RAM

Justification: A standard PC configuration is


sufficient for general guest use.

Table 1.0

2.
1. Branch Manager:

Roles and Responsibilities:

• Oversee daily operations.

• Manage staff and resources.

• Monitor financials and performance.

Software Requirements:

• Office Suite: Microsoft Office or Google Workspace for document creation and collaboration.

• Financial Management: QuickBooks or similar for financial tracking.


• Communication: Email platform for internal and external communication.

2. Lecturers:

Roles and Responsibilities:

• Develop and deliver educational content.

• Grade assignments and assessments.

• Collaborate with students and other faculty members.

Software Requirements:

• Learning Management System (LMS): Moodle, Canvas, or Blackboard for course management.

• Presentation Tools: Microsoft PowerPoint or Google Slides for lectures.

• Collaboration: Microsoft Teams or Zoom for virtual meetings.

3. Front Office:

Roles and Responsibilities:

• Manage front desk activities.

• Handle inquiries and provide information.

• Schedule appointments and manage calendars.

Software Requirements:

• Customer Relationship Management (CRM): Salesforce or HubSpot for contact management.

• Scheduling: Microsoft Outlook or Google Calendar for appointment scheduling.

• Document Management: SharePoint or Google Drive for document storage.


4. Counselors:

Roles and Responsibilities:

• Provide counseling services to students.

• Maintain student records and progress reports.

• Organize workshops and seminars.

Software Requirements:

• Counseling Software: Theranest or SimplePractice for counseling management.

• Student Information System (SIS): PowerSchool or Ellucian for student records.

• Event Management: Eventbrite or Cvent for workshop organization.

5. IT Administrators:

Roles and Responsibilities:

• Manage network infrastructure.

• Provide technical support.

• Ensure data security and system integrity.

Software Requirements:

• Network Monitoring: SolarWinds or Nagios for network monitoring.

• Help Desk: ServiceNow or Jira Service Desk for ticketing and support.

• Security Tools: Antivirus software, firewall, and intrusion detection systems.


6. Administration:

Roles and Responsibilities:

• Handle administrative tasks.

• Process paperwork and documentation.

• Manage office supplies and facilities.

Software Requirements:

• Document Management: Microsoft SharePoint or Google Drive.

• Administrative Tools: Microsoft Office or similar for administrative tasks.

7. Library:

Roles and Responsibilities:

• Manage library resources.

• Assist students with research.

• Maintain a catalog of books and materials.

Software Requirements:

• Library Management System: Koha or Evergreen for library automation.

• Research Databases: Access to online research databases and catalogs.


8. Lecture Halls:

Roles and Responsibilities:

• Facilitate lectures and presentations.

• Provide multimedia support for educational content.

• Ensure technical functionality of lecture halls.

Software Requirements:

• Multimedia Tools: Adobe Creative Cloud or similar for multimedia content.

• Collaboration Platforms: Microsoft Teams or Zoom for virtual lectures.

9. Recreational Area (Guest PC):

Roles and Responsibilities:

• Provide access to PCs for guests.

• Monitor and maintain guest PC usage.

Software Requirements:

• Guest Account Management: Windows Guest Mode or similar for restricted access.

• Usage Monitoring: Activity logging tools for monitoring PC usage.


This research gives a framework for understanding the software needs of each department inside Gryffindor.
Software selections should take into account financial constraints, organisational preferences, and the scalability
needed for future expansion. Furthermore, it is imperative to integrate collaborative technologies to enhance
interdepartmental communication and cooperation.

(Skidmore, n.d.)

3.
1. Branch Manager:

Hardware Requirements:

• Input Devices: Standard keyboard and mouse.

• Output Devices: High-resolution monitor for data analysis and reporting.

• Other Hardware: Webcam and microphone for virtual meetings.

2. Lecturers:

Hardware Requirements:

• Input Devices: Multimedia presentation remote, interactive pen tablet for annotations.

• Output Devices: High-resolution projector for lecture halls.

• Other Hardware: Document cameras for displaying physical documents.

3. Front Office:
Hardware Requirements:

• Input Devices: Standard keyboard, mouse, barcode scanner for efficient document handling.

• Output Devices: Multi-function printers for document dissemination.

• Other Hardware: Visitor management system for guest check-ins.

4. Counselors:

Hardware Requirements:

• Input Devices: Standard keyboard, mouse, webcam for virtual counseling.

• Output Devices: High-resolution monitor for reviewing student records.

• Other Hardware: White noise machines for privacy during in-person counseling.

5. IT Administrators:

Hardware Requirements:

• Input Devices: High-quality mechanical keyboard, gaming mouse for precision.

• Output Devices: Dual monitors for efficient multitasking.

• Other Hardware: Network monitoring tools, server racks for physical infrastructure.

6. Administration:
Hardware Requirements:

• Input Devices: Standard keyboard, mouse, document scanners.

• Output Devices: Laser printers for administrative document printing.

• Other Hardware: Shredder for secure document disposal.

7. Library:

Hardware Requirements:

• Input Devices: RFID scanners for book check-ins and check-outs.

• Output Devices: Large electronic displays for showcasing library announcements.

• Other Hardware: Self-checkout kiosks.

8. Lecture Halls:

Hardware Requirements:

• Input Devices: Wireless microphones, gesture-based interactive boards.

• Output Devices: Large projection screens, surround sound systems.

• Other Hardware: Lecture capture systems for recording sessions.


9. Recreational Area (Guest PC):

Hardware Requirements:

• Input Devices: Standard keyboard, mouse, simple touchscreens.

• Output Devices: Basic monitors for web browsing.

• Other Hardware: Secure kiosk enclosures.

These standards take into account input, output, and other hardware devices required for user requirements,
while also taking into account the individual needs of each functional area. The actual hardware options could
change depending on user preferences, technology developments, and financial constraints. In order to ensure
smooth operation across departments, the system design should also take software needs and integration into
account.

(University of Massachusetts Amherts, n.d.)

4.
Strengths

• Tailored to User Roles:

The design considers the unique needs of each functional area, ensuring that hardware and software align with
specific job roles.
• Efficiency and Productivity:

Hardware specifications, such as dual monitors for IT administrators and interactive boards for lecture halls,
enhance efficiency and productivity.
• Integration of Modern Technology:

The inclusion of RFID scanners, document cameras, and interactive boards reflects a commitment to leveraging
modern technology for improved functionality.
• Scalability:

The design allows for scalability, accommodating growth by including features like server racks and considering
the potential expansion of lecture halls.
Weaknesses
• Diversity in Hardware Brands:

The design mentions specific brands for hardware, which might limit flexibility and increase costs. Consider
diversifying hardware brands to explore cost-effective alternatives.
• Security Considerations:

Security measures for sensitive areas like the IT infrastructure and counseling offices should be explicitly
outlined. Consider implementing biometric authentication or secure access controls.
• Sustainability:

The design could benefit from a sustainability perspective. Consider energy-efficient hardware, like monitors
with low power consumption, to reduce the organization's environmental impact.
Recommendations and Enhancements:
• Standardization:

Standardize hardware components where possible to streamline maintenance and reduce compatibility issues.
This could include standardizing on a particular brand for desktops, laptops, and monitors.
• Security Enhancements:

Implement advanced security measures such as encryption for sensitive data, regular security audits, and
employee training on cybersecurity best practices.
• Remote Work Considerations:

Given the evolving work landscape, enhance the design to support remote work. This may involve cloud-based
solutions, secure VPN access, and collaboration tools that facilitate remote communication.
• Green IT Practices:

Integrate Green IT practices by selecting energy-efficient hardware, implementing power management features,
and promoting responsible e-waste disposal.
• User Training Programs:

Develop comprehensive training programs for users, especially in areas like IT administration and library
management, ensuring they maximize the potential of the implemented technologies.
• Regular Maintenance Schedule:

Establish a regular maintenance schedule for hardware and software updates. This ensures that all systems
remain secure, efficient, and compatible with the latest technologies.
• User Feedback Mechanism:

Implement a user feedback mechanism to gather insights into the effectiveness of the implemented systems. This
could inform future upgrades and adjustments based on real-world usage.
• Collaboration Platforms:

Enhance collaboration platforms for better communication across departments. This could involve integrating
instant messaging tools, collaborative document editing, and project management platforms.
• Data Backup and Recovery:

Strengthen data backup and recovery processes to ensure minimal data loss in case of hardware failures or
unforeseen events. Consider cloud-based backup solutions for added reliability.
• Accessibility Features:

Ensure that all systems are accessible to users with disabilities. Implement accessibility features in software and
consider ergonomic hardware options.

Gryffindor Institute can optimise its IT infrastructure for increased efficiency, security, and flexibility to future
technological breakthroughs by implementing these suggestions and changes. Maintaining up-to-date knowledge
of industry best practices and periodically reevaluating the state of technology can also help the organization's IT
projects succeed.
Turnitin Report
C architecture.docx
by Sineth Anuhas Kithulgoda Gamage

Submission date: 12-Jan-2024 07:18PM (UTC+0000)


Submission ID: 221790210
File name: 133997_Sineth_Anuhas_Kithulgoda_Gamage_C_architecture_2072900_604375771.docx (65.1K)
Word count: 3209
Character count: 19147

C architecture.docx
by Sineth Anuhas Kithulgoda Gamage
Submission date: 12-Jan-2024 07:18PM (UTC+0000)

Submission ID: 221790210

File name: 133997_Sineth_Anuhas_Kithulgoda_Gamage_C_architecture_2072900_604375771.docx (65.1K)

Word count: 3209

Character count: 19147


1
1
1

2
1

7
10

5
1
1

1
1

1
1

1
1

1
1

1
1

1
1
1

1
1

1
1
1

1
1
1
8
1

9
C architecture.docx
ORIGINALITY REPORT

27 % 5% 1% 25%
SIMILARITY INDEX INTERNET SOURCES PUBLICATIONS STUDENT PAPERS

PRIMARY SOURCES

to
1 University
of
Su
bmit Greenwich
ted
to Student
Univ Paper
ersit
y of
Wal
es
Instit stage-edx-
5 ute,
Card
prospectus.ed
x.org
iff
Internet
Student
Source
Paper

Merton
2 Submitted to
6 Taylor
Goodrich.
Nelson and
Colne
"CONCRE College
TE
INTERPRE Student
TATIONS Paper
OF
DIRECTED
NUMBERS
",
School idoc.pub
7 Science Internet
and Source
Mathemati
cs, 1934
Publicatio
blog.infrasp
n
8 eak.com
Internet
cyberlenin Source
3 ka.org
Internet
Source

Submitted
4
23% <1%
1% <1%
<1%

<1% <1%
<1%
topdigital.agency
Internet Source
9

answersdrive.com
Internet Source
10
Exclude quotes Off Exclude bibliography Off

0|Page
1|Page

You might also like