Operating system

The control of the serialization of memory management is difficult in a “Virtual Memory” and especially when “Virtual Machines” are included. Discuss how an operating system manages “computer memory in both single and multiple OS instances”. Add discussions about how some of the problems have been addressing including respective advantages and disadvantages.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Data warehouse problem

Questions are in .dox file attached. 

create a data mart solution in SQL for the dimension model that you propose.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

ethical hacking

 

Sometimes you need to see how an application works and behaves on a booted suspect’s computer. For this project, write a short guideline of two to three pages on how to use VirtualBox to start and run applications from a suspect’s disk image. Your research should start with the VirtualBox user guide at www.virtualbox.org. For more information, search for terms such as “VirtualBox convert RAW image to VDI” or “convert raw to vmdk.”

 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Editorial thinking

What does the author mean by editorial thinking?  Also, this week there was a video of Andy Kirk (2015) noting the key concepts of data visualization thinking.  Pick one major concept from the video and note what was said and your thoughts about the topic. 

Checklist

Min 2 references

APA formatting

180 words

plagiarism report

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Variables, IF/THEN/ELSE, Loops

Instructions:

You will complete this assignment in Python 3.x. Make sure you have downloaded the software and it is installed correctly. You will download it from this site

You will code the following and submit it in one file. Use the information in the Content area for this week to assist you. Save it as a python file (.py), and upload it into the Assignments area.

1. Include comment block on line1 of your code with the following information:

“”

“””

Your Name

Course Name, Section (example: ENTD200 B002 Spr18)

Instructor name

Week #

Date completed

“””

2. Create 2 Python programs based on week 5 Assignment flowcharts and requirements. You must use loops, do not use function calls.

 

Here is a SAMPLE run for a simple calculator to add to numbers (this is for reference only)

Simple Calculator

What is your name –> Supa

Enter first number –> 7

Enter second number –> 5

Supa, The total of 7.0 + 5.0 = 12.0

Do you want another calculation ? (y/n) y

What is your name –> Lupa

Enter first number –> 21

Enter second number –> 11

Lupa, The total of 21.0 + 11.0 = 32.0

Do you want another calculation ? (y/n) n

Thanks for using my calculator

                                     Assessment Rubric:

A.Create a comment block with the following information:

Your Name

Course Name, Section (example: ENTD200 B002 Spr19)

Instructor name

Week #

Date completed

B.  Write a program that will calculate the problem using a loop and stop after the condition has been met. 

C.  Print (print function with label). 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Chapter 11 Project Risk Management Task 3 Develop a response strategy for one of the negative risks and one of the positive risks

Task 3: 

a. Develop a response strategy for one of the negative risks and one of the positive risks. 

b. Enter the information in the risk register. 

c. Write a separate paragraph describing what specific tasks would be required to implement the strategy. 

d. Include time and cost estimates for each strategy as well.

Details: 

Chapter 11 Project Risk Management

Book: Information Technology Project Management Schwalbe Schwalbe 9th edition

Running Case:

You and your team identified some risks during the first week of the Global Treps Project. 

However, you never ranked the risks or developed any response strategies. 

Because several negative risk events have already occurred 

(such as Ashok breaking his wrist and poor communications with a key stakeholder in Ethiopia, as described in Chapter 10), you have decided to be more proactive in managing risks. 

You also want to address positive risks as well as negative risks.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Need Answes for pre- test

 

1. When developing a naming convention, what is the most important quality to keep in mind? 

A. Logic 

B. Consistency 

C. Tradition 

D. Filename length

2. What Microsoft program is frequently used to develop pictorial representations of a database’s logical relationships? 

A. Excel 

B. Word 

C. Access 

D.Visio

3. _refers to a set of tools for analyzing trends and patterns in business data.

A. MIS

B. Transaction

C. Business intelligence 

D. Database management 

4. What are the two main advantages to a well-designed relational database over other types? 

A. Speed and data protection 

B. Flexibility and data protection

C. Data integrity and speed 

D. Data integrity and flexibility

5. What relationship does a data warehouse have to an organization’s data?

A. A data warehouse holds only the live version of the data. 

B. A data warehouse holds all of the data. 

C. A data warehouse holds only customer-related data. 

D. A data warehouse holds only backup copies of the data.

6. When using a surrogate key, what form does the key most usually take? 

A. Database owner name with incrementing numbers

B. Auto-incremented numbers

C. Random string of letters

D. Random characters beginning with 

7. Which type of documentation should go inside your data dictionary? 

A. List of software applications used 

B. List of columns and data types

C. List of personnel working on the project

D. List of budget committee members

8. Which commercial RDBMS product was the first to hit the market and is the biggest? 

A. Access

B. SQL Server 

C. Oracle

D. MySQL

9. After an informative session, you find yourself with several pages of notes. For maximum retention and unde notes within _ hours. 

A. 8 

B. 48 

C.24 

D.12

10. When gathering the information needed to create a database, the attributes organization needs for its activities are _ requirements. 

A. data 

B. general 

C. access and security

D. report 

11. In a relational database, entities are defined by 

A. rows. 

B. columns.

C. values.

D. attributes.

12. You’re mapping out the logical relations of a database, and you notice that one of your tables will have a pair of child records for every record created in the parent entity. What type of relationship do these tables have? 

A. One to many

B. One-to-one 

C. Many-to-many

D. Pair of one-to-many relationships

13. If a user can make modifications to database objects, what permission has that user been assigned? 

A. Select 

B. Create 

C. Update

D. Alter

14. The basic idea for relational databases was developed by Edgar Codd, who was a researcher for what company?

A.AT&T

B. IBM

C. Bell Labs

D. Siemens

15. During the information-gathering process, you want the system already in place. Which method would be best to us 

A. Interviews 

B. Review of business documents

C. Work shadowing

D. Questionnaires

16. Keys based on attributes that arise organically from the entity itself are referred to as what type of key? 

A. Surrogate

B. Primary

C. Natural 

D. Composite

17. Your project specifications call for a business rule that the database design can’t enforce. What tool should you use to enforce this busi 

A. Exception

B. Weak entityty 

C. Lookup entity 

D. Trigger

18. Which type of entity describes a fundamental business aspect of a database? 

A. Lookup 

B. Domain 

C. Weak 

D. Linking 

19. What visual practice provides more information about logical relations when creating an ERD? 

A. Arrow notation

B. Referential actions

C. Crow’s feet notation

D. Color-coded boxes

20. Which type of relationship is logically supported but can’t be represented by Visio or any database modeling process

A. One-to-one 

B. Many-to-many

C. Pair of one-to-many relationships

D. One-to-many

1. Which of the following functions is a scalar function? 

A. COUNT 

B. MAX 

C.SUM 

D. MONTH

2. What term is used to describe any action a database takes? 

A. Function 

B. Attribute 

C. Transaction 

D. Dependency a

3. Why should you perform the denormalization process on a database? 

A. Increase data protection 

B. Correct incorrect linkages 

C. Correct attribute names 

D. Improve performance

4. In testing, you find that one of the tables in your database has multiple versions of one of the columns, and updating the information requires the user to go to several different places to make sure the update completes. What process should you use to fix this kind of issue? 

A. Denormalization 

B. Normalization 

C. Compiling 

D. Insertion

5. Which operator signifies both the modulus operation and the wildcard in a WHERE clause? 

A. % 

0 B./ 

0 C.* 

0 D.+ 

6. You’re looking for a DBMS to purchase and install for use with the database you’re designing. Because of future expansions, yi away from systems that have file size limits. Which of the following DBMSs should you likely avoid? 

A. Access 

B. Oracle Express 

C.MySQL 

D. PostGres 

7. Which SQL functional area language contains all the commands for selecting and manipulating database data? 

A. HTML 

B.XML 

C.DML 

D.DDL 

8. Which language is used to manipulate data and data objects in a relational database? 

A. SQL 

B.C++ 

C. XML 

D.XQuery

9. You’re looking over the tables in the database you’re creating, and you another table. What type of Join are you seeing? 

A. Cross join 

B. Equi join 

C.Outer join 

D. Inner join 

10. When users enter data into the database, they find they have to enter a value for every column, as the database won’t, otherwise. What type of value has been disallowed for this database? 

A.O 

B. Duplicate 

C. Tab key 

D. Null 

11. What type of clause must you always use with DELETE or UPDATE to avoid Inadvertently changing data elsewhere in the data! 

A. WHERE 

B.ORDER 

C.SET 

D. FROM 

12. Which keyword yields the same results as using the >= and <= operators? 

A. IS 

B. BETWEEN 

C. LIKE 

D. WHERE 

13. _ are rules about how to do things. 

A. Logs 

B. Policies 

C. Procedures 

D. Reports

14. When a database system requests a login 

A. Mapping 

B. Authorization 

C. Authentication 

D. Permission 

15. If you remove all the repeating groups or arrays from a database, which form is the database now in? 0 

A. Fourth normal 

B. Second normal 

C. First normal 

D. Third normal 

16. Of the seven types of normal forms, how many are considered the most critical for creating a working database? 

A. 3 

B.5 

C.2 

D.4 

17. A role is a collection of permissions, while a schema is a collection of 

A. procedures 

B. objects 

C. attributes 

D. reports 

18. Which keyword should you use to Ffrovide a substitute name for a column? 

A. AS 

B.UPDATE 

C. ORDER 

D. SELECT

19. When checking the database, you confirm that the “Enforce Foreign Key Constraint” property is set to “Yes,” as expected. What property this constraint create for the database? 

A. Referential integrity 

B. Data redundancy 

C. Third normal form 

D. Functional dependency

20. If you wanted to assign a user the permission to create set 

A. db_backupoperator 

B. db_securityadmin 

C. db datawriter 

D.db accessadmin 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Art Creation & Reflection – Photography/Cinema

Art Creation & Reflection – Photography/Cinema

Assignment

Required Resources

Read/review the following resources for this activity:

  • Textbook: Chapter 11, 12
  • Lesson
  • Minimum of 1 scholarly source (in addition to the textbook)

Instructions

This week you will use your readings from the past week as a point of departure to create your own artistic production and a reflection paper.

Part 1: Art Creation
Select a photograph or film art piece to use as a point of inspiration. Create an art piece of photography or cinematography inspired by your selected art piece. Videos should be no longer than 5 minutes and must be in MP4 format.

Note: If your art creation requires a separate file submission, please submit in the Art Creation Submission (Recordings) area following this assignment.

Part 2: Reflection
Write a reflection about the relationship between your art production and the inspiration piece. Include the following in the reflection paper:

  • Introduction
  • Inspiration Piece
    • Include the inspiration photograph or cinematography within the document. Use a link in the case of cinematography.
    • Record the title, artist/director, year, and place of origin.
    • Briefly explain the background of the inspiration piece.
  • Your Art Piece
    • Include your original photograph within the document. If you selected cinematography, submit as a separate file in the Art Creation Submission (Recordings) area following this assignment.
    • Provide a title.
    • Explain the background of your piece.
  • Connection
    • Explain the thematic connection between the two pieces.
    • How are they similar and different?
    • Are they the same medium? How does the medium impact what the viewer experiences?
    • For photography, how do the formal elements of design compare to one another?

Original Artwork Requirements

  • Methods: photo or video
  • No computer-generated pieces

Writing Requirements (APA format)

  • Length: 1.5-2 pages (not including title page, images, or references page)
  • 1-inch margins
  • Double spaced
  • 12-point Times New Roman font
  • Title page
  • References page (minimum of 1 scholarly source)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Ethics 5

 

Read the attached Ethics-V.pdf Download Ethics-V.pdfwhich continues the discussion on the professional codes of software engineering ethics.

Then proceed to answer the questions inside the reading:

 Question 8:1: Read over Appendix A and B. Identify two code items from
Appendix  A  and  two  from  Appendix  B  about  which  you  have  either:  a  question
concerning  its  meaning,  a  comment  about  its  importance,  or  a  concern  about  its
ability to be well implemented.  Pose those questions/comments/concerns below.

Question  8:2:  How  might  the  qualities  of  a  ‘superprofessional’  engineer  with
practical  wisdom,  as  described  in  this  section,  assist  such  a  person  in  applying
these codes successfully?  Be specific.  

 Question   C:1: What forms of harm did members of the public suffer as a result of
Google StreetView images?  What forms of harm could they have suffered as a
result of Google’s data-collection efforts?

Question   C:2: What institutional and professional choices might have been
responsible for Google StreetView’s violations of public privacy?

Question  C:3:  What ethical strategies from your earlier reading in this unit could
Google engineers and managers have used to produce a more optimal balance of
functionality and ethical design?  Could one or more Google ‘superprofessionals’
have prevented the privacy breaches, and if so, how?

Question  C:4:  What can Google do now  to prevent similar privacy issues with its
products in the future?  

 

Because for many ethics questions there is no absolutely right or wrong answers as such, your responses will be graded based on completeness and thoughtfulness as opposed to rote or perfunctory ones. There are three grade levels for this assignment based on your responses to all the questions: 20 (no reasoning in responses), 35 (minimal to little reasoning), and 50 (sufficient reasoning and consideration).

Write your answers in a Word file using Times New Roman font (no smaller than 10 pt but no bigger than 12 pt), single spacing, 1″ margins on all sides.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer and Information Networking

 There are some free UML diagram tools and free online UI tools available, such as:1. UMLet, https://www.umlet.com/2. Visual paradigm, https://www.visual-paradigm.com/solution/freeumltool/3. free online http://www.umlet.com/umletino/umletino.html…..4. free online UI tools https://www.figma.com/ui-design-tool/

Select one of the tools and create your diagram to have some simple simulation 

A cover page with introduction, simulation, and explaining is a must for the assignment

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now