Exam

 

1. Describe with the aid of a diagram the structure of the Windows XP operating system. Sketch the functions of each component, and clearly indicate which parts execute in kernel mode and which in user mode.

2. Contrast UNIX pipes with a general, asynchronous message-passing facility as a basis for inter-process communication between processes which run in separate address spaces.

3. An operating system supports multi-threaded processes. Within a given user-level address-space two threads cooperate by means of a shared, circular, N-slot buffer. Semaphores are supported by the language system.

a. Outline programs that may be executed by the thread which writes data into the buffer and the thread which reads data from it.

b. How would you ensure that several threads could write to, and read from, the buffer?

c. Explain how the semaphore implementation in the language system uses the thread implementation in the operating system.

4. Describe the various functions involved in interrupt handling. Indicate the hardware and software that might be involved in their implementation.

a. Discuss the interaction of interrupt driven software and process scheduling in an operating system.

b. Compare and contrast interrupt handling in the Windows XP and UNIX Operating Systems.

5. In relation to scheduling of processes, describe the concept of a working set and briefly outline how it can be used within an operating system.

a. Briefly explain why context switching between processes is inherently more costly than switching between threads of a process.

b. Give two reasons why operating system designers often choose to make code in the kernel non-preemptive.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Homework Help-10

Question 1.

10.1 What are three broad mechanisms that malware can use to propagate?

10.2 What are four broad categories of payloads that malware may carry?

10.3 What are typical phases of operation of a virus or worm?

10.4 What mechanisms can a virus use to conceal itself?

10.5 What is the difference between machine-executable and macro viruses?

10.6 What means can a worm use to access remote systems to propagate?

10.7 What is a “drive-by-download” and how does it differ from a worm?

10.8 What is a “logic bomb”?

10.9 Differentiate among the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be present in the same malware?

10.10 List some of the different levels in a system that a rootkit may use.

10.11 Describe some malware countermeasure elements.

10.12 List three places malware mitigation mechanisms may be located.

10.13 Briefly describe the four generations of antivirus software.

10.14 How does behavior-blocking software work?

10.15 What is a distributed denial-of-service system?

Question 2 – 

Some common biometric techniques include:

1.  Fingerprint recognition

2.  Signature dynamics

3.  Iris scanning

4.  Retina scanning

5.  Voice prints

6.  Face recognition

Select one of these biometric techniques and explain the benefits and the  vulnerabilities associated with that method in 3-4 paragraphs.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

WK 4: Sourcing Plan

Assignment Content

  1. The strategic sourcing plan is a plan for how you will do business going forward. The sourcing plan can address how to supply resources to staff, your current and future systems, and how you will purchase raw materials or new IT systems.

    Develop a high-level IT sourcing plan to guide Phoenix Fine Electronics to adopting enterprise solutions rather than multiple stand-alone systems. As a guideline, your sourcing plan should be a 3- to 4-page outline or summary.

    Include the following in your sourcing plan:

    • The current technologies being utilized
    • Major issues with that technology
    • New technologies to implement as replacements for current technologies
    • How it addresses the current issues
    • Additional advantages or value added
    • Approximate time frame to implement the technology
    • Any dependencies that the company does not currently have in order to implement

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week 4 Written Assignment

 

Week 4 Written Assignment

  • Select one of the three topics defined in the Essay Quiz section on page 334 in the textbook. Your paper should be 2 pages in length. You need to provide a minimum of two references and need to use APA format in the reference section.

Textbook

Principles of Computer Security, Conklin and White, 4th Edition, McGraw-  Hill Companies, 2016; ISBN: 978-0-07-183597-8.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Research Paper- Data Center Technology

Research Paper:  Find a peer reviewed article in the following databases provided by the UC Library and write a 500-word paper reviewing the literature concerning Data Center Technology. Choose one of the technologies discussed in Chapter 5, Section 5.2 (Erl, 2014). 

Abstract <>

Introduction <>

1- Virtualization — <I prefer this one> provide some flow chat also. 

(Note:- But you can take anyone from 1 to 7)

2- Standardization and Modularity

3- Automation

4- Remote Operation and Management

5- High Availability

6- Security-Aware Design, Operation, and Management

7- Facilities

Etc…

======This is must

Use the following databases for your research:

· ACM Digital Library

· IEEE/IET Electronic Library

· SAGE Premier

=======

Conclusion<>

You may choose any scholarly peer reviewed articles and papers.

FYI — PDF BOOK

Section 5.2 <From here we can choose one topic)

5.2. DATA CENTER TECHNOLOGY

Grouping IT resources in close proximity with one another, rather than having them geographically dispersed, allows for

power sharing, higher efficiency in shared IT resource usage, and improved accessibility for IT personnel. These are the

advantages that naturally popularized the data center concept. Modern data centers exist as specialized IT infrastructure

Chapter 5. Cloud-Enabling Technology – Cloud Computing: Concepts, Technology & Architecture

https://www.safaribooksonline.com/library/view/cloud-computing-concepts/9780133387568/ch05.html[11/15/2017 5:49:24 PM]

used to house centralized IT resources, such as servers, databases, networking and telecommunication devices, and

software systems.

Data centers are typically comprised of the following technologies and components:

Virtualization

Data centers consist of both physical and virtualized IT resources. The physical IT resource layer refers to the facility

infrastructure that houses computing/networking systems and equipment, together with hardware systems and their

operating systems (Figure 5.7). The resource abstraction and control of the virtualization layer is comprised of operational

and management tools that are often based on virtualization platforms that abstract the physical computing and

networking IT resources as virtualized components that are easier to allocate, operate, release, monitor, and control.

Chapter 5. Cloud-Enabling Technology – Cloud Computing: Concepts, Technology & Architecture

https://www.safaribooksonline.com/library/view/cloud-computing-concepts/9780133387568/ch05.html[11/15/2017 5:49:24 PM]

Figure 5.7. The common components of a data center working together to provide virtualized IT resources

supported by physical IT resources.

Virtualization components are discussed separately in the upcoming Virtualization Technology section.

Standardization and Modularity

Data centers are built upon standardized commodity hardware and designed with modular architectures, aggregating

multiple identical building blocks of facility infrastructure and equipment to support scalability, growth, and speedy

hardware replacements. Modularity and standardization are key requirements for reducing investment and operational

costs as they enable economies of scale for the procurement, acquisition, deployment, operation, and maintenance

processes.

Chapter 5. Cloud-Enabling Technology – Cloud Computing: Concepts, Technology & Architecture

https://www.safaribooksonline.com/library/view/cloud-computing-concepts/9780133387568/ch05.html[11/15/2017 5:49:24 PM]

Common virtualization strategies and the constantly improving capacity and performance of physical devices both favor

IT resource consolidation, since fewer physical components are needed to support complex configurations. Consolidated

IT resources can serve different systems and be shared among different cloud consumers.

Automation

Data centers have specialized platforms that automate tasks like provisioning, configuration, patching, and monitoring

without supervision. Advances in data center management platforms and tools leverage autonomic computing

technologies to enable self-configuration and self-recovery. Autonomic computing is briefly discussed in Appendix E.

Remote Operation and Management

Most of the operational and administrative tasks of IT resources in data centers are commanded through the network’s

remote consoles and management systems. Technical personnel are not required to visit the dedicated rooms that house

servers, except to perform highly specific tasks, such as equipment handling and cabling or hardware-level installation

and maintenance.

High Availability

Since any form of data center outage significantly impacts business continuity for the organizations that use their

services, data centers are designed to operate with increasingly higher levels of redundancy to sustain availability. Data

centers usually have redundant, uninterruptable power supplies, cabling, and environmental control subsystems in

anticipation of system failure, along with communication links and clustered hardware for load balancing.

Security-Aware Design, Operation, and Management

Requirements for security, such as physical and logical access controls and data recovery strategies, need to be thorough

and comprehensive for data centers, since they are centralized structures that store and process business data.

Due to the sometimes prohibitive nature of building and operating on-premise data centers, outsourcing data centerbased

IT resources has been a common industry practice for decades. However, the outsourcing models often required

long-term consumer commitment and usually could not provide elasticity, issues that a typical cloud can address via

inherent features, such as ubiquitous access, on-demand provisioning, rapid elasticity, and pay-per-use.

Facilities

Chapter 5. Cloud-Enabling Technology – Cloud Computing: Concepts, Technology & Architecture

https://www.safaribooksonline.com/library/view/cloud-computing-concepts/9780133387568/ch05.html[11/15/2017 5:49:24 PM]

Data center facilities are custom-designed locations that are outfitted with specialized computing, storage, and network

equipment. These facilities have several functional layout areas, as well as various power supplies, cabling, and

environmental control stations that regulate heating, ventilation, air conditioning, fire protection, and other related

subsystems.

The site and layout of a given data center facility are typically demarcated into segregated spaces. Appendix D provides a

breakdown of the common rooms and utilities found in data centers.

Computing Hardware

Much of the heavy processing in data centers is often executed by standardized commodity servers that have substantial

computing power and storage capacity. Several computing hardware technologies are integrated into these modular

servers, such as:

• rackmount form factor server design composed of standardized racks with interconnects for power, network, and

internal cooling

• support for different hardware processing architectures, such as x86-32bits, x86-64, and RISC

• a power-efficient multi-core CPU architecture that houses hundreds of processing cores in a space as small as a single

unit of standardized racks

• redundant and hot-swappable components, such as hard disks, power supplies, network interfaces, and storage

controller cards

Computing architectures such as blade server technologies use rack-embedded physical interconnections (blade

enclosures), fabrics (switches), and shared power supply units and cooling fans. The interconnections enhance intercomponent

networking and management while optimizing physical space and power. These systems typically support

individual server hot-swapping, scaling, replacement, and maintenance, which benefits the deployment of fault-tolerant

systems that are based on computer clusters.

Contemporary computing hardware platforms generally support industry-standard and proprietary operational and

management software systems that configure, monitor, and control hardware IT resources from remote management

consoles. With a properly established management console, a single operator can oversee hundreds to thousands of

physical servers, virtual servers, and other IT resources.

Chapter 5. Cloud-Enabling Technology – Cloud Computing: Concepts, Technology & Architecture

https://www.safaribooksonline.com/library/view/cloud-computing-concepts/9780133387568/ch05.html[11/15/2017 5:49:24 PM]

Storage Hardware

Data centers have specialized storage systems that maintain enormous amounts of digital information in order to fulfill

considerable storage capacity needs. These storage systems are containers housing numerous hard disks that are

organized into arrays.

Storage systems usually involve the following technologies:

Hard Disk Arrays – These arrays inherently divide and replicate data among multiple physical drives, and increase

performance and redundancy by including spare disks. This technology is often implemented using redundant arrays of

independent disks (RAID) schemes, which are typically realized through hardware disk array controllers.

I/O Caching – This is generally performed through hard disk array controllers, which enhance disk access times and

performance by data caching.

Hot-Swappable Hard Disks – These can be safely removed from arrays without requiring prior powering down.

Storage Virtualization – This is realized through the use of virtualized hard disks and storage sharing.

Fast Data Replication Mechanisms – These include snapshotting, which is saving a virtual machine’s memory into a

hypervisor-readable file for future reloading, and volume cloning, which is copying virtual or physical hard disk volumes

and partitions.

Storage systems encompass tertiary redundancies, such as robotized tape libraries, which are used as backup and

recovery systems that typically rely on removable media. This type of system can exist as a networked IT resource or

direct-attached storage (DAS), in which a storage system is directly connected to the computing IT resource using a host

bus adapter (HBA). In the former case, the storage system is connected to one or more IT resources through a network.

Networked storage devices usually fall into one of the following categories:

Storage Area Network (SAN) – Physical data storage media are connected through a dedicated network and provide

block-level data storage access using industry standard protocols, such as the Small Computer System Interface (SCSI).

Network-Attached Storage (NAS) – Hard drive arrays are contained and managed by this dedicated device, which

connects through a network and facilitates access to data using file-centric data access protocols like the Network File

Chapter 5. Cloud-Enabling Technology – Cloud Computing: Concepts, Technology & Architecture

https://www.safaribooksonline.com/library/view/cloud-computing-concepts/9780133387568/ch05.html[11/15/2017 5:49:24 PM]

System (NFS) or Server Message Block (SMB).

NAS, SAN, and other more advanced storage system options provide fault tolerance in many components through

controller redundancy, cooling redundancy, and hard disk arrays that use RAID storage technology.

Network Hardware

Data centers require extensive network hardware in order to enable multiple levels of connectivity. For a simplified

version of networking infrastructure, the data center is broken down into five network subsystems, followed by a

summary of the most common elements used for their implementation.

Carrier and External Networks Interconnection

A subsystem related to the internetworking infrastructure, this interconnection is usually comprised of backbone routers

that provide routing between external WAN connections and the data center’s LAN, as well as perimeter network security

devices such as firewalls and VPN gateways.

Web-Tier Load Balancing and Acceleration

This subsystem comprises Web acceleration devices, such as XML pre-processors, encryption/decryption appliances, and

layer 7 switching devices that perform content-aware routing.

LAN Fabric

The LAN fabric constitutes the internal LAN and provides high-performance and redundant connectivity for all of the

data center’s network-enabled IT resources. It is often implemented with multiple network switches that facilitate

network communications and operate at speeds of up to ten gigabits per second. These advanced network switches can

also perform several virtualization functions, such as LAN segregation into VLANs, link aggregation, controlled routing

between networks, load balancing, and failover.

SAN Fabric

Related to the implementation of storage area networks (SANs) that provide connectivity between servers and storage

systems, the SAN fabric is usually implemented with Fibre Channel (FC), Fibre Channel over Ethernet (FCoE), and

InfiniBand network switches.

NAS Gateways

This subsystem supplies attachment points for NAS-based storage devices and implements protocol conversion hardware

Chapter 5. Cloud-Enabling Technology – Cloud Computing: Concepts, Technology & Architecture

https://www.safaribooksonline.com/library/view/cloud-computing-concepts/9780133387568/ch05.html[11/15/2017 5:49:24 PM]

that facilitates data transmission between SAN and NAS devices.

Data center network technologies have operational requirements for scalability and high availability that are fulfilled by

employing redundant and/or fault-tolerant configurations. These five network subsystems improve data center

redundancy and reliability to ensure that they have enough IT resources to maintain a certain level of service even in the

face of multiple failures.

Ultra high-speed network optical links can be used to aggregate individual gigabit-per-second channels into single optical

fibers using multiplexing technologies like dense wavelength-division multiplexing (DWDM). Spread over multiple

locations and used to interconnect server farms, storage systems, and replicated data centers, optical links improve

transfer speeds and resiliency.

Other Considerations

IT hardware is subject to rapid technological obsolescence, with lifecycles that typically last between five to seven years.

The on-going need to replace equipment frequently results in a mix of hardware whose heterogeneity can complicate the

entire data center’s operations and management (although this can be partially mitigated through virtualization).

Security is another major issue when considering the role of the data center and the vast quantities of data contained

within its doors. Even with extensive security precautions in place, housing data exclusively at one data center facility

means much more can be compromised by a successful security incursion than if data was distributed across individual

unlinked components.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

2 Discussions – 1 Assignment

Discussion 1

APA format | 400 words Minimum | 2 scholarly References. 

Textbook Attached (Amoroso)

Discussion 2

APA format | 400 words Minimum | 2 scholarly References. 

Related Material attached (PFA)

Practical connection assignment

APA format | 500 words Minimum | 2 scholarly References. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion on global financial service sector which blockchain technology will likely change

Question and Text book attached. Read the attached doc file propely. 

Proper introduction and body and conclusion with References

Two or more references (One is book author and another one anyone)

Need three distinct questions from Chapter 1, 2 and 3. 

 

In chapter 3, the author describes eight core functions of the global financial service sector which blockchain technology will likely change. Create a new thread, choose one of the core functions described in chapter 3, and explain why it is important in moving today’s economy forward, and provide at least two real examples of the chosen core function being changed by blockchain technology today.

Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read in Chapter 1, 2, or 3. You’re not trying to test each other, but you are trying to start a discussion.

Finally, go to three other students’ threads and post comments, answering at least one of their questions.

You must do the following:

1) Create a new thread. As indicated above, choose one of the core functions described in chapter 3, explain why it is important in moving today’s economy forward, and provide at least two real examples of the chosen core function being changed by blockchain technology today. Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read in Chapter 1. You’re not trying to test each other, but you are trying to start a discussion.

2) Select AT LEAST 3 other students’ threads and post substantive comments on those threads. Your comments should answer AT LEAST one of the questions posed in the thread and extend the conversation started with that thread. Make sure that you include the question in your comment so I can see what question you’re answering.

ALL original posts and comments must be substantive. (I’m looking for about a paragraph – not just a short answer.)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion: Security Assessment and Testing

 

Your task: Develop an “intake” briefing for middle  managers who will be assisting in the planning and execution of an  internal audit of employee use of company owned laptops as part of the  company’s “Work From Home” arrangements. The purpose of an “intake”  briefing is to get everyone “on the same page” with respect to what will  be done, who will do it, and what the roles & responsibilities of  the managers will be during the audit (e.g. assist with employee  contacts and “smooth ruffled feathers” amongst their workers).

Background: The purpose of the audit is to determine  how the laptops are being used by the employees working from home (what  corporate and non corporate systems, services, networks, and websites  are being accessed) and to uncover, if possible, any misuse (e.g. usage  that is outside of the company’s acceptable use policy). The audit  should also look for evidence of laptops that are improperly configured  or have vulnerable software installed.

Background: The company will follow the Information  System Security Audit Process as defined by Harris & Maymi in the  CISSP All-in-One Exam Guide, 8th edition. The steps are:

  1. Determine Goals
  2. Involve the right business unit leaders
  3. Determine the scope
  4. Choose the audit team
  5. Plan the audit
  6. Conduct the audit
  7. Document the results
  8. Communicate the results

Format: this week, your deliverable should be  formatted as briefing paper (you will have a combination of paragraphs  and bullet points). You should have an introduction, “analysis” section  (explaining the ground rules and processes for how the audit will be  conducted), and an appropriate summary section (including an appeal for  cooperation and assistance). Include citations (in the text) and  references (at the end) to support your work and allow your readers to  fact check your analysis and conclusions.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

prepare presentation slides and notes

By looking at this following project proposal and Gantt chart please prepare the power point slides and notes. 

topic to be included in PowerPoint slides and notes

1) Methodology 

2) Team Building

3) work breakdown structure

4) Time/ schedule (Gantt chart)

5) deliverables

prepare the power point slides on those following topics   

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

C++ Programming

Writing a code to develop a tax calculator in C++ programming language

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now