Advanced Operating Systems Project

There are 4 part for the project and the question may be long to read but it’s not a heavy work because there are many examples and explanations for the each parts.

*Part 1.  The first part of this project requires that you implement a class that will be used to simulate a disk drive. The disk drive will have numberofblocks many blocks where each block has blocksize many bytes. The interface for the class Sdisk should include :

Class Sdisk

{

public :

Sdisk(string diskname, int numberofblocks, int blocksize);

int getblock(int blocknumber, string& buffer);

int putblock(int blocknumber, string buffer);

int getnumberofblocks(); // accessor function

int getblocksize(); // accessor function

private :

string diskname;        // file name of software-disk

int numberofblocks;     // number of blocks on disk

int blocksize;          // block size in bytes

};

An explanation of the member functions follows :

  • Sdisk(diskname, numberofblocks, blocksize)
    This constructor incorporates the creation of the disk with the “formatting” of the device. It accepts the integer values numberofblocks, blocksize, a string diskname and creates a Sdisk (software-disk). The Sdisk is a file of characters which we will manipulate as a raw hard disk drive. The function will check if the file diskname exists. If the file exists, it is opened and treated as a Sdisk with numberofblocks many blocks of size blocksize. If the file does not exist, the function will create a file called diskname which contains numberofblocks*blocksize many characters. This file is logically divided up into numberofblocks many blocks where each block has blocksize many characters. The text file will have the following structure :
                        

                                                            -figure 0 (what I attached below)              

  • getblock(blocknumber,buffer)
    retrieves block blocknumber from the disk and stores the data in the string buffer. It returns an error code of 1 if successful and 0 otherwise.
  • putblock(blocknumber,buffer)
    writes the string buffer to block blocknumber. It returns an error code of 1 if successful and 0 otherwise.

IMPLEMENTATION GUIDELINES : It is essential that your software satisfies the specifications. These will be the only functions (in your system) which physically access the Sdisk. NOTE that you must also write drivers to test and demonstrate your program.

*Part 2.  The second part of this project requires that you implement a simple file system. In particular, you are going to write the software which which will handle dynamic file management. This part of the project will require you to implement the class Filesys along with member functions. In the description below, FAT refers to the File Allocation Table and ROOT refers to the Root Directory. The interface for the class should include :

Class Filesys: public Sdisk

{

Public :

Filesys(string diskname, int numberofblocks, int blocksize);

int fsclose();

int fssynch();

int newfile(string file);

int rmfile(string file);

int getfirstblock(string file);

int addblock(string file, string block);

int delblock(string file, int blocknumber);

int readblock(string file, int blocknumber, string& buffer);

int writeblock(string file, int blocknumber, string buffer);

int nextblock(string file, int blocknumber);

Private :

int rootsize;           // maximum number of entries in ROOT

int fatsize;            // number of blocks occupied by FAT

vector<string> filename;   // filenames in ROOT

vector<int> firstblock; // firstblocks in ROOT

vector<int> fat;             // FAT

};

An explanation of the member functions follows :

  • Filesys()
    This constructor reads from the sdisk and either opens the existing file system on the disk or creates one for an empty disk. Recall the sdisk is a file of characters which we will manipulate as a raw hard disk drive. This file is logically divided up into number_of_blocks many blocks where each block has block_size many characters. Information is first read from block 1 to determine if an existing file system is on the disk. If a filesystem exists, it is opened and made available. Otherwise, the file system is created.The module creates a file system on the sdisk by creating an intial FAT and ROOT. A file system on the disk will have the following segments:
                                                      
                                                             -figure 1 (what I attached below)           

  • consists of two primary data objects. The directory is a file that consists of information about files and sub-directories. The root directory contains a list of file (and directory) names along with a block number of the first block in the file (or directory). (Of course, other information about the file such as creation date, ownership, permissions, etc. may also be maintained.) ROOT (root directory) for the above example may look something like

                                                    -figure 2 (what I attached below)

    The FAT is an array of block numbers indexed one entry for every block. Every file in the file system is made up of blocks, and the component blocks are maintained as linked lists within the FAT. FAT[0], the entry for the first block of the FAT, is used as a pointer to the first free (unused) block in the file system. Consider the following FAT for a file system with 16 blocks.

                                                        -figure 3 (what I attached below)

  • In the example above, the FAT has 3 files. The free list of blocks begins at entry 0 and consists of blocks 6, 8, 13, 14, 15. Block 0 on the disk contains the root directory and is used in the FAT for the free list. Block 1 and Block 2 on the disk contains the FAT. File 1 contains blocks 3, 4 and 5; File 2 contains blocks 7 and 9; File 3 contains blocks 10, 11, and 12. Note that a “0” denotes the end-of-file or “last block”.
    PROBLEM : What should the value of FAT_size be in terms of blocks if a file system is to be created on the disk? Assume that we use a decimal numbering system where every digit requires one byte of information and is in the set [0..9].
    Both FAT and ROOT are stored in memory AND on the disk. Any changes made to either structure in memory must also be immediately written to the disk.
  • fssynch
    This module writes FAT and ROOT to the sdisk. It should be used every time FAT and ROOT are modified.
  • fsclose
    This module writes FAT and ROOT to the sdisk (closing the sdisk).
  • newfile(file)
    This function adds an entry for the string file in ROOT with an initial first block of 0 (empty). It returns error codes of 1 if successful and 0 otherwise (no room or file already exists).
  • rmfile(file)
    This function removes the entry file from ROOT if the file is empty (first block is 0). It returns error codes of 1 if successful and 0 otherwise (not empty or file does not exist).
  • getfirstblock(file)
    This function returns the block number of the first block in file. It returns the error code of 0 if the file does not exist.
  • addblock(file,buffer)
    This function adds a block of data stored in the string buffer to the end of file F and returns the block number. It returns error code 0 if the file does not exist, and returns -1 if there are no available blocks (file system is full!).
  • delblock(file,blocknumber)
    The function removes block numbered blocknumber from file and returns an error code of 1 if successful and 0 otherwise.
  • readblock(file,blocknumber,buffer)
    gets block numbered blocknumber from file and stores the data in the string buffer. It returns an error code of 1 if successful and 0 otherwise.
  • writeblock(file,blocknumber,buffer)
    writes the buffer to the block numbered blocknumber in file. It returns an appropriate error code.
  • nextblock(file,blocknumber)
    returns the number of the block that follows blocknumber in file. It will return 0 if blocknumber is the last block and -1 if some other error has occurred (such as file is not in the root directory, or blocknumber is not a block in file.)IMPLEMENTATION GUIDELINES : It is essential that your software satisfies the specifications. These will be the only functions (in your system) which physically access the sdisk.

*Part 3.   The third part of this project requires that you implement a simple shell that uses your file system. This part of the project will require you to implement the class Shell along with member functions. The interface for the class should include :

class Shell: public Filesys

{

Public :

Shell(string filename, int blocksize, int numberofblocks);

int dir();// lists all files

int add(string file);// add a new file using input from the keyboard

int del(string file);// deletes the file

int type(string file);//lists the contents of file

int copy(string file1, string file2);//copies file1 to file2

};

An explanation of the member functions follows :

  • Shell(string filename, int blocksize, int numberofblocks): This will create a shell object using the Filesys on the file filename.
  • int dir(): This will list all the files in the root directory.
  • int add(string file): add a new file using input from the keyboard
  • int del(string file): deletes the file
  • int type(string file): lists the contents of file
  • int copy(string file1, string file2): copies file1 to file2

IMPLEMENTATION GUIDELINES :

See the figure 4  (what I attached below) for the ls function of Filesys.

See the figure 5 (what I attached below) for dir function of Shell. 

See the figure 6 (what I attached below)  for main program of Shell.

*Part 4.  In this part of the project, you are going to create a database system with a single table which uses the file system from Project II. The input file will consist of records associated with Art History. The data file you will use as input consists of records with the following format: The data (180 records) is in date.txt file (what I attached below)

  • Date : 5 bytes
  • End : 5 bytes
  • Type : 8 bytes
  • Place : 15 bytes
  • Reference : 7 bytes
  • Description : variable

In the data file, an asterisk is also used to delimit each field and the last character of each record is an asterisk. The width of any record is never greater than 120 bytes. Therefore you can block the data accordingly. This part of the project will require you to implement the following class:

Class Table : Public Filesys

{

Public :

Table(string diskname,int blocksize,int numberofblocks, string flatfile, string indexfile);

int Build_Table(string input_file);

int Search(string value);

Private :

string flatfile;

string indexfile;

int IndexSearch(string value);

};

The member functions are specified as follows :

  • Table(diskname,blocksize,numberofblocks,flatfile,indexfile)
    This constructor creates the table object. It creates the new (empty) files flatfile and indexfile in the file system on the Sdisk using diskname.
  • Build_Table(input_file)
    This module will read records from the input file (the raw data file described above), add the records to the flatfile and create index records consisting of the date and block number, and then add the index records to the index file. (Note that index records will have 10 bytes .. 5 bytes for the date and 5 bytes for the block number.)
  • Search(value)
    This module accepts a key value, and searches the index file with a call to IndexSearch for the record where the date matches the specified value. IndexSearch returns the blocknumber of the block in the flat file where the target record is located. This block should then be read and the record displayed.
  • IndexSearch(value)
    This module accepts a key value, and searches the index file indexfile for the record where the date matches the specified value. IndexSearch then returns the block number key of the index record where the match occurs.

See the figure 7 (what I attached below) for the main program of Shell which includes a search command.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

COMPUTER SCIENCE

1. For each instruction, give the 80×86 opcode and total number of bytes of object code, including prefix bytes. Assume you are in 64-bit mode and that word0p, dbl0p, and quad0p reference a word, doubleword and quadword in data, respectively.

  • Add    ax, word0p
  • Sub dbl0p, ebx
  • Sub rax, 10
  • Add quad0p, 1000
  • Inc r10b
  • Dec word0p
  • Neg rdx
  • Inc QWORD PTR [rdx]

2. Please provide code converting a Fahrenheit to a Celsius using the registers edx and eax?

3. Please write the commands (declarations) to setup a 2-byte and 4-byte GPS location.

4. Is the following code valid? Why or why not:

  • mov eax, [ebx-ecx] ;
  • mov [eax+esi+edi], ebx ;
  • cmp eax, edx ;
  • xor ecx, ecx ;
  • inc eax ;

5. What does the following code do?

  • Push ebp                  ;
  • Mov ebp, esp           ;
  • Push ebx                  ;

6. Please provide code for the following scenario:

  • Create a while loop that that checks for 4 iteractions
  • Create jumps and labels for each case
  • Provide an exitcode along with possible return codes.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Assignment 2

 Graded Assignment:  Week 2 – (Complete the following assignment in one Microsoft Word document)Chapter 3: Questions for Discussion #1 through #4

  • How do you describe the importance of data in analytics? Can we think of analytics without data?
  • Explain. Considering the new and broad definition of business analytics, what are the main inputs and outputs to the analytics continuum?
  • Where do the data for business analytics come from? What are the sources and the nature of those incoming data?
  • What are the most common metrics that make for ­analytics-ready data?

Chapter 3: Exercise 12

  • Go to data.gov—a U.S. government–sponsored data portal that has a very large number of data sets on a wide variety of topics ranging from healthcare to education, climate to public safety. Pick a topic that you are most passionate about. Go through the topic-­specific information and explanation provided on the site. Explore the possibilities of downloading the data, and use your favorite data visualization tool to create your own meaningful information and visualizations.

Chapter 4: Questions for Discussion #1 through #5

  • Define data mining. Why are there many names and definitions for data mining?
  • What are the main reasons for the recent popularity of data mining?
  • Discuss what an organization should consider before making a decision to purchase data mining software.
  • Distinguish data mining from other analytical tools and techniques.
  • Discuss the main data mining methods. What are the fundamental differences among them?

Chapter 4: Exercise 1

  • Visit teradatauniversitynetwork.com. Identify case studies and white papers about data mining. Describe recent developments in the field of data mining and predictive modeling.

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.  Below is the general assessment rubric for this assignment and remember that late penalties are built within the overall assessment so complete this assignment by the Sunday due date of week 2. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

regression using R

 

In the Zip File you’ll find three files. One called Assignment, one called reference, and one in CSV format called Global Ancestry.

Please follow the instructions in the assignment including all the notes. Also, For the reference, You can start at page 56 and from there everything else should hopefully make sense.

Requirements: Every Question answered]

https://drive.google.com/file/d/1VhTzVhcyhIbjmS9E4pJPxGHotAI9-VHw/view?usp=sharing

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cloud Vendor Presentation

 

In this project, you will develop a detailed comparative analysis of cloud vendors and their services. A comparative analysis provides an item-by-item comparison of two or more alternatives, processes, products, or systems. In this case, you will compare the pros/cons of the cloud service providers in terms of security, ease of use, service models, services/tools they provide, pricing, technical support, cloud service providers’ infrastructure, and architecture model.

You will present your findings to the owner of the company in a narrated PowerPoint presentation with 10 to 20 slides. Use the Cloud Presentation Template.

This resource can help you prepare and record your presentation: Presentation Resources.

Presentation Guidelines

Your presentation should be comprised of the following:

  • One to two slides on the company profile.
  • One to two slides on what the company is struggling with.
  • One to two slides on current infrastructure.
  • Three to six slides on the top three cloud services providers. Include their service models (i.e., SaaS, PaaS, IaaS), services/tools/solutions (i.e., compute, storage, database, developer tools, analytics tools, networking and content delivery, customer engagement), pricing, accessibility, technical support for companies, global infrastructure.
  • One to two slides on a recommended cloud service provider based on the comparative analysis and the cloud vendor’s abilities to meet the service needs of the company.
  • One slide on the conclusion.
  • One References slide.
  • All slides must be narrated by you, the student.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Network Recon & Troubleshooting

 

The purpose of this assignment is to familiarize students with a few networking concepts that are frequently utilized by IT professionals. 

  1. Download/install the Fing application on your mobile device, smartphone, or tablet. If you do not have any of these devices, use Google to identify and install a similar application on your computer. Perform a scan of your home and/or business network. Take note of the results. Perform the test several times through the day, and note any differences. Use the application to determine additional information on the results.
  2. Download and install the NMAP application on your PC (https://nmap.org). Use NMAP to scan of your home and/or business network. Take note of the results. Perform the test several times through the day, and note any differences. Use the application to determine additional information on the results.

Research and write a paper (250-500 words) on the reasons why these applications might be valuable in troubleshooting and securing network(s). Provide details on your results from Steps 1 and 2 and how those results can specifically be used to troubleshoot and secure your network in the future.

Be sure to cite your research, as well as the tools you used to perform actions related to the research.

Prepare this assignment according to the guidelines found in the GCU Style Guide, located in the Student Success Center.

This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are not required to submit this assignment to Turnitin.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

DBM week 3

  

Create and Populate a Database

Instructions:

Resources: “SQL CREATE DATABASE Statement,” “SQL CREATE

TABLE Statement,” “SQL PRIMARY KEY Constraint,” “SQL FOREIGN

KEY Constraint,” and “SQL INSERT INTO Statement”

For this assignment, you will create the database you designed in Week

2.

Download the Create a Database document and follow the instructions.

Submit the database containing all the tables you created or a

Microsoft® Word file containing all the SQL statements used.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Unit 2 Guided Practice 1: Use an “If” Statement to Decide If An Age Is Reasonable

 

The following program uses a decision structure to decide if a user-entered value is reasonable.  We ask the user for an age, and, if the age is less than 10, we tell the user the age isn’t valid, and give the user another chance to enter a value greater than 10.  If the age is 10 or greater, we tell the user the age is valid.  In any case, after the second attempt, the user receives the message that they’ve entered a valid age.

Here’s the Flowchart:

And here is the code:

And here is the output:

Now, re-create the flowchart in Flowgorithm and run the code in your Dev C++ compiler.

Upload your flowgorithm file, .c file, and a screen shot of your code output saved in a Word document including the path name directory at the top of the screen into the dropbox for grading.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Module 7 – Data Visualization

 

This week we will discuss what is required to really make visualizations work. Berinato (2016) notes that the nature and purpose of your visualizations must be considered in order to start thinking visually. Berinato combines the nature and purpose into a 2×2 matrix that defines the following four types of visual communication: idea illustration, idea generation, visual discovery, and everyday dataviz.  Select and discuss one of the four types of visual communication: idea illustration, idea generation, visual discovery, and everyday dataviz from Berinato’s 2016 article.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Write a brief summary of certifications that are open.

Do some basic research on security certifications.

See https://www.giac.org/.

Write  a brief summary of certifications that are open. 
Consider if any of the certifications would be valuable for your career.
Investigate and report on exam options.

Write your answers in WORD and submit here. Write 200 – 300 words.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now