Exp19_PowerPoint_Ch01_Cap_Want_to_Waffle

Exp19_PowerPoint_Ch01_Cap_Want_to_Waffle

Project Description:

Want to Waffle is a successful mobile food business. The company was started by two culinary students and their families to finance the students’ college education. A year later they own three food trucks that sell breakfast waffles, waffle sandwiches, and dessert waffles. Street-food lovers line up around the block when the food trucks park in their neighborhood. The truck locations are advertised via Twitter and on Facebook, so waffle lovers can follow the trucks from place to place. The business has increased its revenue and profits, and the owners are looking to expand their operation by offering franchises. They need to prepare a presentation for an important meeting with financiers.

     

Start   PowerPoint. Download and open the file named Exp19_PPT_Ch01_Cap_WantToWaffle.pptx. Grader has automatically added   your last name to the beginning of the filename. 

 

Change the theme variant to the   last one (orange variant).

 

Change the theme color to Red   Orange and the theme font to Candara.

 

Create a new slide after Slide 1   using the Panoramic Picture with Caption layout. Type Interested in   Bringing Waffle Love to Your Town? in the middle placeholder. Type The   opportunity can be yours! in the bottom placeholder.

 

Select the text Waffle Love in the middle placeholder,   change the font size to 32 pt, apply Shadow, and change the font color to   Gold, Accent 2.
  Note, Mac users, to apply the shadow, on the Shape Format tab, click WordArt   Styles, and then click Shadow.

 

Click Slide 2. Use the Reuse   Slides option to insert all of the slides from Waffles.pptx into the open presentation. Ensure the Use source   formatting or Keep source formatting check box is not selected so that the   inserted slides take on the design and formatting of the open presentation.

 

Type the following speaker note   on Slide 1: We have a great opportunity for you to join our waffle   family. (Include   the period). 

 

Delete Slide 3. Move Slide 5 (92% increase in sales) so that it   becomes Slide 4.

 

Create a Notes and Handouts   footer with the following: Franchise Information. Apply to all.

 

Click Slide 1. Insert the WaffleTexture.jpg image file. Crop the   image by dragging the middle bottom sizing handle up until it is at 0″   on the vertical ruler. (HINT: Shape Height will be 3.75″ at this point).   Change the width of the cropped image to 13.33“. 

 

Apply the Drop Shadow Rectangle   Picture Style. Set the horizontal position of the image to 0″ and the   vertical position to 0″. 

 

Click Slide 2 and insert the DessertWaffle.jpg image file. Apply   the Simple Frame, White Picture Style.

 

On Slide 8, insert the Waffle.jpg image file. Change the   width of the image to 7.3″.

 

Apply the Simple Frame, White   Picture Style. Set the horizontal position of the image to 5.4″ and the vertical position to 1.6″.

 

On Slide 7 convert the list to   the Step Up Process SmartArt graphic.
 

  Note, Mac users, convert the list to the Basic Process SmartArt graphic.

 

On Slide 3, select the text Why We’re HOT in the title placeholder   and apply the Fill: Red, Accent color 1; Shadow WordArt Style to the text.   Increase the font size of the WordArt to 60 pt.

 

Check the presentation for   spelling errors. Make corrections as needed on the slides.

 

Save and close Exp19_PPT_Ch01_Cap_WantToWaffle.pptx.   Submit the file as directed.

Remote Access Risks Responses

Provide (2) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

Virtual Private Networks (VPN) may be getting more utilization over the last year and half than ever before.  Simply because it seems more and more people are teleworking due to COVID 19.  Some types of VPNs are Point to Point Tunneling Protocols (PPTP), OpenVPN and Secure Socket Tunneling Protocol (SSTP).  All of these VPNs are utilized for the purpose of creating a secure tunnel or linkage from a private network to a public network.  This enables the user to send and receive data as if they were connected to a private network.

PPTP is one of the oldest versions of a VPN, due to it being one of the oldest versions it is also considered one of the more vulnerable VPNs.  The PPTP does offer quicker connection speeds than some of the other VPNs, but lacks some of the more secure features of modern modems.  The OpenVPN has grown in popularity as it is deemed almost unbreakable due to it’s strong encryption and authentication.  Lastly, the SSTP is popular due to it being compatible with most Microsoft applications.  The downside to the SSTP is it is proprietary property and developers do not have the underlying code.  However, this may not be a downside to Microsoft or Microsoft users as it could help enhance the security of the VPN.

Though VPNs are a means to secure data on a public network, anything that touches the internet is vulnerable to being hacked.  Some of the techniques used to circumvent VPNs are, malicious ads (bait and switch), login credentials and DDOS attacks.  Malicious ads can carry malware, if users are not able to identify the fraudulent add before clicking the add, malware could be loaded onto the machine.  Log-in credentials can stolen and used to connect to a VPN, again this is up to the user to secure their data, if users are careless with their passwords, VPN security can be circumvented.  Lastly, DDOS attacks can be utilized against VPNs, however depending on the type of VPN utilized a DDOS attack could be thwarted, but it is a technique utilized by havers. 

Overall VPNs are effective at thwarting most attacks to a network and are encouraged for use.

V/r

Jeff Cannon

https://www.technadu.com/can-vpn-be-hacked/45630/

https://www.netmotionsoftware.com/blog/connectivity/vpn-protocols

RESPONSE 2:

Virtual Private Network (VPN) allows for a private network connection over the Internet.  VPNs creates a secure tunnel for the transmission of network traffic.  There are two types of VPNs:  remote access and site-to-site. 

Remote access VPN allows users to connect via a secure VPN tunnel to access a private networks services and resources while off-site.  Remote VPNs also serve to bypass regional Internet restrictions by routing your connection using a different patch where those restrictions do not exist.

Site-to-site VPN or router-to-router VPN is used by larger companies that have satellite office in different locations.  Site-to-site VPN allows those satellite locations to connect to other sites within their network structure. 

Although VPNs are used to establish a secure connection over the Internet, they are still subject to security risks depending on the type of encryption algorithm used to secure the connection. Encryption of these tunnels can be broken is there are known vulnerabilities or if the encryption key is accessed by a bad actor.  The success of stealing encryption keys uses multiple tactics like trickery, computing power, time dedicated to breaking keys, and behind-the-scenes persuasion (VPN Mentor, 2021).  Another existing vulnerability for VPNs tracing of your location based on IP leaks via your web browser during the transmission network traffic.  

-Claudia 

References:

Geeks for Geeks. (10 April 2019).  Types of Virtual Private Network (VPNS) and it Protocols.  Retrieved 18 August 2021 from https://www.geeksforgeeks.org/types-of-virtual-private-network-vpn-and-its-protocols/

VPN Mentor (27 Jun 2021). Can VPNs Be Hacked? We Did The Research, Here’s the 2021 Guide.  Retrieved 18 August 2021 from https://www.vpnmentor.com/blog/can-vpns-hacked-take-deeper-look/

Security Policy

 

For part 1 of the case project

1. Copy and paste the five question below to a Microsoft Word document then use the following link and provide the answers to those questions.

https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/policy/security-policy.html

There are three links at the bottom of the paragraph on the above site that takes you to subcatgories of Security Policies that you may need to use to get some answers.

1. How are Security policy rules evaluated?

2. What comes before generic rules?  Why?

3. Which traffic will generate a log entry?

4. What are the required fields for a Security policy rule? 

5. If you configure the Action field to block traffic by silently dropping packets, what issue can that create for the end-user?

Firewall 9.1 Essentials: Configuration and Management

For part two of this Case Project

1. Click on this link https://beacon.paloaltonetworks.com/student/catalog to go to Beacon to login to your account. 

2. After you have logged in, click on this link https://beacon.paloaltonetworks.com/student/path/642692-firewall-9-1-essentials-configuration-and-management to take you to the Firewall 9.1 Essentials: Configuration and Management course on Beacon. 

3. Add Firewall 9.1 Essentials: Configuration and Management to your favorites (by clicking on the heart next to favorite above the title.

4. To receive credit, you will need to take a screenshot of your favorites page from Beacon, showing you have added this course, with your profile name also visible in that screenshot.

(To capture your profile name, after you get to your Favorites page, click on your profile once more to bring up your profile name.  Take your screenshot so that it shows that you have added this to your favorites.)

5. Paste the screenshot on same document as the five questions you answered from part one of this assigment.

operating system

    

Assignment 4: Page Replacement Schemes, Clock Algorithm 

CSci 430: Introduction to Operating Systems Summer 2020 

Overview 

In this assignment you will be implementing some pieces of a memory paging system simulator framework, and you will be implementing a Clock page replacement algorithm. The simulator will allow you to take a stream of page references, like we have done by had in our written assignments and in class, and simulate a physical memory of some number of frames, where placement and replacement decisions are made and the content of the physical memory frames will change in response to the stream of page references being simulated. 

Questions 

  • What are the basic steps an OS needs to perform in order to manage a paging memory system and make placement and replacement decisions?
     
  • What are the similarities in implementation between different page replacement algorithms? What are their differences?
     
  • What information does a page replacement scheme need to keep track of to make a page replacement decision?
     
  • How does the clock page replacement scheme work? How is it implemented?
     
  • How does a clock scheme perform compared to a FIFO scheme?
    Objectives
     
  • Implement a clock paging scheme by hand within a paging system simulator framework.
     
  • Look at use of C++ virtual classes and virtual class functions for defining an interface/API
     
  • Better understand how paging systems work, and in particular what information is needed to be tracked to
    make page replacement decisions.
    Introduction
    In this assignment you will be implementing some pieces of a memory paging system simulator framework, and you will be implementing a Clock page replacement algorithm. You will be given an implementation of the simple FIFO page replacement scheme, described in chapter 8 of our textbook. You will be implementing a simple version of the Clock page replacement scheme, using a normal frame pointer and a single use bit to approximate usage information for pages being used in the paging system.
    The paging system simulator framework consists of the following classes. There is a single class given in the PagingSystem.[hpp|cpp] source files that defines the framework of the paging system. This class handles the outline of the algorithm needed for a paging system, and has methods to support loading files of page stream information, or to generate random page streams, to use in simulations. This class has a runSimulation() function that is the main hook into the simulator. The basic algorithm of the paging simulator is to process each new page reference. For each new page reference, we first determine if the reference is a “hit” or a “fault”. If it is a hit, then nothing further needs to be done except to update any system usage statistics.
    For a page fault, the referenced page needs to be loaded into memory. When a page fault occurs, if memory is not yet full, a simple placement decision is made (using the doPagePlacement() function). Page placement in this simulation is simple, the first empty physical frame of memory will always be selected to place the new page reference into. When memory is full, a page replacement decision needs to be done first. The page replacement decision is handled by the doPageReplcement() and makeReplacementDecision() functions.
     

 

  

However implementation of page replacement decisions are done by a separate helper class (called scheme in the PagingSystem simulator). A abstract API/interface has been defined that describes how a page re- placement scheme class is accessed and used. The abstract API/base class is defined in the files named PageReplcementScheme.[hpp|cpp]. Most of the functions in this class are virtual functions, meaning that concrete subclasses must be created of this base class and implement those virtual functions. For the assignment you have been given a working FifoPageReplacementScheme.[hpp|cpp] concrete class that implements the simple FIFO page replacement scheme. A class that can act as a PageReplacementScheme has the following interface. The main function of such a class is the makeReplacementDecision() function. Whenever memory is full, the paging simulator will call this function to ask the page replacement scheme to select which frame of memory should be kicked out. All subclasses of the PageReplacementScheme base class need to implement an algorithm to be able to select the frame for page replacement when needed. 

The PageReplacementScheme API has a few other functions. The paging system simulator will call the scheme whenever a page hit occurs, because some page replacement schemes will update information about page usage based on when or how often the page has been hit. Another major API function that the PageReplacementScheme subclasses implement is the getSchemeStatus() function, which is called to get a snapshot of the current status of the replacement scheme, to get insight into its decision making process. 

There is a working FIFO page replacement implementation given already to you as part of the assignment. Your main task, after adding some functionality to the PagingSystem simulator class, will be to implement a basic Clock page replacement scheme, which is a modification of the basic FIFO scheme. 

Unit Test Tasks 

For this assignment, you will first of all be completing some of the functions in the PagingSystem class to get the basic simulator running. Then once the simulator is complete, you will be implementing the functions of the ClockPageReplacmentScheme.[hpp|cpp] to create a Clock page replacement algorithm. 

So for this assignment, as usual, you should start by getting all of the unit tests to pass, and I strongly suggest you work on implementing the functions and passing the tests in the given order. To get the simulator class completed you will first need to complete the following tasks. 

1. The first test case of the unit tests this week simple tests the accessor methods of the PagingSystem class, and the functions to load and generate simulated page streams. As a warmup exercise the get accessor methods of the PagingSystem class have been left unimplemented. You need to complete these functions to get the first test case working: getMemorySize(), getSystemTime() getNumPageReferences(). 

2. The next function you need to implement, still used in the first test case, is the isMemoryFull() function. This function should return false if any of the frames of memory are an EMPTY_FRAME, and it will return true if all of the frames are non empty. 

3. The next function you need to implement is the isPageHit() information function. This function also returns a boolean result. The current page being referenced in the simulation will be pageReference[systemTime], that is to say, given the current systemTime the page referenced at that time by the simulated page reference stream is found in the array pageReference[systemTime]. Given the current systemTime, the isPageHit() function should return true if the page being referenced is currently in memory (which is a page hit). Otherwise it should return false. 

4. The final task you need to do to get the simulator working is to finish the doPagePlacement() function. Page placement happens whenever there are free frames of memory, so that we simply want to pick the next free frame to load the current referenced page into. The doPageReplacment() function has already been completed for you, because it actually relies on calling the helper scheme instance to do the actual page replacement algorithm. For the doPagePlacement() function, you should first check if memory is full. Page placement should never be called if memory is full, so if memory is actually full you need to throw a SimulatorException(). But if memory is not full, you need to do the actual work of a page placement. For a page placement, you should search through memory and find the first frame that is an EMPTY_FRAME. Once found, this frame should be replaced with the current page reference (e.g. pageReference[systemTime]). 

Once these 4 tasks are complete, the first 5 test cases of this assignment should be passing. These test the simulator, load page streams, and test using the basic FIFO page replacement scheme to make page replacement decisions. However the final test Case 6 will not be working as it tests the Clock page replacement scheme class. 

 

  

So the next step is to implement a Clock page replacement policy. Most of the functions in the ClockPageReplacementScheme.[hpp| have been left for you to implement. However, many of the implementations of these functions will be similar to the
same functions given in the FifoPageReplacementScheme.[hpp|cpp] files. 

Perform the following tasks: 

1. You will need a framePointer for your clock scheme, just like the fifo page replacement scheme. But you will also need to keep an array of use bits, 1 bit for each physical frame of memory. I recommend you use an array of int or an array of bool types for your use bits. 

  1. You have been given the implementation of the constructor for your class. It works the same as the fifo class, it simply calls the base class constructor, then calls the resetScheme() member function. As your second task you should implement the resetScheme() class. You should initialize the framePointer like the fifo class does. But in addition, you need to dynamically create your array of use bits here. Subclasses of the PageReplacementScheme have a member variable named sys which is a pointer to an instance of the PagingSystem class that the scheme is working with. You can query the sys object for needed information. For example you can do sys->getMemorySize() to find out what the size of the simulated memory is. This may be useful because in addition to initialize the framePointer, you should dynamically allocate your array of use bits here to hold memorySize bits. And you should initialize all of the use bits to be 1 or true at this point, because after initial page placement, all of the use bits should initially be 1.
     
  2. Next implement the pageHit() member function. The fifo class doesn’t need to do anything for a page hit, but for the Clock scheme, you should set the use bit to 1 for a page hit. When the pageHit() function is called, the frame number of the page that was hit is provided as the parameter, so you simply need to set the use bit of that corresponding frame to 1 to handle a page hit.
     

4. Implement the makeReplacementDecision() function next. The replacement decision for clock is more complex than for fifo. You have a framePointer, but you first need to scan memory until you find the next frame that hasausebitsetto0. Soiftheframethattheframepointerhasausebitof1,youneedtoflipitto0and move to the next frame. Thus you need to implement a loop here that keeps checking the use bit, and flipping itto0untilitfindsausebitof0. Onceaframeisfoundwithausebitof0thatshouldbetheframethatis selected to be replaced. That frame number should be returned from this function. But before you return, you should make sure that the framePointer points to the frame after the one that will be replaced. You should also set the use bit of the frame that will be replaced to be 1, because whenever a new page is loaded its use bit should initially be set to 1. 

5. If you get these 4 steps working correctly, you should now be able to pass all of the unit tests. However, the system tests will not pass yet until you implement the getSchemeStatus() function. This function is pretty similar to the implementation of the fifo class, so you can start by copying the code from the fifo class for this function to your clock class. The only difference is that the clock get scheme status function should display the use bits for each frame of its output. So you will need to add code to show the use bit associated with each frame to the output string returned. Once you get this output correct, your system tests should then pass successfully as well. 

System Tests: Putting it all Together 

Once all of the unit tests are passing, you can begin working on the system tests. 

As with the previous assignment, the assg04-sim.cpp creates a sim program that uses command line argument to set up and run a simulation. The paging system simulator is invoked like this: As with the previous assignment, the assg04-sim.cpp creates a sim program that uses command line argument to set up and run a simulation. The paging system simulator is invoked like this: 

$ ./sim

Usage: sim scheme memorySize pageref.sim

 Run page replacement simulation on the given page reference

 stream file.  Output shows the state of memory (loaded pages

 in each memory frame) after each page reference as well as

 summary information about hit/miss performance.  You can

 select from different page replacement schemes by specifying

 the scheme parameter.

 

Options: 

 

  

 scheme       The page replacement scheme to use, current 'fifo'

              and 'clock' are supported

 memorySize   The number of physical frames of memory to simulate

 pageref.sim  Filename with page references, one per line,

              that represent references to pages of a running

              (simulated) process or set of processes

The simulator requires 3 command line arguments to run. You first specify the page replacement scheme to use. Only fifo and clock will be supported at this point in implementing the assignment. The next parameter specifies the size of the memory that will be used in the simulation (in terms of the number of frames of physical memory available). The last parameter is the name of a file that contains a page reference stream that should be used for the simulation. 

As mentioned, if you correctly modify the getSchemeStatus() function to display the use bits for each frame in addition to the other information, then you should be able to pass the given system tests for this assignment as well. Just add the use bit information you are keeping track for each frame of the system in the output. 

Extra Credit Opportunity 

In this assignment you have been given a FIFO implementation, and if you were successful, you implemented a Clock page replacement scheme. The other two page replacement schemes we study in this course are the least recently used (LRU) and optimal (OPT) schemes. If you are interested in this paging system simulation, and/or would like an opportunity to make up some points for the class for previous assignments or tests, I will give up to 10 points each for a LRU and/or an OPT page replacement scheme implementation. You should start by simply copying the FifoPageReplacementScheme.[hpp|cpp] files and renaming the class from that to for example LruPageReplacementScheme and OptPageReplacementScheme. Both of these schemes need to look at the history (or future references) of the page reference stream. So if you need to you can add an accessor method to return the pageReference array from the PagingSystem simulator so that these classes can access the page reference stream. For LRU, another approach is to use time stamps. You can just use the system time, and any time a page is loaded or is referenced (a hit) you update the time stamp. Then for LRU you would want to search your time stamps to find the oldest time reference, which will be the least recently used page/frame, and select it for replacement. 

To get the full 10 points, make sure you also update PagingSystem so that the new scheme can be specified as a potential page replacement scheme. Also you need to add unit tests for your scheme, and most importantly, you should add at least 1 or 2 system tests giving correct output/working of your replacement scheme. For example the pageref-01.sim page reference stream is the same as the one used for the examples in our book. So if you implement OPT or LRU you should get the same final result shown in the text if you use a simulation with 3 physical frames of memory. 

Assignment Submission 

In order to document your work and have a definitive version you would like to grade, a MyLeoOnline submission folder has been created named Assignment-04 for this assignment. There is a target in your Makefile for these assignments named submit. When your code is at a point that you think it is ready to submit, run the submit target: 

$ make submit

tar cvfz assg04.tar.gz PagingSystem.hpp PagingSystem.cpp

   ClockPageReplacementScheme.hpp ClockPageReplacementScheme.cpp

   PagingSystem.hpp PagingSystem.cpp ClockPageReplacementScheme.hpp

   ClockPageReplacementScheme.cpp

The result of this target is a tared and gziped (compressed) archive, named assg04.tar.gz for this assignment. You should upload this file archive to the submission folder to complete this assignment. I will probably be also directly logging into your development server, to check out your work. But the submission of the files serves as documentation of your work, and as a checkpoint in case you keep making changes that might break something from when you had it working initially. 

 

  

Requirements and Grading Rubrics
Program Execution, Output and Functional Requirements 

  1. Your program must compile, run and produce some sort of output to be graded. 0 if not satisfied.
     
  2. 20 pts all accessor methods implemented and first test case passes.
     
  3. 10 pts isMemoryFull() function works and passes test cases.
     
  4. 10 pts isPageHit() function is working and passing test cases.
     
  5. 10 pts doPagePlacement() function implemented as asked for. Function correctly selects first empty page and replaces it when asked.
     
  6. 10 pts Have a good representation of the use bit defined for the clock page replacement class.
     
  7. 10 pts resetScheme() is implemented and correctly creates and initialize needed data structures for the clock
    algorithm.
     
  8. 10 pts pageHit() function implemented and correctly updates use bit for frame when a page hit occurs.
     
  9. 15 pts makeReplacementDecision() implemented and working as asked for. Correctly uses use bit and clock
    algorithm to select page and return it for replacement.
     
  10. 5 pts getSchemeStatus() added and working correctly, all system tests passing for the assignment.
     
  11. 10 bonus pts for a working LruPageReplacementScheme class.
     
  12. 10 bonus pts for a working OptPageReplacementScheme class.
     

Program Style and Documentation 

This section is supplemental for the first assignment. If you set up the Atom editor as described for this class, part of the configuration is to automatically run the uncrustify code beautifier on your code files every time you save the file. You can run this tool manually from the command line as follows: 

$ make beautify

uncrustify -c ../../config/.uncrustify.cfg --replace --no-backup *.hpp *.cpp

Parsing: HypotheticalMachineSimulator.hpp as language CPP

Parsing: HypotheticalMachineSimulator.cpp as language CPP

Parsing: assg01-sim.cpp as language CPP

Parsing: assg01-tests.cpp as language CPP

Class style guidelines have been defined for this class. The .uncrustify.cfg file defines a particular code style, like indentation, where to place opening and closing braces, whitespace around operators, etc. By running the beautifier on your files it reformats your code to conform to the defined class style guidelines. The beautifier may not be able to fix all style issues, so I might give comments to you about style issues to fix after looking at your code. But you should pay attention to the formatting of the code style defined by this configuration file. 

Another required element for class style is that code must be properly documented. Most importantly, all functions and class member functions must have function documentation proceeding the function. These have been given to you for the first assignment, but you may need to provide these for future assignment. For example, the code documentation block for the first function you write for this assignment looks like this: 

  

/**
* @brief initialize memory
*
* Initialize the contents of memory. Allocate array larget enough to * hold memory contents for the program. Record base and bounds
* address for memory address translation. This memory function
* dynamically allocates enough memory to hold the addresses for the
* indicated begin and end memory ranges.
*
*
*
*
*
*

 

@param memoryBaseAddress The int value for the base or beginning address of the simulated memory address space for this simulation. 

 

@param memoryBoundsAddress The int value for the bounding address, e.g. the maximum or upper valid address of the simulated memory address space for this simulation. 

 

   

*
* @exception Throws SimulatorException if
* address space is invalid. Currently we support only 4 digit 

  • *    opcodes XYYY, where the 3 digit YYY specifies a reference
     
  • *    address.  Thus we can only address memory from 000 – 999
     
  • *    given the limits of the expected opcode format. */
     

 

This is an example of a doxygen formatted code documentation comment. The two ** starting the block comment are required for doxygen to recognize this as a documentation comment. The @brief, @param, @exception etc. tags are used by doxygen to build reference documentation from your code. You can build the documentation using the make docs build target, though it does require you to have doxygen tools installed on your system to work. 

$ make docs

doxygen ../../config/Doxyfile 2>&1

 | grep warning

 | grep -v "file statement"

 | grep -v "pagebreak"

 | sort -t: -k2 -n

 | sed -e "s|/home/dash/repos/csci430-os-sims/assg/assg01/||g"

The result of this is two new subdirectories in your current directory named html and latex. You can use a regular browser to browse the html based documentation in the html directory. You will need latex tools installed to build the pdf reference manual in the latex directory. 

You can use the make docs to see if you are missing any required function documentation or tags in your documentation. For example, if you remove one of the @param tags from the above function documentation, and run the docs, you would see 

$ make docs

doxygen ../../config/Doxyfile 2>&1

 | grep warning

 | grep -v "file statement"

 | grep -v "pagebreak"

 | sort -t: -k2 -n

 | sed -e "s|/home/dash/repos/csci430-os-sims/assg/assg01/||g"

HypotheticalMachineSimulator.hpp:88: warning: The following parameter of

HypotheticalMachineSimulator::initializeMemory(int memoryBaseAddress,

   int memoryBoundsAddress) is not documented:

 parameter 'memoryBoundsAddress'

The documentation generator expects that there is a description, and that all input parameters and return values are documented for all functions, among other things. You can run the documentation generation to see if you are missing any required documentation in you project files. 

NOTE

the assignment has to be done in code server i will provide the login information. all the codes are in there as well under assignment 4 file. we need to find the error and run the code. there are youtube videos uploaded by professor as well.

Reseach paper

After reading the required articles this week, please write a research paper that answers the following questions: 

Computer

1. For a single cycle computer system, how to calculate the cycle time based on with/without pipeline? CPI (Cycle per instruction), there is standard formula equation, please explain it
2. What about multi-cycle systems?

Display your name here X = 4, y = 30 х Display your name here х x = 5, y = 94 Display your name here х x = 210, y = 94

Beginning with the file that you downloaded named Proj06.java, create a new file named Proj06Runner.java to meet the specifications given below.

 

This is about java. I would appreciate your help!

Please do not provide a “copy and paste answer”! 

Among other things, the purpose of this assignment is to assess the student’s ability to write a program dealing with window events, mouse events, and the Delegation Event Model.

PROGRAM SPECIFICATIONS

Beginning with the file that you downloaded named Proj06.java, create a new file named Proj06Runner.java to meet the specifications given below.

Note that the code in the file named Proj06.java.

Be sure to display your name in both locations in the output as indicated.

When you place both files in the same folder, compile them both, and run the file named Proj06.java, the program must display the text shown below on the command line screen.

I certify that this program is my own work
and is not the work of others. I agree not
to share my solution with others.
Replace this line with your name

In addition, your program must display a single 300-pixel by 100-pixel Frame object as shown in the images below. When you click the mouse in the working area of the Frame, the coordinates of the mouse pointer must be shown in RED above the mouse pointer. (Multiple images are shown below to show the result of clicking at different locations in the working area of the Frame. Note that the 0,0 coordinate location is at the outer upper-left corner of the Frame, which is beyond the reach of the mouse pointer.)

When you click the X-button in the upper-right corner of the Frame object, the program must terminate and MUST RETURN CONTROL TO THE OPERATING SYSTEM.

You may find it necessary to consult the Java documentation and take class inheritance into account to meet these specifications.

Output:

Display your name here X = 4, y = 30 х Display your name here х x = 5, y = 94 Display your name here х x = 210, y = 94

Proj06.java (can’t be modified)

/*File Proj06

The purpose of this assignment is to assess the student’s

ability to write a program dealing with window events,

mouse events, and the Delegation Event Model.

************************************************************/

// Student must not modify the code in this file.

public class Proj06 {

public static void main(String[] args){

new Proj06Runner();

}//end main

}//end class Proj06

//========================================================//

Linux2

 Answer the following questions (Don’t cut and paste answers form the book or the Internet):

  1. From the list of commonly used Linux commands shown, provide a functional description for each.  Expand the table to include 10 other Linux entries of your choice.

Linux Command    Function

cd 

ls 

mv 

man 

chmod 

traceroute 

ifconfig                      

  1. List at least six common distributions of Linux.  For example:  Debian, Ubuntu, etc.
  2. Provide a brief definition/discussion of the following command features:
    1. Backslash character
    2. Pipe
    3. Stat
    4. Netstat
    5. Jobs
    6. Sudo
    7. Chown
    8. Bang (“!”)
  3. Describe the use of ‘key combinations’ ( e.g. “CTRL-V” )and the use of the dash sign in-between the key which must be used in combination.

Organizational Objectives and Priorities

 

Organizations need to clearly identify risks before they become relative issues. Therefore, it is important for security professionals to comprehend what must be done to construct strategies that are considered to be proactive resources for analyzing and assessing cybersecurity threats before they become active issues.

In 750-1000words, select an area of the industry that you are interested in and create a hypothetical business. Refer to the “Business Profile Template” when completing this portion of the assignment. Define the business environment by making sure to:

  1. Describe the organization’s mission, objectives, stakeholders, and how it fits into the industry.
  2. Describe the main product, service offerings, and consumer base.
  3. Describe the main departments and their roles, including all major stakeholders.
  4. Describe the company’s information technology infrastructure to include hardware, software, networks, data centers, facilities, and related equipment used to develop, test, operate, monitor, manage, and/or support information technology services.
  5. Describe a common flow of information and decisions at the following levels within the organization: Executive, Business/Process, Implementation/Operations.

Then, in a Word document, begin implementing a cybersecurity framework. Refer to the “Framework for Improving Critical Infrastructure Cybersecurity,” located within the Course Materials, focusing specifically on “Table 2: Framework Core.” Make sure to:

  1. Align the hypothetical business to the NIST Cybersecurity Framework CSF
  2. Prioritize organizational efforts and business needs.
  3. Identify individual elements of cybersecurity risk (threats to and vulnerabilities of) and how to manage them.
  4. Describe how the organization incorporates privacy principles in relation to data collection, disclosure, and retention.

APA style is not required, but solid academic writing is expected.

Refer to “Organizational Objectives and Priorities Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion. 

You are required to submit this assignment to LopesWrite. Refer to the LopesWrite Technical Support articles for assistance.