List The Following Briefly Each Question. With At-Least Six Sentences For Each

  • 4.1 List ways in which secret keys can be distributed to two communicating parties.
  • 4.2 What is the difference between a session key and a master key?
  • 4.3 What is a key distribution center?
  • 4.4 What entities constitute a full-service Kerberos environment?
  • 4.5 In the context of Kerberos, what is a realm?
  • 4.6 What are the principal differences between version 4 and version 5 of Kerberos?
  • 4.7 What is a nonce?
  • 4.8 What are two different uses of public-key cryptography related to key distribution?
  • 4.9 What are the essential ingredients of a public-key directory?
  • 4.10 What is a public-key certificate?
  • 4.11 What are the requirements for the use of a public-key certificate scheme?
  • 4.12 What is the purpose of the X.509 standard?
  • 4.13 What is a chain of certificates?
  • 4.14 How is an X.509 certificate revoked?

OS3

Please provide an elaborate answer to each of the following questions

1. How does the use of virtual memory improve system utilization? 

2. Why is the principle of locality crucial to the use of virtual memory? 

3. What are the four conditions that create deadlock? Explain your reasoning. 

4. What are the three conditions that must be present for deadlock to be possible? Please explain your point of view. 

5. What criteria are important in choosing a file organization? Justify your answer with facts. 

6. What are some advantages and disadvantages of sequential file organization? Please explain your point of view. 

7. What are the differences between a blocking I/O and a non-blocking I/O? 

8. Cite the differences between the implementation of hardware RAID and software RAID. Express your point of view. 

Notes:

Word Count: 5000 words (maximum) 

• Please read and apply the rules for referencing

• Overall presentation 10% 

• Structure 10% 

• Introduction 10% 

• Main body Critical analysis/evaluation 50% 

o Recommendations 10% 

o Conclusion 10% 

discussion

 This discussion forum focuses on traditional software processing models used by developers to create a successful system. Discuss at least three of the models. Identify each of their respective advantages and disadvantages. 

Portfolio Project

 

This week’s written activity is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited). 

Start your paper with an introductory paragraph.

Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

Prompt 2 “Big Data” (2-3 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 

Prompt 3 “Green Computing” (2-3 pages):  One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

• Be approximately seven to ten pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

information system

 

  

As an IT analyst for ballot, a company providing voting solutions to a global client base, you are working to convince the organization to move its infrastructure to a public cloud. With the growth the company is experiencing, and the internal data centers maxed out, you want to get the executives on board with moving to a public cloud rather than trying to expand the current infrastructure.

    Present the cost impact of staying on premise -vs- moving to the cloud, preferably with some tables and charts that clearly show the comparison.  One or two pages is all that is necessary.  Using the tabulations attached to this question

Discussion: Privileged Accounts

Privileged accounts, such as Administrator or root, have more privileges than an ordinary user account. Anyone with privileged access can perform nearly any action on a system or network. In many environments, privileged accounts and passwords are shared by IT staff.Privileged access management (PAM), also referred to as privileged account management, eliminates password sharing for privileged accounts. Instead, it uses a “privilege safe” with policies. When administrators need elevated privileges, they request them through the privilege safe, which checks the policy and issues a password for a limited period of time if conditions are met.Answer the following question(s):

  1. Other than the risk of a privileged account password falling into the hands of an attacker, what is at least one other drawback to sharing those passwords? Explain your answer.
  2. Do you see any pitfalls to using PAM? Explain your answer.

Fully address the questions in this discussion; provide valid rationale or a citation for your choices; and respond to at least two other students’ views.Initial post should be at least 350 words in length. Each reply post should be at least 150 words in length.

Rational Fractions

 

Advanced Programming in C++ – W4 Assignment

Rational Fractions

Chapter 13 Programming Exercise #10 Page 983

Additional Requirements

Use a template so the class works with any kind of number (i.e. int, float, double)

fractionType num1(5, 6);

fractionType num1(5.1, 6.2);

Tip:   get your class working with integer values first for numerator and denominator and convert to a template after it is working with ints.   When converting to a template you may need to move all of your implementation into the .h header file.      

Directions

You are to write a C++ program that meets the instruction requirements above. Use the assignment template to insert the assignment deliverables outlined above.

Deliverables

  • A description of your program.
  • Your C++ source code (do not submit screen shots).
  • A screenshot of your program running.
  • A short reflection outlining your experience developing the program.

Assignment Rubric

Grading Criteria Assignments

Maximum Points

·  A description of the program was not submitted,

·  A screenshot of the program execution was not submitted,

·  A copy of the program code was not submitted, or

·  A reflection of your programming experience was not submitted.

1

Program accomplishes requested operations per instructions

40

The code works and meets all assignment specifications

30

The code is organized and easy to follow and output is clear and clean

20

Uses software tools correctly and efficiently

10

Total

100

Assignment Template

Program Description 

Program Code

Program Execution

< A screenshot of a successful compile>

< A screenshot of successful run>

Reflection

Assignment of Cryptography

Evaluate the history of cryptography from its origins.  Analyze how cryptography was used and describe how it grew within history.  The writing assignment requires a minimum of two written pages to evaluate the history.  Use a minimum of three scholarly articles to complete the assignment.  The assignment must be properly APA formatted with a separate title and reference page.