Heterogeneous System Architecture

  1. What is the difference between between homogenous and heterogenous system architecture?
  2. Where are heterogenous system architecture applied?
  3. Why is coherence and consistency between FPGA cache, GPU and CPU in heterogeneous architecture beneficial? 
  4. What are the advantages and disadvantages of NUMA structure?
  5. Analyze the differences between distributed memory versus local memory (NUMA, NoC etc) in context of GPUs

Describe

 Describe asymmetric, symmetric and public versus private keys. Also pick a type of encryption AES, DES some type and provide an explanation of how that encryption can be used to protect the CIA triad. 

CMIS 102 6383 Introduction to Problem Solving and Algorithm Design

 The fifth assignment involves writing a Python program to determine whether a password meets all the requirements for a secure password. Your program should prompt the user for the candidate password and output either that the password is valid or the reason it is invalid. To be valid the length of the password must greater than some minimum length but less than some maximum. It must not include the substring “umgc” in any combination of upper or lower case letters. Finally, it must contain the # symbol in some position other than the first or last character. You should decide on the minimum and maximum allowable lengths.

Your program should include the pseudocode used for your design in the comments. Document the values you chose for the minimum and maximum allowable lengths in your comments as well.

You are to submit your Python program as a text file (.py) file. In addition, you are also to submit a test plan in a Word document or a .pdf file. 15% of your grade will be based on whether the comments in your program include the pseudocode and define the values of your constants, 70% on whether your program executes correctly on all test cases and 15% on the completeness of your test report. 

Violations of Policy

 

You are the Information Security Officer of Mahtmarg Manufacturing a small manufacturing company worth approximately $5 Million who provides fiber cable to local businesses, individual customers and to government organizations. In the course of the next eight weeks you will be creating your Information Security Plan (Issue-Specific Security Policy in Table 4-3 of the textbook) step by step using this scenario.

Your Task 

Step 5: Develop the Violations of Policy section of your ISP

In this week’s Lab you will develop the section on Violations of Policy which describes the penalties for violating policy and provides instructions on how to report policy violations.

Software -5 mid

 

Please provide detailed answers to the following questions
 

1) What is software engineering? Chapter 1
2) What are the fundamental activities that are common to all software
processes? Chapter 1
3) List the 5 principles of agile methods. Chapter 3
4) What are user requirements and system requirements? Chapter 4
5) What is the most important advantage of a client-server architecture?
Chapter 6
6) What are the 5 key activities in an object-oriented design process?
Chapter 7
7) Briefly describe the idea of open-source development. Chapter 7

TWO DISCUSSION QUESTIONS: ONE PARAGRAH EACH.

QUESTION 1:

  • Product evaluation is an important step to ensure that a product will meet the quality, features, and overall design that is acceptable to the consumer. Imagine that you are an evaluator for a new product. Describe common challenges that you will find in a controlled and a natural environment setting among users. Suggest actions that you can take in order to address or prevent these challenges.

QUESTIONS 2:

  • The ideal method of evaluation products involves volunteers. However, sometimes this is not feasible (that is, product time constraint, too expensive, et cetera). This is where experts who are knowledgeable about interaction design, needs, and typical behavior of users come into the picture. Choose a random product that you use daily and speculate on how a heuristic evaluation would be performed on that product. Provide a rationale for your response.

Illustrate Trojans, malware, and cryptology attacks

Part 1: Hacking Windows and Linux

Respond to the following:

  1. How can you distinguish between different operation systems by examining a listing of host services? 200 words minimum.
  2. Why are most networks, even small office/home office (SOHO) networks, considered mixed networks in terms of operating systems? Give some common examples of devices in a typical home that might be running Linux or a derivative of it. 300 words minimum. 
  3. How are UNIX/Linux and the Apple OS X related? 200 words minimum. 

Part 2: Windows 2000™ and Firewall Issues

Respond to the following:

  1. When Windows first released Windows 2000, a default install resulted in IIS being installed and running. Why do you think Microsoft was criticized for this? 200 words minimum.
  2. What are some of the problems that might result from only deploying a firewall at the perimeter of an organization? Do most Linux distros come with a firewall? If so, explain it. What are some of the features of Microsoft’s “Internet Connection Firewall”? 300 words minimum.