computer architecture Embedded systems

For each of the following examples, determine whether this is an embedded system, explaining why or why not. 

Question 1 

Are programs that understand physics and/or hardware embedded? For example, one that uses finite-element methods to predict fluid flow over airplane wings? 

Question 2

Is the internal microprocessor controlling a disk drive an example of an embedded system?

 Question 3

Is an I/O drivers control hardware, so does the presence of an I/O driver imply that the computer executing the driver is embedded? 

Question 4

Is a PDA (Personal Digital Assistant) an embedded system?  

Question 5

Is the microprocessor controlling a cell phone an embedded system?  

Question 6

Is the computer controlling a pacemaker in a person’s chest an embedded computer?  

Question 7

List and briefly define the possible states that define an instruction execution.  

Question 8

List and briefly define two approaches to dealing with multiple interrupts.  

Question 9

Consider two microprocessors having 8- and 16-bit-wide external data buses, respectively. The two processors are identical otherwise and their bus cycles take just as long.  (a) Suppose all instructions and operands are two bytes long. By what factor do the maximum data transfer rates differ?  (b) Repeat assuming that half of the operands and instructions are one byte long.  

Research paper abstract summary on roles of the SystemAdministrators or Cyber Security

Subject: Business Network Systems Management

Topic:  The roles of the System Administrators or The roles of the Cyber Security

1. Please add Research Paper Topic for roles of SystemAdministrators/Cyber Security as a topic sentence like the title of a journal article.

2. The topic must be very specific and CAN NOT BE too broad otherwise it will be returned back.

3. Add brief 1 paragraph an abstract summary (600-800 words) of what you would like to say about that topic (i.e., ).

Subject book used: The Practice of System and Network Administration, Volume 1 3rd edition.

Security Architecture and Design – Project paper

  

In the following scenario, you are the CISSO of a Major E-commerce Organization. The organization has decided to migrate its entire IT infrastructure and associated processes to the cloud. Considering the ecosystem of the cloud and the ever-present threats, you’ve been tasked to develop a secure implementation plan which includes the ability for threat modeling and simulations.

  

Length: Minimum of 600 words

Report

     

Next comes some analysis. Examine and discuss PCI DSS in   a limited, albeit complementary, way. Look specifically at Kentucky’s laws,   regulations, and business practices in order to examine PCI DSS from a   state-level perspective. Are there other Kentucky laws that govern payment   cards? What Kentucky laws implicate PCI DSS? What are some things that   Kentucky business leaders need to be aware of when they accept payment cards   at their establishments?

Part B: Memo to the CEO

 

Write a 2- to 3-page memo to the Chief Executive Officer (CEO) of the Vampire Legends organization that includes the following two parts:

  • Part 1: Analysis of Components of Information Security that does the following:
  • Categorizes the components of information security
  • Analyzes the components of information security as it applies to the scenario presented in Vampire Legends
  • Contains a breakdown of the budget report
  • Discusses your allocation strategy based on the risks and expenses involved
  • Describes your choice for the best advertising campaign
  • Outlines the course of action in handling information security threats in the future
  • Part 2: Role of Ethics that does the following:
  • Illustrates the role of ethics as presented in the Vampire Legends simulation conflict to reflect the relationship between ethics and the success of the Vampire Legends organization
  • Describes the consequences of the conflict
  • Discusses the solution to the conflict
  • Discusses the impact of ethics on revenue

Assignment 2

 Graded Assignment:  Week 2 – (Complete the following assignment in one Microsoft Word document)Chapter 3: Questions for Discussion #1 through #4

  • How do you describe the importance of data in analytics? Can we think of analytics without data?
  • Explain. Considering the new and broad definition of business analytics, what are the main inputs and outputs to the analytics continuum?
  • Where do the data for business analytics come from? What are the sources and the nature of those incoming data?
  • What are the most common metrics that make for ­analytics-ready data?

Chapter 3: Exercise 12

  • Go to data.gov—a U.S. government–sponsored data portal that has a very large number of data sets on a wide variety of topics ranging from healthcare to education, climate to public safety. Pick a topic that you are most passionate about. Go through the topic-­specific information and explanation provided on the site. Explore the possibilities of downloading the data, and use your favorite data visualization tool to create your own meaningful information and visualizations.

Chapter 4: Questions for Discussion #1 through #5

  • Define data mining. Why are there many names and definitions for data mining?
  • What are the main reasons for the recent popularity of data mining?
  • Discuss what an organization should consider before making a decision to purchase data mining software.
  • Distinguish data mining from other analytical tools and techniques.
  • Discuss the main data mining methods. What are the fundamental differences among them?

Chapter 4: Exercise 1

  • Visit teradatauniversitynetwork.com. Identify case studies and white papers about data mining. Describe recent developments in the field of data mining and predictive modeling.

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.  Below is the general assessment rubric for this assignment and remember that late penalties are built within the overall assessment so complete this assignment by the Sunday due date of week 2. 

Virtual Machine

 Your PowerPoint should contain 10-15 slides. You can use Microsoft Teams to record the audio narration of your PowerPoint presentation (preferred). Please cover the following topics in this presentation:

  • The CTF category
  • Problem solved
  • Steps used to solve
  • The solution
  • Strategies, pitfalls, lessons learned
  • Workplace relevance

1 Discussion and 1 Case Study and weekly Summary

Discussion 4.1

Describe the basic steps in conducting a wage and salary survey. What are some of the factors to consider?

Choose only TWO (2) case studies from the attachment below

Please note that the case studies are not related and so must be completed separately. Do not combine your answers and form a report. After completing your first chosen case study, you should start your second one on a different page.

You do not need an abstract. For each case, include an introduction/summary of the case and then answer the questions.

Writing Requirements

  • 3–5 pages in length for both case studies (excluding the cover page, abstract, and reference list)
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

Weekly Summary 3.1

This week you will write and submit a minimum of two (2) full page (not including cover page and reference section) summary of the important concepts learned during the week. The paper will include a summary of the topics covered in the readings/chapters for this week. 

this should be based on chapter 5 and 6 weekly summary attached