computer architecture March 2

  • What is the significance of pipelining in computer architecture?
  • Explain arithmetic and instruction pipelining methods with suitable examples. 
  • What factors can cause the pipeline to deviate its normal performance?
  • How the pipeline architecture improves the performance of the computer system?
  • What are the major issues or hazards associated with pipelining?

Big Data Homework

 The Final Portfolio Project is a comprehensive assessment of what you have learned during this course.  The Final Project has two parts: Limitations of Blockchain and Emerging Concepts.Blockchain continues to be deployed into various businesses and industries. However, Blockchain is not without its problems.  Several challenges have already been associated with the use of this technology.  Identify at least 5 key challenges to Blockchain. Additionally, discuss potential solutions to these challenges. Lastly, please discuss if we will see the limitations to blockchain be reduced or mitigated in the future.  There are several emerging concepts that are using Big Data and Blockchain Technology. Please search the internet and highlight 5 emerging concepts that are exploring the use of Blockchain and Big Data and how they are being used.Conclude your paper with a detailed conclusion section which discusses both limitations and emerging concepts. The paper needs to be approximately 6-8 pages long, including both a title page and a references page (for a total of 8-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.Your paper should meet the following requirements:

  • Be approximately seven to ten pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course, the course textbook, and at least ten scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing

Technical Spec Comparison

 Overview: In this assignment, you will identify and list the technical specifications of a hardware device and differentiate among alternative replacements.

 Instructions: 

• Select one hardware component (CPU, RAM, motherboard, HD, video card, camera, sound, or monitor) that you want to improve in your current computer system.

 • List your current component’s specifications and shop for two new components that are potential replacements. 

• Compare the three items (your old part, and the two possible replacements) by listing their specifications side by side and comparing the cost of the new items.

 • Which replacement is the best choice for your system? Explain your reasoning. Requirements:

 • Submit a Word document in APA format.

 • Three pages in length, excluding the Title and Reference pages. 

• At least two resources. Be sure to read the criteria below by which your work will be evaluated before you write and again after you write. 

Research Overview

I need to write a research overview to my topic and I will give you my topic and the requirements in the file upload, please let me know if you need any other information. I will be sending you my research proposal topic. From that you can use other references by searching online. I need the references to be pasted at the end of the assignment. 

I have attached a word document in which the research topic and other required details are included which should be there in the research overview. 

the subject is Research Methods 

In which we will be writing a research paper.

Due Date: Saturday- 9th October 2021 before night 

Bid Value 10-15$

No. of Pages: 3-5 pages

CYBERLAWS & ETHICAL HACKING

Motivation of a Hacker

Hackers can have various motives, many of which are similar to the motives for committing traditional crimes:

  • Status/validation: Hackers seeking to make a name for themselves
  • Monetary gain: Hackers wanting to generate revenue for themselves or deny revenue to a target
  • Ideology: Hackers using malicious software to carry out activist attacks to promote a particular agenda; may include hacktivists, nationalists, or nation-state actors

Answer the following question(s):

1.What type of hacker do you think concerns corporations the most, and why?

2.What type of hacker do you think concerns the federal government the most, and why?

Please prepare an one page synopsis with adequate examples to support your answers.

Rethinking the Military 's Role in Domestic Emergencies Command Relationships (In Katrina 's Wake Case study) Writing assignment Analyze the major points of your base articles for research. Use your research time to develop a deep understanding of your

 Rethinking the Military ‘s Role in Domestic Emergencies Command Relationships (In Katrina ‘s Wake Case study)

Writing assignment

Analyze the major points of your base articles for research. Use your research time to develop a deep understanding of your topics so you can fully explain your part of the themed outline and support the group effort. Student will write a 5-page research paper (not including the references or title pages) using Times New Roman 12-point font, and APA 6th edition format. Student will provide an additional 4 references to the base document.

HURRICANE KATRINA CASE STUDY RESEARCH QUESTION

Command Relationships

  • Introduce the command relationships (Federal Military, State Military and Civil Agencies) that were established during Hurricane Katrina?
  • How did those command relationships effect the outcome of the Hurricane Katrina? Did they establish unity of command? What is the importance of establishing unity of command during natural disasters/ emergencies?
  • Provide examples and elaborate, using Hurricane Katrina to support your main point.

Reference for case study:

Tkacz, S. R. (2006). In Katrina ‘s Wake: Rethinking the Military ‘s Role in Domestic Emergencies. William & Mary Bill of Rights Journal,15(1), 301-334.
https://scholarship.law.wm.edu/cgi/viewcontent.cgi?referer=https://www.google.com/&httpsredir=1&article=1138&context=wmborj

Requirement: Provide case study research outline with thesis statement within 24 hrs

No plagiarism, use as many as credible sources for references.

Analyzing: Breaking Material into constituent parts, determining how the parts relate to each other and to an overall structure or purpose through differentiating, organizing, and attributing.

Applying: Carrying out or using a procedure through executing or implementing.

Understanding: Constructing meaning from oral, written, and graphic message through interpreting, exemplifying, classifying, summarizing, inferring, comparing, and explaining

Case Projects

Case 2- Window’s Steps Recorder

Dale Andrews, a desktop support technician, walked into the support center late one afternoon after a busy day diagnosing PC problems. He called out to anyone who was listening, “Help!”Dale explained to the support agents who were in the office that he had spent most of his day trying to replicate problems that several users were experiencing on their PCs. He said, “I spent several hours trying to figure out exactly what each user had done to cause the problems they reported. In some cases, I just couldn’t get the problem to reveal itself.

”As one of Dale’s desktop support colleagues, you suggested the support group investigate how to use a tool in Windows 8 called the Steps Recorder (this tool is called the Problem StepsRecorder in Windows 7, and in prior versions of Windows, it is called Screenrecorder). Several of the support staff expressed interest in this tool because they have all had experiences similar to Dale’s. Complete the following steps:”

Questions to answer:

1. Research how the Windows Steps Recorder works.

2. If you have access to a  Windows  PC,  set up an example of a common problem, then use the  Steps  Recorder to try out the utility.  For example,  with the  StepsRecorder running, open an application, such as Word or Excel, and try to open a document that doesn’t exist on your computer. You should get an error message. Next,  inspect the output from the  Steps  Recorder to learn about the kinds of information it captured when you tried to open a file that doesn’t exist.AlthoughSteps Recorder only works with recent Windows versions, if you use Windows XP or Vista, you can try out a similar tool called Screenrecorder, which can be downloadedfromtechnet.microsoft.com/en-us/magazine/2009.03.utilityspotlight2.aspx.

3. Write a brief procedure targeted to end-users that explains how to use the Steps Recorder”