Operating System ass 2

  

Please provide an elaborate answer to each of the following questions

1. How is a thread different from a process? 

2. What are the advantages of using multithreading instead of multiple processes? 

3. List four design issues for which the concept of concurrency is relevant. 

4. What is the key difference between a mutex and a binary semaphore? 

5. What scheduling criteria affect the performance of a system? Justify your answer with facts. 

6. What is the main function of a dispatcher? Give some examples of events when it is invoked. Think outside box. 

Word Count: 5000 words (maximum) 

Your work needs to be well written and have quality information. Your work must be clear and must be able to educate someone with no prior knowledge in the field of operating systems. 

Assignment Evaluation Rules: 

• • Overall presentation 10% 

• • Structure 10% 

• • Introduction 10% 

• Main body: Critical analysis/evaluation 50% 

o Recommendations 10% 

o Conclusion 10% 

Notes: 

• • Please read and apply the rules for referencing. 

system analysis and design2

 Develop two required BPM diagrams:

  • One for the medical providers (such as doctors, nurse practitioners) showing existing and planned use of the mobile platform for reviewing patient/consumer clinical results.
  • One for the medical providers showing existing and planned use of the mobile platform for placing test orders to treat patient/consumers.
  • Develop three separate use case tables for each of the BPM diagrams that will be developed:
    • One for the providers (such as doctors, nurse practitioners) showing existing and planned use of the mobile platform for reviewing patient/consumer clinical results.
    • One for providers showing existing use of the mobile platform for placing test orders to treat patient/consumers.
    • One providers showing planned use of the mobile platform for placing test orders to treat patient/consumers
  • Articulate the content of both the BPM diagrams and use case tables for both consumers and providers in detail.
  • Analyze two different scholarly papers that address mobile consumer applications in the health industry and mobile applications used by providers in the health industry.
    • The two scholarly papers that you analyze must be researched and may not include resources in the course.
  • Discuss your proposed end user requirements illustrated in your BPM diagrams and use cases for the consumer mobile application.
  • Discuss your proposed end user requirements illustrated in your BPM diagrams and use cases for the provider mobile application.
  • Evaluate at least five types of costs associated with developing these applications (the consumer and provider mobile applications) based on both the in-house and purchased software development options discussed in your text.

Applied IT Assignment Week 3

Project Research and Annotated Bibliography 

In order to make a recommendation to the business for the best technological solution to meet their needs, thorough research must be performed. For this assignment, based on your specific project needs, research a minimum of 3-4 different options. Create an annotated bibliography, and provide a brief summary of what the option offers. 

This will be used when writing phase two of your project. All references must be in proper APA 7 format. Include a cover page for your assignment. A references page is not required as you must provide each full reference within your paper for each annotated bibliography source. 

Note: 3 pages needed

Our Project: Dominos Pizza Group PLC

Data mining

· What were the traditional methods of data collection in the transit system

· Why are the traditional methods insufficient in satisfying the requirement of data collection

· Give a synopsis of the case study and your thoughts regarding the requirements of the optimization and performance measurement requirements and the impact to expensive and labor-intensive nature.

SQL and Algebra discussion response

Please respond to the following discussion below with 150 words or more relating to relational algebra and its relation to SQL.

 

As a collection of algebraic structures, relational algebra was  developed at IBM by Edgar F. Codd. It is used to represent data stored  in relational databases, as well as to define queries on that data. An  instance of relational algebra may be described as a procedural query  language that employs unary or binary operators to execute queries.  Users of relational database systems must be able to query database  instances using a query language. Relational algebra or relational  calculus is used to query a relational database system. Recursive  relational algebra is done on a relation, and intermediate outcomes are  also considered relations. For Edgar F. Codd’s relational paradigm, SQL  was one of the first commercially available programming languages.  Despite the fact that they are based on similar principles, their syntax  differs. There are several advantages to relational algebra, including  its closed nature, rigorous basis, and simplicity of semantics. SQL, on  the other hand, is a subset of relational algebra with easy formatting  capabilities, aggregate functions, and a complex semantics. Below is an  example from the course readings that illustrate the difference in  syntax:

SELECT DISTINCT dname
FROM department, course, empcourse, employee WHERE cname = `Further Accounting’

AND course.courseno = empcourse.courseno AND empcourse.empno = employee.empno AND employee.depno = department.depno;

The equivalent relational algebra is

PROJECTdname (department JOINdepno = depno ( PROJECTdepno (employee JOINempno = empno (

PROJECTempno (empcourse JOINcourseno = courseno ( PROJECTcourseno (SELECTcname = `Further Accounting’ course)

)) ))

))

References:

Relational algebra – example. (n.d.). https://web.archive.org/web/20160326123806/http:/db.grussell.org/section011.html.

Relational algebra. (n.d.). https://www.tutorialspoint.com/dbms/relational_algebra.htm.

Computer Foundation 2

 

Topic 8 Assignment to Turn In – Calculus Chapter 2

Section 2.1:  Complete problems 48 and 67

Section 2.2:  Complete problem 89

Show all of your work.  You may type in Word using Equation Editor or write neatly by hand and upload as a PDF.  Include copies of any graphs you make, whether by hand or using graphing software.

IT Project Management

1) project, and  its main attributes

2) day-to-day jobs

Provide examples to illustrate the importance of these items and Discuss the unique challenges that an IT project presents.

internship 7 steps solving a problem

  1. Part I:
    Review the “7 Steps to Solving a Problem” attachment above

    Part II:
    Read the story below: 

    You are currently working at a small company of about 100 employees. Your company just lost a very large client and therefore they need to let go of five employees in your department.

    The workload of the five employees has been divided up between you and a fellow employee. Your fellow employee is very upset about this because now they must take on more work and not get a pay raise. This employee wants you to join them and fight your boss together for more money. You don’t feel comfortable doing this because you love your job. You would like to make more money, but you do not want to upset anyone and lose your position. On top of this situation, there is a big project that needs to be completed in three days!

    How would you solve the above problem?

    1. Review the “7 Steps to Solving a Problem” attachment. Reflect on, and discuss, how the problem described above can be resolved using the steps.
    2. Analyze and explain your application of each of the 7 steps in the “7 Steps to Solving a Problem” attachment to solving the problem described in the above story
    3. Your submission should be a minimum of one page of content in length. Please type the question as well as your answer. Properly cite any source utilized in APA format.

110p1

Project: Certification and Accreditation System Security Plan.

The purpose of the system security plan (SSP) is to provide an overview of the security requirements of the system being certified. It describes the controls in place or planned for meeting those requirements. It also delineates the responsibilities and expected behaviors of all individuals who access the system. Throughout the course you will be creating selected appendices that support a system security plan (SSP).

The SSP project will be developed in four parts during the course:

  • Module 1: SSP Expanded Outline and Potential Vulnerabilities Report 

A  template for this assignment  is provided using the format in  NIST Special Publication 800-18 . In addition to the NIST documentation that is linked throughout the course and in the document sharing area, you can locate SSP information in the Howard text on page 105.

Scenario:
To create the SSP for this project, you will be using your home computer system, as if it were used for a home-based business, whereby it may contain customer data and business applications critical to your operations. Although this is a home computer system, it is not completely shielded from many risks that can impact a large corporate business. Interruptions or breaches would place your business in jeopardy. For the purposes of this project, categorize this system as a Federal System in the “HIGH” risk category as defined in FIPS 199 and  FIPS 200.

Project Deliverable 1:SSP Expanded Outline and Potential Vulnerabilities Report 

SSP Expanded Outline
Using the SSP template (also found in Doc Sharing), complete the expanded outline by inserting a brief statement below each of the 15 sections which:

  • identifies the applicability of the section to your home system
  • describes the importance and purpose of the data provided in the section.

Potential Vulnerabilities Report 
Utilizing your experience, classroom resources, outside references and industry tools, analyze and generate a comprehensive overview identifying the specific potential vulnerabilities of the system.  

Insert this comprehensive overview into the SSP template as Appendix 1.