Project Paper

 Part 1: Comprehensive Project Plan

You will create an 8–10-page final comprehensive project plan. This document will distill down the most salient points from each of the four previous course deliverables into one integrated, cohesive comprehensive project plan that persuades investors of the recommended approach.

  • Review each of the four previous assignments.
  • Select the most critical information from each that investors need to know to make an informed investment decision.
  • Summarize the information you selected.
  • Ensure that the selected information flows from one section to the next in a cohesive and compelling fashion

Case Study

The purpose of this assignment is to develop skills in problem-solving, decision making in complex situations, and learn/use the APA 6.0 style guidelines.

cloud

Use only 50-words per topic to discuss and present your answer.   

The discussion questions this week are from Chapter 9  (Jamsa, 2013).You are required to use at least two sources (besides your textbook) to answer the above questions.

  • List the security advantages of cloud-based solutions.
  • List the security disadvantages of cloud-based solutions.
  • Discuss how a cloud-based solution provider may reduce the risk of a DDoS attack.
  • Lit and discuss an AWS security service.

Write a program

  

Write a program, using functions, that calculates the area and perimeter of a rectangle whose dimensions (Length and width) are provided by a user.
 

1. Provide your analysis for the following problem statement: You need to write a program that calculates the area and perimeter of a rectangle whose dimensions (Length and width) are provided by a user.
Your analysis should be clearly written and demonstrate your thought process and steps used to analyze the problem. Be sure to include what is the required output? What is the necessary input and how you will obtain the required output from the given input? Also, include your variable names and definitions. Be sure to describe any necessary formulas and sample calculations.
 

2 Provide your program design for the problem you analyzed for calculating and displaying the area and perimeter of a rectangle. Always work for modular design where possible. Be sure to use separate functions for calculating the area and perimeter of the rectangle. Other subprograms for Input and Output should be included as needed. Be sure to describe the fundamental tasks (i.e., things your program must do) needed to solve the problem so you can use a modular design. Provide pseudocode of your overall design that includes the Main module and the order of the module calls, and a Hierarchy chart for the program . Finally, display the flow charts (using Raptor, or your favorite graphics editor) for each module.
Include header and step comments in your pseudocode
 

3 Prepare at least 3 sets of input data (Test data) along with expected output for testing your program

Submitted: 1 days and 3 hours ago.

Cache simulator

 

In this final project you will implement a cache simulator. Your simulator will be configurable and will be able to handle caches with varying capacities, block sizes, levels of associativity, replacement policies, and write policies. The simulator will operate on trace files that indicate memory access properties. All input files to your simulator will follow a specific structure so that you can parse the contents and use the information to set the properties of your simulator.

After execution is finished, your simulator will generate an output file containing information on the number of cache misses, hits, and miss evictions (i.e. the number of block replacements). In addition, the file will also record the total number of (simulated) clock cycles used during the situation. Lastly, the file will indicate how many read and write operations were requested by the CPU.

It is important to note that your simulator is required to make several significant assumptions for the sake of simplicity.

  1. You do not have to simulate the actual data contents. We simply pretend that we copied data from main memory and keep track of the hypothetical time that would have elapsed.
  2. Accessing a sub-portion of a cache block takes the exact same time as it would require to access the entire block. Imagine that you are working with a cache that uses a 32 byte block size and has an access time of 15 clock cycles. Reading a 32 byte block from this cache will require 15 clock cycles. However, the same amount of time is required to read 1 byte from the cache.
  3. In this project assume that main memory RAM is always accessed in units of 8 bytes (i.e. 64 bits at a time).
    When accessing main memory, it’s expensive to access the first unit. However, DDR memory typically includes buffering which means that the RAM can provide access to the successive memory (in 8 byte chunks) with minimal overhead. In this project we assume an overhead of 1 additional clock cycle per contiguous unit.
    For example, suppose that it costs 255 clock cycles to access the first unit from main memory. Based on our assumption, it would only cost 257 clock cycles to access 24 bytes of memory.
  4. Assume that all caches utilize a “fetch-on-write” scheme if a miss occurs on a Store operation. This means that you must always fetch a block (i.e. load it) before you can store to that location (if that block is not already in the cache).

Journal Entry

 – Pick one of the following terms for your research: economies of scale, economies of scope, global companies, global teams, globalization strategy, international division, joint venture, multidomestic strategy, multinational stage, or standardization. 

–  The paper should have a ‘Definition, Summary and Discussion’ headings ( Summary should have 150-200 words and discussion should have 300-350 words. )

– Attach minimum 2 references

– Absolutely no plagiarism, attach a plagiarism report with 0% similarity index

DBA manages and administers an effective data warehouse – Research Paper

** Research Paper with Minimum 6 pages without title page and in APA Format.

***Topic: 

How a DBA manages and administers an effective data warehouse? Data warehousing and business intelligence.

Compliance and the importance of compliance to a DBA in the management of a database. 

How DBA create, implement, and maintain an effective backup, recovery, and disaster plan.

Note: Minimum 6 pages without title page and in APA Format.

Journal entry

 – ‘Pick one of the following terms for your research: coercive forces, institutional environment, inter-organizational relationships, joint venture, legitimacy, niche, organizational ecosystem, retention, strategic alliance, or trade association’. 

–  The paper should have a definition, Summary and Discussion ( Summary should have 150-200 words and discussion should have 300-350 words. )

– Attach minimum 2 references

– Absolutely no plagiarism, attach a plagiarism report with 0% similarity index.