Operating Systems Project Due in 48 hours

Please Inbox me If you understand and can do it on time. Please Only Bid if you fully Understand the Project and can Deliver the requirements in 48 hours.

 In this final project, you will implement a simple ramdisk module that you can format with “mkfs.ext2” and mount and unmount with “mount” and “umount”. The ram disk should be of a fixed size stored entirely in memory. It should appear as a block device in the system. This project is an example of a block device driver, which handles data a block at a time.  This project should satisfy the following requirements. 

 – Implement a ramdisk as a kernel module. 

– Allow an ext2 filesystem to be installed onto the ramdisk. 

– Allow the filesystem to be mounted and unmounted with “mount” and “unmount”.  

While submitting your project, please make sure you include the following:  

your source code, 

a makefile, 

a short report describing your work, 

Contingency Planning

Contingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual’. Business continuity planning is an expanded version of contingency planning that typically encompasses a more comprehensive and extended response plan for getting back to ‘business as usual’. In a well-formatted, highly-detailed research paper, address the need to contingency planning, ensuring to address the following items:(1) Benefits of scenario events/planning.
(2) Questions to consider when implementing scenario planning.
(3) The common types of scenario planning.Your paper should meet these requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Practical Connection Assignment

     

Writing Skills, Grammar, and APA Formatting

Assignment strongly demonstrates   graduate-level proficiency in organization, grammar, and style. 

  Assignment is well written, and ideas are well developed and explained. Demonstrates   strong writing skills. Student paid close attention to spelling and   punctuation.  Sentences and paragraphs   are grammatically correct.  

 

Proper use of APA formatting. Properly and   explicitly cited outside resources. Reference list matches citations.

 

Maintains purpose/focus

Submission is well organized and has a tight   and cohesive focus that is integrated throughout the document 

 

Understanding of Course Content

Student demonstrates understand of course   content and knowledge. 

 

Work Environment Application

Student strongly demonstrates the practical   application, or ability to apply, of course objectives within a work   environment.

Need JoB Duties related to PhD IT to be included in PhD IT

Need strong job duties to be included in my resume to match with PhD IT satisfying the following :

  

Doctorate of Philosophy, Information Technology (PhD IT)

Program Description

The Doctorate of Philosophy in Information Technology at University focuses on the advanced practice

role of the use of predictive analytics to identify cyber threats, employ big data analytics to improving healthcare, and

empower smart cities in making data-driven policy changes critical for societal well-being. This program is designed to meet

the aggressive demand for qualified data scientists in virtually every sector of the economy, with classes in computer

science, data intelligence, analytics, security, strategic planning, governance and global economy.

Students can earn the PhD, Information Technology in either a fully online format or an executive format combining online

and on-site study. The Executive format program requires attendance at weekend residency classes. Further, the Executive

PhD, Information Technology Program meets the needs of international graduate business students. This program provides

both in-seat and online coursework. Graduate students joining the Executive PhD, Information Technology program will be

employed or conduct projects in business-related positions and participate in Applied Learning Practicum, in which students

apply what they are learning in their program to the real world via work or internship experiences.

Program Sensitivity

While the program’s schedule requires considerable independent learning and preparation on the part of the candidate prior

to each session, the schedule nevertheless enables in-depth, active learning based on critical and reflective thinking. The

format allows assignments to be handled comfortably, while candidates maintain their continuing professional

responsibilities. The program is designed with an applied learning component that is an integral (essential) part of the

established curriculum. This allows students the opportunity to apply their studies to their place of employment.

PhD IT Program Requirements

Research Students will formally identify a dissertation topic and write the review of the literature in fulfillment of the

requirements for DSRT 736-Dissertation Seminar. The remaining sections of the first three chapters of the dissertation will

be written while enrolled in DSRT 839- Advanced Research Methods. Candidates will carry out their research to complete

the dissertation.

Comprehensive Exam Candidates sit for the Comprehensive Examination prior to enrolling DSRT 930. The specific

content, structure, and scheduling of this examination is determined by the Program Director. Tailored to each student’s

program of study, questions on the Comprehensive Examination are generated by the program’s four content-related goals:

• Goal 1: Expand information sciences through advanced study.

• Goal 2: Promote critical thinking and problem-solving skills to include leadership at the organizational and system level

and the ability to evaluate and improve the quality and safety of Information Sciences.

• Goal 3. Afford structured and supervised research experiences so that students develop the technical, conceptual and

communication skills that are required to conduct high quality, independent research.

• Goal 4: Provide training in basic and advanced information systems theory and practice so that students master the

technical and conceptual tools needed for conducting high quality research.

• Goal 5: Instill ethical leadership, service, and values

The Comprehensive Examination is normally completed in one four-hour session scheduled during the operating hours of

the department. It is graded by contributing members of program faculty, with passing marks required on all sections of the

examination before a candidate can graduate. A student failing any or all parts of the Comprehensive Examination has one

opportunity to retake these sections within one month of the original testing date. A student who fails the exam or a portion

of it a second time must sit out for 16 weeks before taking it a third time. Students failing the exam a third time must retake

relevant courses. Once the student has successfully retaken relevant courses, the cycle of testing begins anew.

The Dissertation

The dissertation is the capstone experience in the PhD program of Information Technology. A dissertation is a researchbased

project that may use a wide-range of statistical, quantitative, and qualitative methods. However, in the University’s

practitioner-focused program, the dissertation is conceived as a reality-based project in which the candidate engages in

authentic professional problem-solving to extend best practices in the field. Specific details on dissertation requirements are

included in the Dissertation Handbook.

All program features highlighted above combine to make the doctoral program at the University 

rigorous academic experience focused on strengthening the skills of information technology professionals.

Discussion

 Many experts predicted that small, local ISPs would disappear as regional and national ISPs began offering local access. This has not happened. Why? 

Discussion question “Conflict with Teams”, 350 words and 2 references.

Part 1: Conflict within Teams

Think of a conflict that occurred in a team you were a part of and analyze it. What were the main sources of the conflict? What interventions can be used to improve the quality of conflict a team?

Part 2: Creativity in Teams

Evaluate yourself using the three indices of creativity. What strategies can you use to enhance your creativity?

Cloud Computing Discussion 2

  

Consider, in 500 words or more, how business processes as services can improve efficiency. This discussion is about business process as a service and security. 

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

configuring

The director of IT has indicated that the Board of Directors is compiling a corporate portfolio on ethics and has asked all departments to contribute information on how a code of ethics impacts daily decisions. The director of IT has asked for you to help by providing an example.

Using the links provided, research at least 2 of the following codes of ethics:

Write a 1- to 2-page ethical choice example using Microsoft® Word. Complete the following in your document:

  • Reflect on ethical considerations for each type of data involved (e.g., Active Directory user information, reporting information,logs). Explain how to apply your knowledge of ethical theories to decisions you would make as a security administrator for System Center 2012.
  • Select 2 of the codes of ethics you researched and quote the items you would use in your corporate code of ethics. Explain how they would help you implement ethical choices when working as an administrator of System Center 2012 Active Directory user information, reporting information, and logs.

Cite any references to support your assignment.

Format your assignment according to APA guidelines.

Physical security

Topic:Response in physical security (research paper)

  

•10-12 pages (not including title, TOC, references, and any appendices)

•Double spaced APA style

•At least 10 references

At least 5 of your references must be scholarly peer-reviewed articles

  

•The purpose of the research paper is to associate controls (administrative, technical, and physical) with your assigned physical security goal.

•Some items that need to be addressed are:

–Associated Threats

–Policies

–Procedures

–Plans

–Guidelines and standards

–Appropriate controls

–Issues and concerns for different industries

–Business continuity and risk mitigation

–Budgetary concerns

  

•Find and review peer-reviewed scholarly articles concerning the access control and the associated industry

•Find and review other information that associates with your topic area

•Apply research from articles on chosen topic area to create research paper