preemptive scheduling

 We have been assuming in chapter 3 that preemption incurs no over head. Let us now relax this assumption. Consider a 2 task system. Preemption overhead is x. Given e1 , e2 , P1 , P2 , obtain the maximum value of x for which the two tasks are RM schedulable. Note: e1, e2 are execution times. P1, P2 are periods. 

10_Imoprtance of strategic IT planning

Research Paper: Develop a Computer/Internet Security Policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a very brief computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

Include at least 3 scholarly references in addition to the course textbook.  At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.

Your paper should meet the following requirements:

  • Be approximately 2-4 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Phd: Discussion topic-2

Several Big Data Visualization tools have been evaluated in this week’s paper.  While the focus was primarily on R and Python with GUI tools, new tools are being introduced every day.  Compare and contrast the use of R vs Python and identify the pros and cons of each.Please make your initial post and two response posts substantive. 

A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

600 Words Initial post with at least 2 scholarly references and In-text citation.

Comment 1: 150 words with at least 1 scholarly reference.

Comment 2: 150 words with at least 1 scholarly reference.

Please attach the grammarly score screenshot in the end of the document.

Paper

A number of clustering algorithms have been developed across any number of domains for various purposes.  In this discussion you will discuss which algorithm you apply to a domain of your choice.

In your opening post you will declare your domain choice, identify the clustering algorithm, and explain why you choose that algorithm for that domain.

Hint: The type of data, cluster and application will aid in your choice of clustering algorithm. 

Note: Need 2 pages of content.Please refer the attached Textbooks

cloud computing

Define Moore’s law and discus how it might influence cloud migration.

1-2 page, at least one scholarly reference. NO plagiarism 

Ethuics and Cyberlaw and Security

  

Ethics, Law and Cybersecurity

Instructions:  There are two topic areas listed below that are designed to measure your knowledge level specific to learning outcome (LO 6) shown in your course syllabus.  Provide appropriate responses in essay form.  In most cases the topic area has several components. Each must be addressed to properly satisfy requirements.

State-wide and in most professional industries, there has been a mandate that college students be more proficient in their writing. While this is not a writing class, all writing assignments will be graded for grammar, syntax and typographical correctness to help address this mandate.

Pay attention to what you are being asked to do . For example, to describe does not mean to list, but to tell about or illustrate in more than two or three sentences, providing appropriate arguments for your responses using theories discussed in our text.  Be sure to address all parts of the topic question as most have multiple parts. A verifiable current event (less than 4 years old) relevant to at least one of the topics you respond to is a fundamental component of your quiz as well.  You cannot use information from the text book or any book/article by the author of the text book as a current event.  Make sure that your reference has a date of publication.  For each chapter quiz and final quiz you are required to find and include at least one reference and reference citation to a current event less than 4 years old (a reference with no date (n.d.) is not acceptable) in answer to at least one question.  This requires a reference citation in the text of your answer and a reference at the end of the question to which the reference applies.  You must include some information obtained from the reference in your answer.  The references must be found on the internet and you must include a URL in your reference so that the reference can be verified. 

You should type your responses directly under the appropriate question.. Do well.

  1. Strong arguments can be given as      to why encryption tools are needed to safeguard communications in      cyberspace, yet these tools can be used by terrorists and criminals to      protect their communications in cyberspace. (a) In the wake of      September 11, can a case be made for not allowing ordinary users to employ      strong encryption tools in Internet communications? (b) Can we      still claim to live in a free society if plans for government interception      of email communications, as provided for in the Homeland Security Act (http://fl1.findlaw.com/news.findlaw.com/hdocs/docs/terrorism/hsa2002.pdf), are be      implemented?  Please elaborate (beyond a yes or no answer) and      provide your “theoretical” rationale in support of your responses. (comprehension)
  2. Is the expression “ethical hacker”      an oxymoron?  (a) Do you agree that some individuals should be      allowed to be “certified” as hackers to work on behalf of industry or for      the interest of other organizations?  (b) Do the kinds of      activities permitted by certified hackers in the CEH program raise any      moral issues?  Explain. Please elaborate (beyond a yes or no      answer) and provide your “theoretical” rationale in support of your      responses.

Grading Rubric for Quizzes

Grading criterion                                                                                          Unit Points           Total Points

Uploaded to correct Dropbox                                                                            2                            2

Submitted on time                                                                                            15                          15

Document Filename: 

Your Last Name,first and middle initial with correct quiz number                   5                            5

(Example only: Creider_RD_q1)

Rationally expressed opinions, experiences (personal or observed),                  8

arguments and premises (where appropriate) to support responses 

(did not simply restate/summarize author/textbook

Clearly presented classical ethics theories relative to topic                                8

Included ‘URL’ for appropriate verifiable current event                                 12                          28

(i.e., example of topic being discussed WITH EXPLANATION)

NOTE: Must be less than 4 years old

Grammatically correct and appropriate tone                                10

(professional, non offensive language)

Typographically correct                                                               10                     20

        

Included full citations as needed                                                    3

Used correct APA format                                                               7                     10

Addressed each item within selected topic area                           20                     20

        

Maximum grade                                                                         100                   100

NOTE: POINTS WILL BE DEDUCTED FROM TOTAL ASSIGNMENT GRADE IF EACH QUESTION YOU SELECTED IS NOT INCLUDED IMMEDIATELY BEFORE EACH ANSWER.

(PLEASE WRITE BOTH QUESTION PAPERS USING WORD DOCUMENTS AS INSTRUCTED USING THE GRADING RUBRIC.)