HIGH PERFORMANCE COMPUTER ARCHITECTURE
ASSIGNMENT 2 ― A Comparison of the Scoreboard & Tomasulo Approaches and Quick Revisions of Key Concepts
HIGH PERFORMANCE COMPUTER ARCHITECTURE
ASSIGNMENT 2 ― A Comparison of the Scoreboard & Tomasulo Approaches and Quick Revisions of Key Concepts
Answer the four questions noted below. Please use at least one reference and ensure it’s in APA format (as well as the in-text citation). Also, ensure to NOT COPY DIRECTLY from any source (student or online source), rather rephrase the author’s work and use in-text citations were necessary.
Describe the CIA triad and the defense in depth principle? Why are those concepts important when designing your network security strategy?
What are the steps for an incident response plan? How does network security play into an incident response plan?
What are some major differences between open source and commercialclosed source software and solutions? Should you consider one over the other?
What are firewalls? What are VPNs? What are some alternatives to a traditional firewall? What are some alternatives to traditional VPNs? How does the alternatives improve the traditional version of both?
Note: The essay should include an APA cover page and at least two references (academic or professional literature) in APA v7 format.
Movie Reviews
Uploaded attachments
If you can do an assignment with coding & more later please contact
HW4
Name:
# Make the Python in the editor (IDE) and Capture the code part and result. After that, paste them below.# When you make the code, use the IDE and mode I specify below.
C10) IDLE – scripting (file) mode- The file should be in C:BigData_EX.
Code)
Result)
C11) IDLE – scripting (file) mode-The file should be in
C:BigData_EX.
Code)
Result)
C12) IDLE – scripting (file) mode-The file should be in C:BigData_EX.
Code)
Result)
C13) IDLE – command line (interactive) modeCode)Result)C14) IDLE – scripting (file) mode-The file should be in C:BigData_EX.
Code)
Result)
C15) IDLE – scripting (file) mode-The file should be in C:BigData_EX.
Code)
Result)
C16) IDLE – scripting (file) mode-The file should be in C:BigData_EX.
Code)
Result)
My Topic is a:- a comparison of authentication mechanisms
Research topic. You must include at least four primary, peer-reviewed sources in your bibliography. Additional sources of varying standards can also be used. However, these four must be specifically cited. An un-cited source should not appear in your bibliography.
A primary source is the original material. If you are directly quoting the words of an author, that is usually a primary source. However, if you are quoting a paraphrase from an author (known because the author is making a citation), then you should find the original document they are paraphrasing and then quote or paraphrase the original.
ISOL 634 – Physical Security
Final Exam
Due: June 25, 2020 200 pts.
This final exam will be a scenario similar to the midterm project, but with a focus on the concepts learned in the second half of the textbook, with a special focus on intrusion detection and fire safety.
Scenario: The location is a courthouse, a government building with offices, records, and rooms for criminal and civil law proceedings. This courthouse is a very large, two-story building with one main entrance and dozens of small, private entrances. All sorts of people use this building, including professionals, civilians, and a security force. For each of these three groups of people, consider what physical space they are using.
The first type of physical space includes offices for processing records requests related to criminal and civil proceedings. There are file rooms for physical records as well as computer systems for electronic filing, storage, and processing. There are both public areas for citizens making requests and private areas for the civil servants working with private records.
The second type of physical space includes courtrooms of various sizes and private rooms for meeting and negotiating. These spaces also have public and private areas.
The third type of physical space includes large public areas used for informal gathering or waiting, a cafeteria with coffee machines, and the public restrooms.
There are public hours of operation, like 8 a.m. to 5 p.m., but professionals might be in the building very early or stay very late, and there are on-sight security personnel always.
Also in this building is a built-in security force that includes bailiffs and police charged with keeping the building secure. They have already established the building design, access control, surveillance, and lighting.
Part I:
Your assignment is to focus first on alarms and intrusion detection. Using especially chapter 23 from the textbook, choose where to use intrusion detection systems and which systems to use.
· Perimeter Protection—what types of intrusion detection systems would you use on doors and windows? Will you use different types based on the type of physical space? Explain and justify your choices.
· Area Protection—what types of intrusion detection will you use and where? Explain and justify your choices.
· The above alarms might be more for after-hours or for unpopulated areas. What about alarms for populated areas, like panic alarms? Explain and justify your choices.
· How will you use the security staff to monitor and respond to intrusion or duress?
· Besides the security staff, who will be responsible for turning on or off the sensors or using the alarms?
Part II:
Now, focus on fire prevention, detection, and response. Use especially chapter 22 from the textbook.
· Discuss the fire classification most likely for this type of physical space.
· Where would you put fire alarms? What maintenance is required for fire detection alarms?
· Would you use sprinklers? If so, where and why? Where would you locate fire extinguishers? What kind would you use and why?
· Discuss the maintenance required for any systems used for fire safety and using the fire safety inspection section as a guide, discuss special areas of concern for fire safety in this type of location.
Due tomorrow morning 9am EST! OR sooner if possible.
This week’s written activity is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited).
Start your paper with an introductory paragraph.
Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing.
Prompt 2 “Big Data” (2-3 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology?
Prompt 3 “Green Computing” (2-3 pages): One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library.
Conclude your paper with a detailed conclusion section.
The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.
Your paper should meet the following requirements:
• Be approximately seven to ten pages in length, not including the required cover page and reference page.
• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
• Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.
• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing
Writing needs to summarize Chapter 7, 8, 9 from the attached textbook. There shouldn’t be any plagiarism and should be in APA 6th standard.
Chapter 7, 8, 9 Reading Reflection should address the following prompts:
1. Summarize the content of the chapter addressed.
2. What were some of the highlights in this chapter and learning opportunities?