dis 6

 

  1. Discuss the importance of mutual exclusion and synchronization in the case of process cooperation. What problems could arise if the system lacks these two features?  How could semaphores help? 

2.Compare threads and processes and discuss their similarities and differences.  

Week 5 Discussion – ITM capstone

 How would one define business intelligence (BI)? Identify and briefly discuss a real-world application of BI?

Reply should be in 350 words.  Indicate at least one source or reference in APA format. You can use textbook or current research articles 

project management and computer forensic

Project risks can/cannot be eliminated if the project is carefully planned. Explain.

What are the major differences between managing negative risks versus positive risks (opportunities)?

Why is slack important to the project manager? What is the difference between free slack and total slack?

Review the document on Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations at https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/01/14/ssmanual2009.pdf. Prepare a one-paragraph summary of three challenges you may encounter when executing a search and seizure of digital evidence.

What is a first responders’ toolkit? Describe the procedures for creating a first responder toolkit.

Identify best practices in digital forensic investigations: Perform a web search for best practices in digital forensic investigations. Prepare a list of the top 5 best practices, based on your research. Include links to any resources that you use.

What is an investigative report? Why are the reports important? Who is responsible for the report?

Week 5 Research QUANTITATIVE VS QUALITATIVE

  

Qualitative vs Quantitative

Background: Quantitative data can be measured and documented with numbers. Additionally, quantitative data can be represented as quantities. On the other hand, qualitative data is not measured with numbers, but it is represented by qualities. For example, I use quantitative methods to conduct my PhD research because I like working with counts and measures.

Assignment: Write a research paper the contains at least the following using your own wording.   This must be your own wording.  Reword all the information you gather from all sources. 

Discuss Quantitative Methodology

Discuss Qualitative Methodology

Compare and contrast qualitative data vs quantitative data

Your research paper should be at least 3 pages (800 words), double-spaced, have at least 4 APA references, and typed in an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). Your cover page should contain the following: Title, Student’s name, University’s name, Course name, Course number, Section, Professor’s name, and Date.

Backup and Restore

All posts must be a minimum of 250-300 words. APA reference. 100% original work. no plagiarism.

1. Discuss a Backup and Restore product for either the Workstation or the Server.

Linux Users, Groups, and Permissions Lab

Linux Users, Groups, and Permissions Lab

Objective:

Understand how to create user accounts
Understand how to create group accounts
Creating good password policies
Understanding permissions and file sharing

Setup:

You will need a Ubuntu Server VM

Walk Through:

You are a system administrator who has been tasked to create user accounts for new users on your system. You can pick whatever theme you like as long as there are protagonist and antagonist users:  i.e. Super Hero’s and Villains, Harry Potter Characters, or other interests of yours.

Create 2 groups:
One for the Protagonists
One for the Antagonists

Create 5 users:
2 Protagonists
2 Antagonists
1 Neutral – Can access both group’s files

User Configuration:
Each user will have their own home directory that only they can access.
Users must change their password when they first log in.
Users are required to change their password after 6 months.

Required Directories in /home:
1. Share – Anyone can access this directory to add or remove
2. Protagonists – Only the protagonists group can add or remove
3. Antagonists – Only the antagonists group can add or remove
***Directory names can be named based on your current theme***

Ensure that you test that each account is working by either switching users, or logging in as different users.

What to Submit:
Submit a lab report documenting your process.

Make sure to include:

  • A screenshot of the listing of the /home directory of the system showing the users home directories and the additional group directories.
  • A screenshot showing the listing of the file /etc/groups.
  • Screenshots that shows the permissions of the protagonists and antagonists directories.
  • Output from the chage -l for each of the five users.

Upon Completion You Should:

  • Be able to use user management commands to create and modify users
  • Be able to use group management commands to create and modify groups
  • Be able to modify permission to allow individuals access based on group or permissions level