The control of processes and threads

The control of processes and threads are of deep concern by developers of all operating systems capable of handling “real or emulated” simultaneous computer activity. Threads are typically created by processes (initially invoked by the user or another process). Discuss how an operating system manages these processes and threads, how they are instantiated and discarded, how the activity is controlled, along with the respective advantages and disadvantages of both process and thread. Do not discuss MS Windows OS. Instead you may choose from Linux, UNIX, ROS, z/OS, or VM.

Sample Solution

InfoTech Import in Strat Plan

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

Sample Solution

Using python to develop statistical models

You are the IT manager of a large corporation. You are planning to use Python to develop statistical models to aid in analyzing your sales data. You are preparing a report for management. Here are the basic requirements for your report:

Prepare in APA format
Include references
Report length: 500 – 700 words
Briefly describe your company
Briefly describe Python
Give overview of Machine Learning
Report on:’
Implementation plans
Technical training
Python libraries required
How Python will be used
Types of reports that will be produced
In addition, prepare a PPT presentation of your Research Project.

Sample Solution

The most appropriate VPN technology

As you are aware, many remote users will soon need access to the internal network and services. A remote access and virtual private network (VPN) plan is needed to connect it all together.

The senior network architect has asked you to create the plan that will allow secure remote access to the internal network while preventing unauthorized access. He specifically requested that all information transferred between remote users and the organizational servers be protected against snooping.

For this part of the project, perform the following tasks:

  1. Research and recommend the most appropriate VPN technology. The most likely solution is either an Internet Protocol Security (IPSec) VPN or SSL/TLS VPN. Describe the VPN technology and explain why it is the best choice for Corporation Techs.
  2. Recommend any other forms of remote access that are relevant and describe how they would be used.
  3. Create a draft report detailing all information as supportive documentation.
  4. Cite sources, where appropriate.

Sample Solution

Data and classifying data

How does data and classifying data impact data mining?
What is association in data mining?
Select a specific association rule (from the text) and thoroughly explain the key concepts.
Discuss cluster analysis concepts.
Explain what an anomaly is and how to avoid it.
Discuss methods to avoid false discoveries.

Sample Solution

The manner in which cryptography can be used to achieve personal identity protection

Use the Internet to research the manner in which cryptography can be used to achieve personal identity protection, focusing on what you believe to be the most effective approach. Once your research is completed, explain what you believe to be the most effective use of cryptography for personal identity protection. Support your response with one example of cryptography being used to achieve personal identity protection.

Sample Solution

Views on the Trojan War

What are your views on the Trojan War, as presented by Homer? Does the war seem to be fought for a just cause? Are we meant to take these events as seriously and solemnly as Homer and his characters seem to?
Sometimes, when comparing works of literature, we see things that we didn’t originally notice when reading the stories individually. With this in mind, think back to week 1 and the Epic of Gilgamesh. Where do you see similarities in character, theme, plot, or style between that earlier epic and the Iliad? How do you think Gilgamesh influenced Homer’s work? What are any important differences you see between the two stories?

Sample Solution

Technology-related issues/breaches undergone by a company

Pick a company to focus on for this assignment. Based upon the given information you can find on the company and any technology-related issues/breaches the company has gone through no older than 5 years , create Crisis Management Plan

Introduction – brief background of company and any issues the company has had in the past such as data breaches
Strategies and Management – business activities, risk factor activities, reactive risk mitigation strategy, risk management, financial performance (more or less depending upon company)
Risk Analysis – political analysis, environmental analysis (more or less depending upon company)
Crisis Management Plan:
Committee for crisis management planning
Crisis types
Structure of the Crisis Management Team
Responsibility and control
Implementation Plan
Crisis Management Protocols
Crisis Management Plan Priorities
Divide the work on the plan amongst your group members.

Sample Solution