IT207

Write a  paper of 2  pages APA style covering the following areas:

For this assignment, describe the functions of the OS with greater detail.

  1. Describe how the OS interacts with the hard drive and RAM.
  2. How does the OS share resources among applications when multi-processing?
  3. How does the OS retrieve data and output processed information, per-user commands?

Your paper must be formatted according to APA style. Use citations and references as needed. Please do not copy & paste from the internet resources/solution manual as it will be considered plagiarism. 

COMPUTER SCIENCE

 

Your client has just purchased a new server for their small coffee shop and would like you to develop a  preventative maintenance training for the staff in hopes of keeping the server running smoothly for a long time.  Your task is to develop a proper server maintenance technique checklist. 

  • Use the article, “Hardware Maintenance” to help you.

Need it by Friday 3pm eastern time. APA 7th edition format, 2pages.

PPT – Team Charter in Team Management

For Team Charter in Team Management course, need one PPT slide content for below two points. 

1. Our purpose of our team is:

2. We are working as a team in order to:

Text Book: Chapter 1, 2 and 3

“Group Dynamics for Teams, 6th edition by Daniel Levi and David A Askay”

Enterprise Data Management and Administration

Review the attached case study and answer the question: 3 pages

 

  1. Identify and write the main issues found discussed in the case (who, what, how, where, and when (the critical facts in a case).
  2. List all indicators (including stated “problems”) that something is not as expected or as desired.
  3. Briefly analyze the issue with theories found in your textbook or other academic materials. Decide which ideas, models, and theories seem useful. Apply these conceptual tools to the situation. As new information is revealed, cycle back to sub-steps a and b.
  4. Identify the areas that need improvement (use theories from your textbook)
    • Specify and prioritize the criteria used to choose action alternatives.
    • Discover or invent feasible action alternatives.
    • Examine the probable consequences of action alternatives.
    • Select a course of action.
    • Design and implementation plan/schedule.
    • Create a plan for assessing the action to be implemented.

  • 5. Conclusion (every paper should end with a strong conclusion or summary)

deleted

 

Suppose a text file contains ASCII characters ‘0’ and ‘1’ representing bits in human readable form. For example, test.txt may contain 111111110000000 which means its size is 16 bytes. A simple method for compressing the file by a factor of 8 is to represent a block of 8 ‘0’ or ‘1’ ASCII characters as a single byte. Thus test.txt which is 16 bytes long can be compressed into a file that is 2 bytes long where the first byte contains all 1’s and the second byte all 0’s. The resultant compressed file is a binary file since the first byte is not an ASCII character.

Code an app, bitpacker, that reads from stdin the input filename which follows the same specification as Problem 3. However, instead of using getchar(), use the library function fgets() whose the second argument allows specifying how many bytes, at most, should be read which helps prevent array overrun. Process the data in the input file 8 characters at a time by reading them into a 1-D array, char rawdat[8]. Compact the eight ‘0’ and ‘1’ characters in rawdat[] into a single byte using the bit processing techniques discussed in class. Write the resultant byte into an output file with suffix “.P”. For the above example, test.txt.P. We will allow the size of the input file not to be a multiple of 8. Since we are compacting 8 ASCII characters ‘0’ and ‘1’ into a single byte, we will use padding to handle files whose size is not a multiple of 8. For example, if text file test1.dat contains characters 1111111100000000111 (file size is 19 bytes), we will pad the last three characters 111 with 00000 so that the byte containing bit values 11100000 is written to test1.dat.P. To note that we padded the original data with five 0 bit values, we will change the suffix of the output file to test1.dat.P5. For test.txt where no padding was needed, the output filename will be test.txt.P0. Thus the last character of the filename specifies how much padding (0-7) was added.

Code bitpacker as a single main() function.  Test and verify that it works correctly.

Assignment (disaster recovery plan.)

Question: Submit a report that discusses the techniques used by malware developers to disguise their code and prevent it from being analyzed. Give suggestions on how these techniques should be classified and ranked in the disaster recovery documentation and recovery plan.

***Standard for all Assignments Your paper should meet the following requirements:

  • Be approximately four pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
  • No plagiarism********** 

How Do You Lead a Team

175 words: 

  • What do you feel is the role of a leader within a team? Include examples of leadership you have experienced when working on teams.
  • You might have experience making decisions and solving problems on your own, but these tasks are quite different when working in a team. What would you need to consider when leading a team in making decisions and solving problems? 
  • How can you apply what you learned in this class when faced with a problem or conflict in a team setting?

week-8 discussion

 Keystroke logging, often referred to as  keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored. Explain a situation where using a  keyloggers may be used in either a legitimate (legal) way or used as a tool for criminals.