Literature review for current software update process

write a literature review for the following topic.  

Software updates are essential for the purpose of ensuring data security. However, sys administrators in organizations control hundreds of devices, and security mistakes may result in splash damage. Recent publications have examined the software update habits of end users, while software developers have gotten less attention. This study’s primary purpose is to determine what software update management entails for software developers. The purpose of this study is not to solve an issue; rather, it is to comprehend the process.

Requirements:
1) Total of 35-50 pages 

2) Times roman 12 pt and single space 

3) 40-50 references from last 3 years

Computer and Number Systems

  

Computer and Number Systems 

1. (10 pt) You have been hired to develop a website-based sales system for a large international retail firm. List and describe at least four features that are specific to the Web design of your system and customer service important to consider if your system is to be successful at attracting and keeping customers living outside of the US. Include not only characteristics of the user interface, but those issues that must be uniquely addressed to successfully service your non-US customers.

2. (10 pt) ASCII, Unicode, and EBCDIC are, of course, not the only numeric / character codes. The Sophomites from the planet Collegium use the rather strange code shown in the Figure below. There are only thirteen characters in the Sophomite alphabet, and each character uses a 5-bit code. In addition, there are four numeric digits, since the Sophomites use base 4 for their arithmetic. Given the following Sophomite sequence, what is the corresponding binary message being sent by the Sophomites?

4. (10 pt) Define memory cache write-through and write-back techniques and describe the advantages and disadvantages of each.

5. Answer the follow questions about interrupts.

a. (5 pt) Describe in detail the steps that occur when a system receives an interrupt.

b. (5 pt) Describe how these steps differ in the case when a system receives multiple interrupts

6.  Answer the following questions about clusters.

a.(5 pt) Describe how you might use a cluster to provide fault-tolerant computing

b.(5 pt) Describe how you might use a cluster architecture to provide rapid scalability for a Web-based company experiencing rapid growth.

Networks

7.  Answer the following questions about communication protocols.

a.(5 pt) Using the operations of UDP (User Datagram Protocol) and TCP (Transmission Control Protocol) as a basis, carefully explain the difference between connectionless and connection-oriented communication.

b.(5 pt) If you were ordering a number of items from an online seller, such as amazon.com, which Protocol (TCP or UDP) would you recommend and explain why.

8. In the context of network security, 

a.(3 pt) explain the purpose of non-repudiation. 

b.(3 pt) How does non-repudiation differ from authentication?

c.(4 pt) Create a business scenario that illustrates the importance of each.

11. Answer the following:

a.(5 pt) Use the following four processes that have arrived in the ready queue in the sequence shown below and answer the following about process scheduling:

(i)Both shortest job first and non-preemptive priority queue scheduling algorithms will complete all four processes at the same time, but not in the same order. In which algorithm will Process 1 finish first? Provide the time Process 1 finishes and explain your answer.

(ii)If the round robinscheduling algorithm is used, which process will finish first? At what time will it complete?

YO19_Excel_BU02_PS1_Advertise

YO19_Excel_BU02_PS1_Advertise

     

Start Excel. Download and open   the file named Excel_BU02_PS1_Advertise.xlsx.   Grader will automatically add your last name to the start of the filename.   Save the file to the location where you are storing your files.

 

 

On the GuestData worksheet, in   cell H2, add a COUNTA function to determine the number of months listed in cell   range A6:A17.

 

 

In cell J2, add a DATEDIF function to calculate the survey duration   in years using the 2020 Fiscal Start date and 2021 Fiscal Start date.

 

Assign the named range Season to cell range L6:M17.

 

 

In cell range C6:C17, add a   VLOOKUP that will look up the value in column B and then return the exact   season match of Low, Mid, or High based on the value in column B. Use the   named range Season in the formula.

 

 

To count the number of seasons   in cell B22, enter a COUNTIF function that counts the Seasons in cell range   C6:C17 that meet the criteria in cell A22. Copy the formula through cell B24.   

 

To total the number of guests   surveyed by season in cell E22, enter a SUMIF function that sums the total   surveyed in J6:J17 if it meets the criteria in cell D22. Use appropriate   absolute referencing to copy the formula through cell E24. 

 

In cell range D19:J19, calculate   the averages for each column with a rounded (not formatted) value to zero   decimal places.

 

Ethical Hacking week 7

 

Visit the “whois” website (https://www.whois.com/whois/). Find out who owns the site, who manages the site, the site creation date, the registry expiry date, and where they are located (what country) for each of the following sites:

1) New England College (www.nec.edu)

2) Google

3) Bank of America, Bank of India, or Your bank

4) One more (your choice)

Careers Path

please see instructions in attachment.

for point 2:  -discuss, based upon your personality and work preferences, what you see as the pros and cons of each occupation. 

my field of study is cyber security. so in this point just look for some work preferences of people who do cyber security on google please

(2) discussion – data structures

 Respond to this discussion below about data structures and their roles in programming with at least 150 words or more

Unlike algorithms that pertain to real life scenarios outside of  computer science, data structures are particularly synonymous with  programming and software development. The term “data structure” is  almost self defining. Examples of data structures include arrays, lists,  stack, queue. All examples include different ways that data is arranged  and manipulated. Data structures are integral to developing complex  programs. “Data Structures are widely used in almost every aspect of  Computer Science i.e. Operating System, Compiler Design, Artificial  intelligence, Graphics and many more” (“Data Structure”, n.d.,).  Algorithms utilize different data structures to carry out a task with  the added benefit of reusability. An array is a simple to understand  data structure that is used by all programming languages. The ArrayList  is a particular function that is specific to Java. They are both ways to  declare an array. The cool thing about the ArrayList is that one does  not need to provide the size of the array initially. Java ArrayList  allows for many additional operations like the indexOf() and the  remove() operation. This seems to make ArrayList perhaps of more utility  than a simple array. Although, I have not heard of this ArrayList until  this discussion. I do look forward to experimenting with its many  functions in the future and perhaps in this course.

References:

“Data Structure”, n.d., Java T Point, Retrieved from https://www.javatpoint.com/data-structure-introduction

Mathur, P., 12 Jun, 2020, Geeks for Geeks, Retrieved from https://www.geeksforgeeks.org/array-vs-arraylist-in-java/

API for App

Hello, I would like to know if you can help to indicate the requests (methods, url and description) necessary for the following application.

If you can develop documentation in Postman

The app is for organizations that help the elderly. Features include GPS tracking and task reminder