CPU Algorithm- Discussion Response

 Read the post below and respond in your own words. Must be at least 100 words.

———————————————————————————————————————————

Let’s start with the basic concepts of scheduling. Scheduling  is a fundamental operating-system function. Almost all computer  resources are scheduled before use. The CPU is, of course, one of the  primary computer resources. Thus, its scheduling is central to the  operating-system design.

Round robin algorithm is one of the CPU scheduling algorithms  used to schedule processes in the CPU in a way that the time taken to  complete all processes is less. In this algorithm, every process is  given a fixed amount of time to complete its task and later again given  CPU if the duration is not completed. Meanwhile, other processes are  provided CPU for the same fixed amount of time in a cyclic way. This  process uses the concept of context switching so that states of  preemptive processes are saved.

  • First Come First Serve Scheduling

Strength:

  • Easy to understand and implement.
  • Starvation of processes is not there.

Weakness:

  • Wait time is very high.
  • Processes at the end have to wait for so long to get their chance to acquire CPU.
  • Shortest Job next Scheduling

Strength:

  • Beneficial for the processes with less burst time.
  • Short-time processes can be executed in a faster way.
  • Hence this increases the throughput.

Weakness:

  • Every time CPU has to check for the process available with the shortest time.
  • Processes with larger burst time have to wait
  • Starvation of processes is there
  • Processes at the end have to wait for so long to get their chance to acquire CPU.

GO19_AC_CH01_GRADER_1G_HW – College Construction 1.0

 

#GO19_AC_CH01_GRADER_1G_HW – College Construction 1.0

#GO19 AC CH01 GRADER 1G_HW – College Construction 1.0

Project Description:

In this project, you will create database objects to track the  construction projects and the events related to the projects at a  college. You will create a table and import data from Excel to create a  second table. You will use a database template to enter data into the  Events table. You will create a simple query, a form, and a report.

Start Access. Open the file Student_Access_1G_College_Construction_HW.accdb downloaded with   this project. Close the Event List multiple-items form that automatically   opened. Open the Navigation Pane.

In   Datasheet view, create a new table. Beginning in the second  column of the   table and using the data type of Short Text, create the Building Project, Site,   and Contractor fields (in that order). In the fifth   column, using the Currency data type, create the Budget Amount   field.

Change   the data type of the ID field to Short Text, rename the ID field to Project ID and change the Field Size to 5

Starting   in the Project ID field, add the following three records to the new table:

P-356

Student Center,     3-story

Northeast Campus

RR Construction

61450000

P-823

Student Center,     2-story

Southeast Campus

RR Construction

41960000

P-157

Health Professions     Center

Northwest Campus

Marshall Ellis     Construction

42630000

Save   the table as 1G Projects, and then close the table.

Append   the records from the downloaded Excel file a01G_Projects.xlsx to the 1G Projects table.

In   the Navigation Pane, organize the objects by Tables and Related  Views. Open   the 1G Projects table (the table has eight records). Close  the Navigation Pane.

Switch   the 1G Projects table to Design view. For the Project ID field, enter a   description of Enter the Project ID   using the format P-### For the Site field, enter a description of Campus Location.   Save the table.

Switch   to Datasheet view, apply Best Fit to all of the fields in the table, save the   table, and then close the table.

Import   the records from the downloaded Excel file   a01G_Contractors.xlsx into the database as a new table named 1G Contractors. Designate the first row as column   headings and the CO ID field as the primary key.

Open   the 1G Contractors table in Datasheet view (the table has four  records).   Apply Best Fit to all of the fields in the table, save the  table, and then   close the table.

   Based on your 1G Projects table, use the Query Wizard to create a  simple   query. Add the Site, Building Project, and Budget Amount fields  (in that   order). Keep the default name of 1G   Projects Query, click Finish to display the query results, and then close   the query.

Based   on your 1G Projects table, use the Form tool to create a form for the table.   Save the form as 1G Project Form, display the form in Form view, and   then close the form.

Based   on your 1G Projects table, use the Report tool to create a  report. Delete the   Budget Amount field from the report. Save the  report as 1G Projects Report.

Sort   the Building Project field in ascending order. Set the width  of the Building   Project, Site, and Contractor fields to 2 inches.  Delete the page number from   the report, save the report, and then  close the report.

Open   the Navigation Pane, open the Event List form, and then close  the Navigation   Pane. In the Event List multiple-items form, enter the  following two records   (the Start Time and End Time data will reformat  automatically):
 

  Title: Groundbreaking Start Time: 6/13/22 10a End Time: 6/13/22 11a Description:   Student Center groundbreaking   Location: Northeast Campus
   Title: Dedication Start Time: 8/26/22 12:30p End Time: 8/26/22 2p
   Description: Gymnasium building   dedication   Location: Southwest Campus

In   the Event List form, click New Event, and in the Event Details  single-record   form, enter the following record (the Start Time and End  Time data will   reformat automatically):
 

  Title: Community Arts Expo Start Time: 10/5/22 6p
   End Time: 10/5/22 9p   Description: Book and Art Expo at   Library   Location: Southeast Campus 

Peer response 2 100 words minimum

Peers main post:  My job as a general manager of a restaurant managing 20 employees from the front of house and kitchen, excel is my best friend. The main thing I use excel for are the credit card tips. The tips are divided in a pool with servers making 80% for the hours they worked and bussers making 20%. I start with dividing the daily tips in 80%. Each coloumn is the name of a server and the hours they worked. The other table would be the 20% cut with all the bussers names and the hours they worked. It is a lot of work on my part but its the fairest for the employees and excel makes the process a lot easier especially with dragging the cells totals and formulas. I know that I could be stronger with excel and the more experince I have with it, the easier it will make my job. 

respond to peer in a minimum of 100 words to keep the discussion going.

eCommerce Policies, Procedures in Business Continuity

Two pages – Discuss the significance of formulating adequate policies and procedures in ecommerce organization. Outline the impact of such policies and procedures in your business continuity planning policy. Also, describe the five-step process for building a proper power for business continuity. 

OpenGL

  

In the second assignment, you will add some animation and functionality to your scene. The user will be able to interact with the program using mouse and keyboard. Your canvas (window) and object sizes do not change. Window size is 500×500, and projection type is the orthographic projection. The only difference is the addition of motion and interaction. Here is a list of functionalities you will add to your program:

1) When the user presses the “ESC” key, program stops running and exits.

2) When the user left clicks the mouse on any of four shapes objects (triangle, cross, diamond, or star) on the screen, a black frame will be drawn around the shape, and a text message will appear at the bottom of the screen stating that the object is selected and press “SPACE” to spin. For example, if user clicks on the green star following image will be generated:

The thickness of the frame and the font type are up to the programmer. Only one shape can be selected at a time. The mouse selection region does not have to be precise. A circular region at shape center with diameter “n” can be used as the selection region of that shape. 

3) After the selection of a shape, the user presses the “SPACE” key. The brown arrow starts spinning clockwise around its center (black point) and randomly stops at a shape (after passing at least 3 and at most 15 shapes). The rotation is expected to be smooth, so the user will see a transition from one shape to another shape. Please set your FPS (frames per second) as 30. There will be 5-degree rotation change between each frame. And each time the user presses the key, arrow will point a random shape. The arrow will never stop between shapes. SPACE key will not work if a shape is not selected. 

If the arrow stops at the selected shape, a “You win!” message appears at the bottom of the screen. If arrow stops at a different shape, the message will print “You lose!”. For example:

CYBERSECURITY LAW

1. Clearly describe what the Budapest Convention is and illustrate the benefits of this convention for nation states who are signatory to this treaty?

2. A cybercrime has been committed in one of your sensitive company server named “DIL17”. The Chief Information Security Officer (CISO) called and asked you to take the lead in investigating this incident. So, briefly explain the various steps which you would take (using a forensic tool if any) to address the issue and provide a comprehensive report to upper management.  

3. What is the correlation/relationship between cyber law and Intellectual Property (IP)?

4.In cyber security law, what is “Digital chain of custody”? Explain briefly.

Week 5 Journal

Each week you are to enter content into an online journal provided in Blackboard that briefly summarizes (1) the tasks you performed during your internship that week and (2) total hours worked with days/times. The content can be brief and in outline form and use bullet or another list styling, but keep in mind that this content will form the basis of the two major papers that you will write for this course. Therefore, the more detailed you are in your weekly journal, the easier it will be to finish the two papers. Specifically, your weekly journal should contain: 

• The days and times you worked that week, as well as the total hours, worked. (Provide this information at the top of each weekly section so this will act as a de facto heading to separate each weekly entry that you make.) 

• The skills or skillsets used/required to complete each task 

• Each task you performed along with a brief description of what you did.

 • A brief explanation of why the task needed to be done.

 • Was there an outcome? If so, what was that outcome?

 • What new terminology did you learn this week? Provide the term and its definition.

300 words

 

Using the guidelines provided in this week’s chapter 

https://blackboard.nec.edu/webapps/blackboard/content/contentWrapper.jsp?content_id=_1344856_1&displayName=Week+Ten+Lecture&course_id=_55051_1&navItem=content&href=https%3A%2F%2Fus-lti.bbcollab.com%2Frecording%2F51b77331c8e3482ea33b35f11044c76a&cR2XilcGYOo=x4na%2BH10eM6zb3ppJ9vnNUAf94qHk0k6C63dJnX1GyY%3D

(and other resources as needed), create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).

You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.

Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25