OS Memory Management

 

Read Chapter 8: Main Memory in Garg, R., & Verma, G. (2017) and answer the following question:

  • Consider a logical address space of eight pages of 1024 words, each mapped onto a memory of 32 frames. Address the following:
  1. How many bits are there in the logical address?
  2. How many bits are there in the physical address?

Read Chapter 9: Virtual Memory.

  1. Do some research to find out how to check the amount of virtual  memory in your own computer. Take a screen shot once you find it, then  copy and paste it to the document that has the answers to questions a)  and b). 

Semester Project Rough Draft

 This is the rough draft of your security policy. The rough draft should be as complete as possible, with fully formed paragraphs and all the separate elements collected throughout the semester combined into a cohesive whole. By this time whatever specific elements your instructor is looking for have been identified by your graded outline. If you have a successful rough draft, your (final) submission in the second half of this module will need very few edits and you can concentrate on eliminating any small details keeping your Project from being the best it can be. 

Attachment

– my semester project company assignment. It can help in doing this one

– picture of the assignment and grade rubric

Encryption to protect data at rest, in motion, and in use.

Write an essay of 500 words discussing the use of encryption to protect data at rest, in motion, and in use. 

– Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaningful title.

– Include at least one quote from each of 3 different articles. Use scholarly articles.

– Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

– Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

– It is important that you use your own words, that you cite your sources.

– Attach plagiarism report because this essay will be evaluated through Safe Assign 

6.27 LAB: Exact change – methods

Define a method called exactChange that takes the total change amount in cents and an integer array as parameters. Method exactChange() calculates the change using the fewest coins and stores the number of each coin type used into the array parameter. Index 0-3 of the array parameter should contain the number of pennies, nickels, dimes, and quarters respectively. Then write a main program that reads the total change amount as an integer input, calls exactChange(), and outputs the change, one coin type per line. Use singular and plural coin names as appropriate, like 1 penny vs. 2 pennies. Output “no change” if the input is 0 or less.

Ex: If the input is:

0

(or less), the output is: 

no change

CGS

Can I post my hw about Access Modules? I would have to provide my account inf. Is that allowed? 

Keystone assignment (Week # 6)

 

This assignment will contribute to the SLO # 2 and CO # 8.

Create a Worksheet Comparing Laptops Problem: 

You are shopping for a new laptop and want to compare the prices of three laptops. You will compare laptops with similar specifications, but where the brands and/or models are different. Perform the following tasks:

Part 1: Create a worksheet that compares the type, specifications, and the price for each laptop, as well as the costs to add an extended warranty

Use the concepts and techniques presented in this module to calculate the average price of a laptop and average cost of an extended warranty and to format the worksheet. Include a chart to compare the different laptop costs. 

Submit your assignment in the format specified by your instructor.

Part 2: You made several decisions while creating the worksheet in this assignment: 

  • How to organize the data, 
  • How to display the text
  • Which calculations to use 
  • Which chart to use. 

What was your rationale behind each of these decisions?

WRITING

 

Option A – Assume that you are the senior security analyst in your company and you have a new CIO who is just starting on the job next week. The CEO has asked you to provide a brief summary (several paragraphs) of the current state of the company’s security posture as a summary for the new CIO. Be sure to identify both positive and negative aspects. [This is a writing exercise and you can either use ‘real’ information from your current or past employer (don’t use the company name or disclose any proprietary or confidential information), or you can create your own assumptions about a fictitious company.]

A LAN and a WAN may be differentiated by

      

1. A LAN and a WAN may be differentiated by the types of media and devices used, by the distance over which they operate, by the network and subnet topology, and by the dominant communication protocols. Describe how LANs and WANs differ in each of these aspects.

2. Create a table to compare Novell, Windows, Mac, Unix, and Linux server operating systems. You should identify the most recent server operating system for each to consider. For Linux and Unix which have multiple variants, you may choose one current server variant. Include practical considerations such as cost as well as functional considerations.

3. You are hired by a firm that has offices in Peru, France, United States and Hungary. Your job is to coordinate a team of IT employees to connect all of the individual sites into one large WAN. Explain what the personnel implications are when setting up a WAN on a global basis. What are some of the barriers involved with global teams?

4. For the network that you have chosen to characterize, identify all items (peripheral devices, data, applications, access points, etc) being shared by users on the network. Explain how each is shared.