Advanced Operating Systems Discussion

 

Discussion Forum 2 Question

Computerized Operating Systems (OS) are almost everywhere. We encounter them when we use our laptop or desktop computer. We use them when we use our phone or tablet. Find peer reviewed articles that discuss the advantages and disadvantages of at least two different Robotic Operating Systems (ROS).

Be sure to provide supporting evidence, with citations from the literature . It is not enough for you to simply create a own posting. You must read the postings of the other members of the class and comment on each of them. Please see Discussion Forum of the class syllabus for additional details on content. 

 

Initial Discussion: 500 words

Responses 4 : Each 200 Word

Cloud Computing

 Chapter 10 topics:

  • Define and describe business continuity.
  • Define and describe disaster recovery.
  • Discuss pros and cons of cloud-based backup operations.
  • Discuss threats to an IT data center infrastructure and provide cloud-based solutions to mitigate the risks.

 Chapter 11 topics:

  • Define software architecture.
  • Define and describe SOA.
  • Compare and contrast a web page and a web service.
  • Search the Web for companies that offer web services and then describe three to five web services that programmers might integrate into the applications they create.

 Chapter 12 topics:

  • Discuss key items that should be included in an SLA.
  • Define predictive analytics and discuss how an IT manager might use such analytics.
  • Discuss how an IT manager might use load testing on a site.
  • Define and discuss vendor lock-in and identify steps a company should take to mitigate this risk.

 Chapter 13 topics:

  • List and describe common system requirements one should consider before moving an application to the cloud.
  • Discuss why a company should consider using a consultant to oversee a cloud migration and list specific skills you would expect the consultant to have.
  • List and discuss resource utilization characteristics one should monitor for an application prior to moving the application to the cloud.
  • List possible training requirements for an SaaS solution integration, a PaaS application migration, and an IaaS application migration.

Research paper

 

Library Assignment # 1

Create a Research paper about Networks

Include in the Research paper:

  • Definition of Network
  • Examples of network devices
  • Network topologies and types of networks
  • Advantages and Disadvantages of a network
  • What is the difference between public and private networks?
  • Your opinion about the importance and scope of computer networks

Rules of the Research Paper:

  • Minimum two pages
  • At least one footnote
  • Minimum two references
  • Use the MLA Style learned in the class

Practical Connection

 

  1. Overview: At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where you will demonstrate how this course research has connected and put into practice within your own career.
    Directions:
    Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
    Requirements:  

    • Provide a 500 word (or 2 pages double spaced) minimum reflection.  
    • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.  
    • Share a personal connection that identifies specific knowledge and theories from this course.   
    • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.   
    • You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
    • See examples to help guide your writing: Practical Connections Examples.pdf
      View the rubric: Practical Connections Rubric.docx

Home work 3

  Write short answers, uploaded as a WORD DOCUMENT (300 to 400 words) and attach references  

  • 3.1 List three approaches to message authentication.
  • 3.2 What is a message authentication code?
  • 3.4 What properties must a hash function have to be useful for message authentication?
  • 3.5 In the context of a hash function, what is a compression function?
  • 3.6 What are the principal ingredients of a public-key cryptosystem?
  • 3.7 List and briefly define three uses of a public-key cryptosystem.
  • 3.8 What is the difference between a private key and a secret key?
  • 3.9 What is a digital signature?

Answer the following questions

  

1. (2 points) Answer the following questions about interrupts:

(a) Describe the events that occur when an interrupt occurs at the completion of a disk transfer.

(b) If a second interrupt occurs during processing of that disk transfer, what steps are taken?

2. (2 points) What are the advantages of flash memory over hard disk storage? What are the advantages of hard disk over flash memory storage? What are the advantages of both hard disk and flash memory storage over RAM? What is the major advantage of RAM over other types of storage?

3. (2 points) Clearly describe and discuss at least three advantages of clustering.

4. (2 points) Explain in detail why the average seek time for a hard disk is less than a CD-ROM or DVD-ROM.

5. (2 points) Cloud computing is a recent technology that is used as a means to provide off-site computing power to an organization. Locate information about cloud computing and compare cloud computing with grid computing. In what ways are they similar? How do they differ?

Develop a Java application that plays

  

Develop a Java application that plays a “guess the number” game as described below.
a) Your application first gets a random number in the range 1-1000 inclusive (you might want to use Math.random() or the Random class).
b) The application then displays the following prompt (probably via a JLabel):
I have a number between 1 and 1000. Can you guess my number?
Please enter your first guess.
Post a textbox for the user to enter a number and post a message telling the user to hit ‘Enter’ after entering a guess in a textbox (probably using a JTextField).
c) Input the user’s guess in the code for a previously-registered event-handler method (consider using the event-handling approach discussed in the text, or the actionPerformed() method of class based on the ActionListener interface, which will require some additional research outside the text).
d) For the first guess, color the entire background red, meaning that they are getting warmer (you might want to use the setBackground() method for a container). If this is the second or later guess, and they are further from the correct number than the last guess, then color the entire background blue. If they get the correct number then color the background some other color than red or blue.
e) If the user guessed the number correctly, respond with their number, post a congratulatory message, get a new random number, and display a JButton to start a new game. Otherwise, to help the user close in on the correct number, post a message, with their guessed number, whether they are “TOO HIGH” or “TOO LOW” from the correct number, and whether they are “WARMER” or “COLDER” (this should match the background color). Also report the guess number of the next guess (e.g. “Enter guess number nnn”). You might want to use a concatenated string in JLabel for these incorrect guess messages.
f) The process is repeated each game until the user guesses the correct number. Be sure that you erase obsolete status messages. 

Assignment

 Do a bit  if research into File Inclusion Vulnerability.

  • What is it?
  • Why is is dangerous?
  • What is the difference of low and remote inclusion?
  • What methods can me employed to prevent a security breach?
  • What programming languages are vulnerable to this type of attack.

ERM W 13 D

 

The article on IRB this week discusses broad consent under the revised Common Rule. When you are doing any sort of research you are going to need to have your research plan approved by the University’s institutional review board or IRB. If you have never heard of this term before, please take a look online and find a brief summary of what it is about, before you read the article.  

Please answer the following questions in your main post:

  • What are the main issues that the article addresses?
  • What is the Common Rule?
  • How is this issue related to information systems and digital privacy?

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.