Discussion 4 CISS 301

Class Discussion Topics
  1. Discuss the pros and cons of the various process management algorithms presented in this chapter. Given a choice, which algorithm would you prefer to implement and why?
  2. Discuss the different criteria for designing a process scheduling policy. Do you think that it is possible to optimize the design of a process scheduling policy to suit any system? If so, how? If not, why? Provide some examples to support your ideas.
Additional Resources
  1. History of operating systems:  http://www.osdata.com/kind/history.htm
  2. Dual-Core vs. Quad-Core CPUs: http://www.pcmag.com/article2/0,2817,2406293,00.asp
  3. Intel® Core™2 Quad Processors: http://ark.intel.com/products/29765/Intel-Core2-Quad-Processor-Q6600-8M-Cache-2_40-GHz-1066-MHz-FSB
  4. Multi-core Enterprise Technology at Dell®: http://www1.euro.dell.com/content/topics/topic.aspx/emea/topics/products/pedge/en/multi_core?c=uk&cs=ukbsdt1&l=en&s=bsd

1 page in APA 6th Format on BlockChain

1 page in APA 6th Format on BlockChain on the below points.

1. In chapter 2, the author describes Hyperledger Fabric and its components. Create a new thread, choose one of the Hyperledger design principles described in chapter 2, and explain why your chosen design principle is important to a successful enterprise blockchain implementation. I’m interested to read what YOU learned from this week’s reading. Do NOT submit a research paper. Tell me what you think.

2. Then think of three questions you’d like to ask other students and add these to the end of your thread. 

computer science

 network analysis/tech using the NS3 network simulator and , report-1000 words and , 10 ppt slides w/o notes 

Organ leader and decision making

Datatronics Case Study

Read the Customer Service at Datatronics Case Study on pages 246-250 in the textbook. Answer the Discussion Questions at the end of the Case Study. Your responses must be complete, detailed and in APA format. See the sample assignment for expected format and length.

Create a presentation

 

File submission: Lab – Create a presentation 

 
Objective of the activity  Through this activity the student will develop a presentation with the following characteristics:  Use different “layouts” (additional to Title Slide “and Title and Content” Apply a “Theme” Include images and integrate audio or video Apply transition movements to slides and animation movements in text and images .

 
Instructions  The purpose of this activity is for the student to develop a presentation using MS Power Point. 

 
What are we going to do?  The goal is to creatively construct a presentation that carries the message in an attractive way.  Visit the Ciudad Seva page of the writer Luis López Nieves. In the poems section, available at https://ciudadseva.com/biblioteca/indice-alfabetico-poemas/ (Links to an external site.), Select the poem of your preference. 

 

How are we going to do the activity?

Read the instructions and the evaluation criteria.

Access the application to create presentations.
Create templates with the text given for each one. Remember the 10/20/30 and 1/7/7 rules.
Apply "background" to the entire presentation.
Add graphics (images and / or photos).
Apply transition movements in the "slides" and animation movement in text and graphics.
Once the presentation is developed, save the final document on your computer with the title of the selected poem. The name of the document must include your name, for example: To my daughter - Maria Olivero.

Check that your presentation meets the evaluation criteria stated in the rubric.

Before doing the exercise, access the resources, including the tutorials. This activity is graded only once.

 
Deliverable  Submit your presentation through this virtual space within the stipulated date. The activity is individual. The work must be delivered on time, without spelling or grammatical errors. The works will be submitted to the tool to detect similarity of contents (now Urkund). 

 
Basic review resource  Microsoft. (2019). Tips for creating and presenting an effective presentation. Retrieved from https://support.office.com/es-es/article/sugencias-para-crear-y-realizar-una-presentaci%C3%B3n-eficaz-f43156b0-20d2-4c51-8345-0c337cefb88b 

RSA Applications

 

You have taken courses in the key encryption created by Rivest,  Shamir, and Adelman (RSA) and have identified that many of the  associated applications that they offer could benefit the corporation in  cryptography.  You have been asked to present your recommendation for  an RSA application to the Board of Directors to consider purchasing at  least two of their associated applications, and you know that you must  present a strong case for such a purchase. 

  • Research the RSA associated applications and identify the associated benefits and costs. 
  • Your multimedia presentation must be a minimum of 10 slides with a minimum of four supporting APA references.  
  • Include charts and graphs if they support your recommendation

Access tools in Cybersecurity

Describe identity and access management tools and explain the importance of these tools to a business.  Choose an industry and discuss how identity and access management is employed in that industry. 

2 pages