Total assignment 1250 words(Main post and 4 replies to other student post)

 Question

What is the history of the network models? What are four layers of the TCP/IP Model and how are they used? How does the networking protocol work?

Instructions

Search the peer-reviewed literature to identify its potential impact on networking and what measures can be put in place to minimize the effect. Indicate at least one source or reference in your original post

Main post -250 words

4 replies – 1000 words (Each reply 250 words)

Written Essay

The Role of Privacy in the Workplace

Conduct research via the internet and provide a brief yet detailed paper on Privacy in the Workplace. You may select a position as to whether you believe there should be Privacy in the Workplace, or that employees do not have the right to privacy at work. Things to take into consideration are outlined below:

 ·  What are the laws and regulations that impact privacy in the workplace?

 ·  Why would an employer want to monitor the activities of its employees?

 ·  What benefits / drawbacks are associated with monitoring employees?

 ·  What could an organization use to ensure that all employees are well aware of their rights and responsibilities with regard to privacy?

 ·  What type of monitoring systems are used in the workplace today?

For this assignment, submit a 5-6-page paper answering these questions as succinctly and completely as possible. 

Paper should conform to APA style. 

The page total does NOT include the title page or the reference page(s). 

Do not include an abstract of table of contents.

You should have a minimum of 4 references, none of which can be Wikipedia or Techopedia.

Your paper should be more of a narrative, and not just a series of bullet lists

You have two weeks to complete this essay.

CourseWork

   

Module Learning Outcomes assessed in this piece of coursework

• Critically Analyse and explain the concepts, strengths, limitations and suitability of agile development techniques;

• Develop appropriate use of Project Management qualitative techniques within an Agile framework, such as Feasibility Study, Planning, Control and Estimating, Risk Management and Configuration Management and quantitative techniques such as PERT and CPN

• Apply management and team building techniques to appropriately managing an information systems development project

• Critically discuss social and professional issues associated with Information systems Project Management.

• Select and apply object-oriented development techniques within an agile development environment;

• Manage the development of a system by applying an agile framework.

Assessment 2 Brief and Assessment criteria

  
 

Assessment 2 Report will be submitted as 1 pdf document containing 3 parts

Part A will take the form of a PROJECT INITIATION DOCUMENT (PID) for a specific project, using the PRINCE 2 approach

Part B will take the form of using AgilePM in the development of the specific project chosen

Part C Will be a research paper comparing, contrasting and discussing the strengths and limitations of Prince 2 and AgilePM in context to the project chosen

  
 

   

Introduction

Technology and information technology in particular, can now provide help in many ways that were not possible in the past. However, as more and more information and business and personal transactions are delivered or managed online, so it is increasingly important to ensure that users are not disadvantaged by the technology. Indeed, there is legislation that now requires organizations to provide both physical and virtual access so that no special needs group is disadvantaged.

Yourproject should be a response to one of theissuesidentified on the next page, and should take advantage of some of your design and technical skills and should help a specific group or organization, for example, by raising awareness, increasing membership or activity, raising funds, or providing services, developing new products or interfaces, or training programs for users or their supporters or some combination of these. Interfaces to computer programs, or other IT tools are areas where there are many opportunities for small projects. It may also be possible for you to consider ways of developing these or exploiting new technological developments such as mobile computing, wireless communication, digital imaging, new media, or electronic business processes in appropriate ways. You should develop an application or website prototype that will allow users to benefit from your project.

You are invited to propose a project that will help a small organization, group of users, or people who support your users. For example, there are a large number of organizations that provide support or advice to people, attached to local or national health, educational or community establishments. You will need to do some research on your chosen organization or user group, but you are not required or expected to contact them directly.

One of the project criteria is to decide the scope of the project. You may decide to limit your project to a specific local organization, a specific group of users, or a national organization. You must identify a specific area where such a project development would be useful and feasible and justify your choice.

You are required to submit a Project Proposal and Project Initiation Document (PID). You will get feedback on your initial proposals during the sessions during the taught module, and you will then be expected to work these up into a full Project Plan, with illustrative supporting material. In addition to your PID, you will be asked to submit a small “look and feel” prototype or walkthrough, and slides for boardroom presentation that describe the business case for your deliverables.

Any proposal will need to be constrained within a small budget for startup funds and development costs of a nominal (virtual) £100K. It is expected that theproject, will be up and running within 6 months, and result in some sustainable benefit to the chosen users or organization within one year. It is expected that these startup funds, possibly with further funds from other identified sources, will enable any new long-term venture to become self-supporting after an initial period of up to 12 months. If you decide that your project will require additional funding beyond the £100K, you will need to show how this money might be raised and spent, and how it could be recovered over a two-year period. You can apply for further funding.

Consider a project related to ONE of the following issues:

(a) Changing UK demographics

“The population of the UK is ageing. Over the last 25 years the percentage of the population aged 65 and over increased. This trend is projected to continue. By 2034, 23 per cent of the population is projected to be aged 65 and over compared to 18 per cent aged under 16. The fastest population increase has been in the number of those aged 85 and over.

As people get older, many suffer from impairment in sensory, cognitive or motor skills – for example, from impaired hearing and vision, reduced dexterity or cognitive abilities, dementia or Alzheimer, and many other medical or psychological conditions that require specific support. In the current economic climate, a growing elderly population is also likely to experience, social isolation, and reduced access to local shops, libraries, health and social services.

(b) Graduate employment opportunities

In 2018-2019 there were 2.38 million students studying at UK higher education institutions, following a steady increase over the past decade. Identify a project to help these graduates find appropriate employment.

   

(e) Brexit

Will there be a smooth transition for the UK economy after Brexit. Will Brexit create the next UK recession or is there a way of benefiting from this and creating a time of prosperity for the UK. Could you develop some ideas to help the economy grow over the next few years.

(f) Student research funding and scholarships. Identify a project to create funding opportunities to carry out research at universities taking into consideration venture capitalists and innovative ideas.

(g) Volunteering and charity work – you may have further ideas which you are free to suggest

(h) Economic Recovery projects post COVID pandemic – Identify a project to get the nations economy back on track

  
 

Specification of Deliverables for Part A: Prince 2 

Marking scheme Criteria & Weightings Part A

You are required to produce a Project Initiation Document (PID) .

The PID document should contain information to be used as part of a business and project case to the chosen organization, plus any other potential partners who might support your venture. You should make a plausible and convincing case with a well-specified project plan.

A good submission will have:

Project Title

Aims and Objectives of Project: This should indicate [8%]

1 the objectives, and the deliverables of this project

1 the expected sustainable benefits that will result from the project

1 any assumptions on which the plan is based

1 what measures that you might use to enable your you to demonstrate the success of the project

1 Legal, Social and Ethical issues that might effect the project and how you would address these issues.

Summary of Project Justification and anticipated Outcomes. [8%]

1 reference to any relevant research performed and criteria used to select the project

1 A brief outline of how the results will be achieved, and explanation of the choice of approach.

1 A brief description of the methods to be used to develop the final applications.

Detailed analysis or system design is not required.

1 TotalBudgetrequested – Thisshouldexplainbriefly how fundswould be allocated and scheduled over the lifetime of the project. Where other funding or resources are relevant, they should be mentioned in the bid.

1 Detailed Costs and Benefits You should identify main costs and benefits, showing development, start-up, and operational costs for the first year, with indications of where

   

extrafunding(if needed) willcomefrom.Youshouldalso show any director indirect benefits. You may comment on any intangible benefits of the project.

Product breakdown structure and Product Descriptions: [8%]

1 a top-level breakdown by Product (Deliverable)

1 A full product description, including quality criteria and an outline of how quality is assessed

1 a detailed Product breakdown that should show lower level details of three of the main products and their associated resources

Project Activities plans: These should include [8%]

1 A product flow diagram, showing the sequence in which products will be produced

1 A Gantt chart and a Critical Path Analysis to show the overall project plan, including Prince2 stages, as appropriate. The main activities should take place in the 6 months from January to June after the initial planning period.

Risk Analysis & Contingency plans: these should include [8%]

1 An evaluation (in terms of likelihood and impact) of any internal factors (project risks) and external factors (business risks) that may affect the project (at least 3 of each)

1 risk handling and mitigation plans – and an indication of the steps or procedures you would recommend to reduce the likelihood of each of these risks should they occur.

1 contingency plans – showing how you would reduce the impact of each of these risks or recover from them should they occur.

END of Part A

  
 

Specification of Deliverables for Part B : Agile Development of your project

Marking scheme Assessment Criteria & Weightings Part B

After several facilitated workshops some useful information has been put together as described in your PID above. From those sections above you must submit a report that includes the following:

A good submission will have:

o Explanation of why Moscow technique is used. Present a list in a table format of high-level MoSCoW prioritised business process requirements in a table format (Prioritised Requirements List [PRL]). Include estimates for each requirement as number of days. The requirements should form the basis for four separate High Level Use Case Diagram, including the users of the system. [10 %]

o Total of 4 users stories based on the MUST HAVE requirements. One User story for each of the 4 subsystems for the use cases identified. Use the template: “As a , I want so that

” and the associated Acceptance Criteria for each user story. [8 %]

o Choose 2 user stories to focus on from the 4 user stories above. Develop two paper prototypes, one for each of these 2 user stories. [8 %]

o For 1 of the prototypes present a description of the iterative development that takes place. Show the time-box planning or sprint planning for the development of this prototype. Show some changes to prototypes as a result of user feedback. Include filled in change request form. Also show the final prototype after the changes. [9 %]

o A first cut class diagram showing only the class names and attributes and relationships that will form the basis of the database for the information system that will be developed. [5 %]

  

END of Part B

  
 

Specification of Deliverables for Part C : Research Paper

A short academic research paper (approx. 4 pages) comparing, contrasting and discussing the strengths and limitations of Prince 2 and Agile and suggesting which approach is best for this project or is a hybrid approach Marks will be based on:

o Appropriate content, criticalevaluation of theliterature and forming your ownconclusions.

o Academic journals, conference papers, appropriate books and Internet site with clear standard referencing style and citation. [5%]

Higher marks will be achieved for:

o depth, detail, accuracy, succinctness, completeness, academic vigor, writing style

o referringdirectly to your specific project throughout. [5%]

END of Part C Brief

                     

Overall Quality of the whole report:

o Language (Spelling, Grammar, Style) – Are spellings and use of grammar correct?

o Is writing style clear and concise?

o Logical Coherence and flow (Clarity of Expression and Explanations)

o Quality of Formatting, structure Is title page, headings and sub-headings font and line spacing consistent?

o Quality of Diagrams – Are diagram readable, clearly labelled?

10%

(1) Computer science C++

 

Lists. Trace the following c++ program showing all output in the order that it appears on the output device (presumably the screen). If anything happens that makes it impossible to accomplish an operation or the results of doing so are unpredictable, describe what happens and abort at that point.

For this program assume that the following functions (methods) are fully defined and implemnted in the appropriate header and implementation files for the List class.

– construct that creates an empty list

– empty that returns true if the list is empty, false otherwise

– insert (a,b) that inserts an integer a into the list at position b

– erase(a) that removes the integer at position a in the list

– overloading the output operator << to enable it to display all elements of a list in sequence so cout<

– overloading the assignment operator so assigning one list to another creates a deep copy of the list.

CODE BELOW

#include
using namespace std;
#include “List.h”
int main(void)
{ List sheldon_cooper;
List leonard_hofstadter;
int i, j;
cout<<"Program begins, sheldon and leonard constructed"< if (sheldon_cooper.empty())
cout<<"His friend is Raj Koothrappali"< else
cout<<"His friend is Penny"< for (i=4;i<=8;i++)
{cout<<"Inserting "< sheldon_cooper.insert(i*2-3,i-4);
cout<<" List is now ";
cout< }
leonard_hofstadter=sheldon_cooper;
j=3;
cout<<"removing position "< sheldon_cooper.erase(j);
cout< j=2;
leonard_hofstadter.insert(54,j);
cout<<"leonard is now ";
cout< cout<<"program ends, buzz off ";
return 0;
}

Advanced Operating Systems Project

 

There are 4 parts for the project. The question may be long to read but it’s not a heavy work because there are many examples and explanations for the each parts.

*Part 1.  The first part of this project requires that you implement a class that will be used to simulate a disk drive. The disk drive will have numberofblocks many blocks where each block has blocksize many bytes. The interface for the class Sdisk should include :

Class Sdisk



{




public :




Sdisk(string diskname, int numberofblocks, int blocksize);




int getblock(int blocknumber, string& buffer);




int putblock(int blocknumber, string buffer);




int getnumberofblocks(); // accessor function




int getblocksize(); // accessor function




private :




string diskname;        // file name of software-disk




int numberofblocks;     // number of blocks on disk




int blocksize;          // block size in bytes




};




An explanation of the member functions follows :

  • Sdisk(diskname, numberofblocks, blocksize)
    This constructor incorporates the creation of the disk with the “formatting” of the device. It accepts the integer values numberofblocks, blocksize, a string diskname and creates a Sdisk (software-disk). The Sdisk is a file of characters which we will manipulate as a raw hard disk drive. The function will check if the file diskname exists. If the file exists, it is opened and treated as a Sdisk with numberofblocks many blocks of size blocksize. If the file does not exist, the function will create a file called diskname which contains numberofblocks*blocksize many characters. This file is logically divided up into numberofblocks many blocks where each block has blocksize many characters. The text file will have the following structure :
     

                                                            -figure 0 (what I attached below)              

  • getblock(blocknumber,buffer)
    retrieves block blocknumber from the disk and stores the data in the string buffer. It returns an error code of 1 if successful and 0 otherwise.
  • putblock(blocknumber,buffer)
    writes the string buffer to block blocknumber. It returns an error code of 1 if successful and 0 otherwise.

IMPLEMENTATION GUIDELINES : It is essential that your software satisfies the specifications. These will be the only functions (in your system) which physically access the Sdisk. NOTE that you must also write drivers to test and demonstrate your program.

*Part 2.  The second part of this project requires that you implement a simple file system. In particular, you are going to write the software which which will handle dynamic file management. This part of the project will require you to implement the class Filesys along with member functions. In the description below, FAT refers to the File Allocation Table and ROOT refers to the Root Directory. The interface for the class should include :

Class Filesys: public Sdisk



{




Public :




Filesys(string diskname, int numberofblocks, int blocksize);




int fsclose();




int fssynch();




int newfile(string file);




int rmfile(string file);




int getfirstblock(string file);




int addblock(string file, string block);




int delblock(string file, int blocknumber);




int readblock(string file, int blocknumber, string& buffer);




int writeblock(string file, int blocknumber, string buffer);




int nextblock(string file, int blocknumber);




Private :




int rootsize;           // maximum number of entries in ROOT




int fatsize;            // number of blocks occupied by FAT




vector filename;   // filenames in ROOT




vector firstblock; // firstblocks in ROOT




vector fat;             // FAT




};




An explanation of the member functions follows :

  • Filesys()
    This constructor reads from the sdisk and either opens the existing file system on the disk or creates one for an empty disk. Recall the sdisk is a file of characters which we will manipulate as a raw hard disk drive. This file is logically divided up into number_of_blocks many blocks where each block has block_size many characters. Information is first read from block 1 to determine if an existing file system is on the disk. If a filesystem exists, it is opened and made available. Otherwise, the file system is created.The module creates a file system on the sdisk by creating an intial FAT and ROOT. A file system on the disk will have the following segments:

                                                             -figure 1 (what I attached below)           

  • consists of two primary data objects. The directory is a file that consists of information about files and sub-directories. The root directory contains a list of file (and directory) names along with a block number of the first block in the file (or directory). (Of course, other information about the file such as creation date, ownership, permissions, etc. may also be maintained.) ROOT (root directory) for the above example may look something like

                                                    -figure 2 (what I attached below)

    The FAT is an array of block numbers indexed one entry for every block. Every file in the file system is made up of blocks, and the component blocks are maintained as linked lists within the FAT. FAT[0], the entry for the first block of the FAT, is used as a pointer to the first free (unused) block in the file system. Consider the following FAT for a file system with 16 blocks.

                                                        -figure 3 (what I attached below)

  • In the example above, the FAT has 3 files. The free list of blocks begins at entry 0 and consists of blocks 6, 8, 13, 14, 15. Block 0 on the disk contains the root directory and is used in the FAT for the free list. Block 1 and Block 2 on the disk contains the FAT. File 1 contains blocks 3, 4 and 5; File 2 contains blocks 7 and 9; File 3 contains blocks 10, 11, and 12. Note that a “0” denotes the end-of-file or “last block”.
    PROBLEM : What should the value of FAT_size be in terms of blocks if a file system is to be created on the disk? Assume that we use a decimal numbering system where every digit requires one byte of information and is in the set [0..9].
    Both FAT and ROOT are stored in memory AND on the disk. Any changes made to either structure in memory must also be immediately written to the disk.
  • fssynch
    This module writes FAT and ROOT to the sdisk. It should be used every time FAT and ROOT are modified.
  • fsclose
    This module writes FAT and ROOT to the sdisk (closing the sdisk).
  • newfile(file)
    This function adds an entry for the string file in ROOT with an initial first block of 0 (empty). It returns error codes of 1 if successful and 0 otherwise (no room or file already exists).
  • rmfile(file)
    This function removes the entry file from ROOT if the file is empty (first block is 0). It returns error codes of 1 if successful and 0 otherwise (not empty or file does not exist).
  • getfirstblock(file)
    This function returns the block number of the first block in file. It returns the error code of 0 if the file does not exist.
  • addblock(file,buffer)
    This function adds a block of data stored in the string buffer to the end of file F and returns the block number. It returns error code 0 if the file does not exist, and returns -1 if there are no available blocks (file system is full!).
  • delblock(file,blocknumber)
    The function removes block numbered blocknumber from file and returns an error code of 1 if successful and 0 otherwise.
  • readblock(file,blocknumber,buffer)
    gets block numbered blocknumber from file and stores the data in the string buffer. It returns an error code of 1 if successful and 0 otherwise.
  • writeblock(file,blocknumber,buffer)
    writes the buffer to the block numbered blocknumber in file. It returns an appropriate error code.
  • nextblock(file,blocknumber)
    returns the number of the block that follows blocknumber in file. It will return 0 if blocknumber is the last block and -1 if some other error has occurred (such as file is not in the root directory, or blocknumber is not a block in file.)IMPLEMENTATION GUIDELINES : It is essential that your software satisfies the specifications. These will be the only functions (in your system) which physically access the sdisk.

*Part 3.   The third part of this project requires that you implement a simple shell that uses your file system. This part of the project will require you to implement the class Shell along with member functions. The interface for the class should include :

class Shell: public Filesys



{




Public :




Shell(string filename, int blocksize, int numberofblocks);




int dir();// lists all files




int add(string file);// add a new file using input from the keyboard




int del(string file);// deletes the file




int type(string file);//lists the contents of file




int copy(string file1, string file2);//copies file1 to file2




};




An explanation of the member functions follows :

  • Shell(string filename, int blocksize, int numberofblocks): This will create a shell object using the Filesys on the file filename.
  • int dir(): This will list all the files in the root directory.
  • int add(string file): add a new file using input from the keyboard
  • int del(string file): deletes the file
  • int type(string file): lists the contents of file
  • int copy(string file1, string file2): copies file1 to file2

IMPLEMENTATION GUIDELINES :

See the figure 4  (what I attached below) for the ls function of Filesys.

See the figure 5 (what I attached below) for dir function of Shell. 

See the figure 6 (what I attached below)  for main program of Shell.

*Part 4.  In this part of the project, you are going to create a database system with a single table which uses the file system from Project II. The input file will consist of records associated with Art History. The data file you will use as input consists of records with the following format: The data (180 records) is in date.txt file (what I attached below)

  • Date : 5 bytes
  • End : 5 bytes
  • Type : 8 bytes
  • Place : 15 bytes
  • Reference : 7 bytes
  • Description : variable

In the data file, an asterisk is also used to delimit each field and the last character of each record is an asterisk. The width of any record is never greater than 120 bytes. Therefore you can block the data accordingly. This part of the project will require you to implement the following class:

Class Table : Public Filesys



{



Public :



Table(string diskname,int blocksize,int numberofblocks, string flatfile, string indexfile);



int Build_Table(string input_file);



int Search(string value);



Private :



string flatfile;



string indexfile;



int IndexSearch(string value);



};



The member functions are specified as follows :

  • Table(diskname,blocksize,numberofblocks,flatfile,indexfile)
    This constructor creates the table object. It creates the new (empty) files flatfile and indexfile in the file system on the Sdisk using diskname.
  • Build_Table(input_file)
    This module will read records from the input file (the raw data file described above), add the records to the flatfile and create index records consisting of the date and block number, and then add the index records to the index file. (Note that index records will have 10 bytes .. 5 bytes for the date and 5 bytes for the block number.)
  • Search(value)
    This module accepts a key value, and searches the index file with a call to IndexSearch for the record where the date matches the specified value. IndexSearch returns the blocknumber of the block in the flat file where the target record is located. This block should then be read and the record displayed.
  • IndexSearch(value)
    This module accepts a key value, and searches the index file indexfile for the record where the date matches the specified value. IndexSearch then returns the block number key of the index record where the match occurs.

See the figure 7 (what I attached below) for the main program of Shell which includes a search command.

Discussion

 

The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blockchain; such as Litecoin, Ether, and other currencies. In this discussion, please describe at least two cryptocurrencies with applicable examples. Discuss some similarities and differences. Lastly, discuss if you have any experience using any cryptocurrencies.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Need help in homework

Find a peer-reviewed scholarly journal article discussing electronic innovation and the government.  Complete a review of the article by writing a 4-page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing.  

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

 

System  architecture is the descriptive representation of the system’s  component functions and the communication flows between those  components.  

My definition immediately raises some important questions. 

• What are “components”? 

• Which functions are relevant? 

• What is a communication flow?