Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
411F7
CHECK ATTACHMENT
Deadlocking in Concurrent and Distributed system
There are 5 resources, A, B, F, G, I, each of which can be acquired and released. There are two resource-user (or thread) types S and T.
Each instance of S repeatedly executes this code sequence: It acquires I, then A, and then G. It releases A and G. It acquires B. It releases I and then B.
Each instance of T repeatedly executes this code sequence: It acquires G and then F It releases G It acquires A It releases F and then A
a) How many instances of S does it take to create deadlock if there are no instances of T?
b) How many instances of T does it take to create deadlock if there are no instance of S?
c) There are instances of S and of T. How many instances of S and how many instances of T does it take to create deadlock? Note: In some cases, no deadlock is possible no matter how many instances/threads there are.
BSWFP
Final Project Topic Name: Data Center Security
In 100 words (1)
1. Include a short paragraph describing your project (Data Center Security ) and how you intend to research it.
In 200 words (2)
2. Brief abstract describing final project (Data Center Security ).
3. 500-600 words, double spaced, written in APA format, showing sources and a bibliography
Please include the following:
What is (Data Center Security ).
Advantages/Disadvantages
Challenges one might face
Conclusion:
References:
Malware & Sniffers
Using the following link as your reference, select TWO and explain the differences
(viruses, worms, trojans, and bots).
Python 3 – Two Python Questions
Hello!
There are TWO Python 3 questions that I need to be completed.
I will attach the PDF with instructions and a ZIP file with the required .py file needed to complete the home.
Thank you!
final Paper
For the final project, you will be conducting a forensics investigation using one of the following items:
- A smartphone
- A network (ideally, a wireless network)
You may use either for your investigation. However, be aware of legal issues surrounding your data gathering. If you are using any system you do not personally control and have authority to investigate/discover, please get written permission from the owner/operator of the system or refrain from your forensics analysis of that systems and use a personal system. For a network, you can use your own personal home network. For a smartphone, consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available.
You will review various forensics tools used with your selected system. Select a tool and use that tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:
Week 7 – Prepare an investigative report of the forensics data capture conducted using the tool selected for this purpose. The paper should provide the following information:
- Executive Summary of your investigation, including a description of the device or systems and the tool used for the forensics analysis
- Step-by-step description you used to gather data for analysis
- Report on the information that was obtainable from the device
- Graphics evidence that you conducted the forensics data gathering and analysis
The paper should be in a form that would be used for reporting to a court or a law enforcement agency. Be sure to provide graphics evidence of your forensics investigation effort (Screenshots, reports, etc.). References should be in APA format.
Project management
Find any example of a real project with a real project manager. Feel free to use projects in the media (such as the Olympics, television shows, or movies) or a project from your work, if applicable.
Write a two page paper describing the project in terms of its scope, time, and cost goals.
Also describe other impacts on a project, such as quality, resources, and risks.
Discuss what went right and wrong on the project and the role of the project manager and sponsor.
Be sure to describe whether the project was a success, and why.
Include at least one reference and cite it on the last page. 500 words
4 Weeks / Intro to Programming Concept
Currently Unavailable to complete
Dates are:
01/05/2021-
01/30/2021
need case study help minimum 300 words
Read the case study “Teloxy Engineering (A)” on page 948 attached and answer the corresponding questions on the same page.
Questions
1. Using the expected value, is it economically better to make or buy the component?
2. Strategically thinking, why might management opt for other than the most economical choice?