Computer Architecture : topic (Is DNA the future of data storage? )

Discussion Questions:

  • Why is DNA storing information important?
  • What characteristic of DNA makes it good for storing information?
  • What are the advantages of using DNA for information storage instead of RNA?
  • What are the obstacles hindering the scaling up of DNA data storage? 
  • Can synthetic DNA store digital data and perform special-purpose computations, like large-scale similarity search?

Network and telecommunication

The task is to cut off some users and keep others accessing the Internet but maintaining access to the printers. Additionally, the accounting department wants to work from home.

Present a diagram showing how you would meet the requirement without compromising the security of the data and maintaining a smooth workflow. You should assume that all users are simple users and have no computer skills. Please write response in 5 to 6 pages in brief with atlease 5 reference.

Assignment

The purpose of this assignment is to examine the components of a research article and help you identify guidelines for conducting critical analyses of published works.  The knowledge gained should be applied when completing your weeks 3 and 5 research assignments.  As you complete assignments it is a good idea to proof read your work or use the University writing center to help with APA formatting.  Both are great avenues for assistance in minimizing grammatical errors and conducting research. Please use the attached “Guideline” to answer the below questions: 

  • What is an Information Technology Project?  
  • Identify & explain the major parts of a research paper.
  • Explain the difference(s) between qualitative vs quantitative research methods.
  • Why use Peer Reviewed journals?
  • Why are keywords used during the Literature Review process?
  • Why are project deliverables, limitations & deadlines an important aspect of project development?
  • Why use/apply APA Basic Citation Stiles in your writing assignments/research?
  • Why is Academic Integrity important (see syllabus)?
  • Explain the difference between plagiarism vs self-plagiarism?

Your assignment must follow these formatting requirements:

  • Assignment should be three (3 ) pages, not including cover and reference pages.
  • Use at least three (3 ) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page do not count toward the page count.

Vendor Websites

 

Go to vendor Web sites (especially those of SAS, SPSS, Cognos, Teradata, StatSoft, and Fair Isaac) and look at success stories for BI (OLAP and data mining) tools. What do the various success stories have in common? How do they differ?

Write a 5 pages APA paper (including cover and reference pages) discussing these commonalities and differences.

Project Paper – 2 pages – Due 4/16

Evidence Collection Policy

Scenario

After the recent security breach, Always Fresh decided to form a computer security incident response team (CSIRT). As a security administrator, you have been assigned the responsibility of developing a CSIRT policy that addresses incident evidence collection and handling. The goal is to ensure all evidence collected during investigations is valid and admissible in court.

Consider the following questions for collecting and handling evidence:

1.  What are the main concerns when collecting evidence?

2.  What precautions are necessary to preserve evidence state?

3.  How do you ensure evidence remains in its initial state?

4.  What information and procedures are necessary to ensure evidence is admissible in court?

Tasks

Create a policy that ensures all evidence is collected and handled in a secure and efficient manner. Remember, you are writing a policy, not procedures. Focus on the high-level tasks, not the individual steps.

Address the following in your policy:

§  Description of information required for items of evidence

§  Documentation required in addition to item details (personnel, description of circumstances, and so on)

§  Description of measures required to preserve initial evidence integrity

§  Description of measures required to preserve ongoing evidence integrity

§  Controls necessary to maintain evidence integrity in storage

§  Documentation required to demonstrate evidence integrity

Required Resources

§  Internet access

§  Course textbook

Submission Requirements

§  Format: Microsoft Word (or compatible)

§  Font: Times New Roman, size 12, double-space

§  Citation Style: APA

§  Length: 2 to 4 pages

Self-Assessment Checklist

§  I created a policy that addressed all issues.

§  I followed the submission guidelines.

Topic

  develop an introduction to your Chapter 2 where you clearly explain the overall research topic, literature gathering process, and the scope and organization of the literature review. The introduction should conclude with a paragraph that describes the sequence of the literature you will include and the literature analysis process. After the introduction, you should incorporate possible headings/subheadings that you plan to cover and include at least 20 scholarly references.  Continue to develop a draft of Chapter 2 where you clearly provide a well-developed introduction and other sections relevant to your topic.   please work to submit at least 12  pages of literature 

Open this document with ReadSpeaker docReader

operating system

Upload Assignment: Project2

  ASSIGNMENT INFORMATION

  1. Points Possible100
  2. Project2: A Simple Distributed Computing Platform (Due at 11:59:59pm on 03/25/2021 (EDT))

    Description:

    You are asked to develop a replicator (client) that distributes a large job over a number of computers (a server group) on a single switched LAN (our Linux lab). In this assignment, a large (simulation) job can be divided into a number of small jobs, each of which can be assigned to one machine from the server group for execution. The execution results of the small jobs can be merged once all of them successfully terminate.

    System Architecture:
      client             server1       server2        server3 …       |                      |                 |                  |       |                      |                 |                  |       |       LAN        |                 |                  |       |——————|————–|————–|—–

    The client and servers are running Network File System (NFS) so that user files are visible at $HOME directory. You may want to set up the following environment:

    • $HOME/replicate.hosts: a list of (server) hostnames which participate in the simulation.  There is no reason why your implementation cannot support up to 10 servers.
    • $HOME/replicate_out: the directory that stores the small job execution result.
    • The simulation program “hyper_linkOpen this document with ReadSpeaker docReader” (binary) is provided. In this assignment, you don’t need to know or care what “hyper_link” does, and actually it is a computing intensive (CPU demanding) simulator. The command line arguments of “hyper_link” are job# 1000000 999 1 2 2 100, where the job number determines the number of small jobs in your simulation. To allow the client to run a large job, the job# should be given in a tuple: start, end, and step. For example, the command (from the client) “hyper_link 1 100 1 1000000 999 1 2 2 100” yields 100 small jobs with the job# starting from 1 to 100. Each small job produces a screen output (see example below) at the end (if finished successfully). Your code needs to redirect the output to a file and save it in $HOME/replicate_out. For example (on the server side),
      ./hyper_link 1 1000000 999 1 2 2 100
      will produce a screen output looks like (it takes approximately 2 minutes on spirit):
      1:1000000:999:2:0.5:1.125193e+00:2.454346e-04:6.251640e-01:2.205078e-04:0.000000e+00:0.000000e+00

      Requirements:

    1. The communications between the replicator and servers are achieved through remote procedure calls in the client-server fashion.  You can only use C programming lanuage to complete this project.  Your implementation should not rely on any extra library (to compile your code).  Your code must compile by using gcc installed on the Linux workstations in FH 133.
    2. A user interface is required for the replicator to control the server. A command line interface will be acceptable. A (working) graphic user interface (GUI) will impress the instructor and earn up to 20 bonus credits. Your client interface should at least support the following operations.
      • start a large job. For example: hyper_link 1 100 1 1000000 999 1 2 2 100 (start 100 small jobs with job number starting from 1 to 100)
      • show the current CPU load of a certain server (if the server is active).
      • show the current server status (active or inactive).
      • stop a certain server.
      • restart a certain server.
      • For those who are going to implement GUI, you need to create an icon for each server, and show the server status in the real time, e.g., the CPU load (with the mark of hi-threshold), active/inactive, etc.
      • The hi-threshold and lo-threshold can be set to the pre-determined values (as long as they are reasonable).  Alternatively, you will impress the instructor by implementing the configurable threshold values during the run.  If that is the case, you have to provide two extra commands that set the values.
    3. The replicator has to make sure all small jobs are successfully finished.
      • If a server crashes (or not responsive), the running job (not finished yet) will be killed and rescheduled (at a certain time per your design) for execution.
      • If a server CPU load exceed the preset threshold (the higher threshold), the replicator stops the server (and therefore kills the job).
      • The replicate should keep polling the CPU load of the stopped server. Once the load becomes lower than the lower threshold (a preset value), the server should be reactivated to run the jobs.
      • The replicator can also stop any server (through user interface) if needed. Once happened, the unfinished job will be killed.
      • If a job terminates abnormally (e.g., being killed), the replicator has to reschedule the job execution later.
    4. Makefile: you need to provide a Makefile that allows the instructor to compile your code by simply typing “make”.
    5. Write-up: you are required to write a README document (in txt format) that describes your project design detail and the execution sequence (with the commands). In particular, please explicitly state which part, if there is any, does not work and the possible reasons why that module does not work. For those working modules, please give a brief (in short) sample output.
    6. Hints:
    7. RPC programming: a brief (Sun) RPC programming introduction is given in the class.
    8. CPU load: please check /proc/loadavg for the CPU load information in Linux.
    9. Linux signal: the signal  mechnism must be used to control the simulation execution at the servers.
    10. Submission:
    11. Create a folder and name it as your Linux account username, concatenated with “_p2”, e.g., hwang_p2 (all lower case).
    12. Copy all your source code to the above folder (clean your source code folder and remove all binary files).  Please do not submit any binary code!  Only the client, server source code as well as *.x file are required.
    13. Provide a Makefile such that the instructor only needs to type “make” to generate the RPC client stub, the RPC server stub, and compile all the client and server binaries.
    14. Edit a README file (in plain text format only) and provide the following information:
      • Design details
      • Compiling instruction and execution sequence (with commands)
      • A sample test run
      • Please explicitly state which part, if there is any, does not work and the possible reasons why that module does not work.
    15. Log in grail, go to the parent director of the folder you created, and run (suppose the your folder is “hwang_p2”)
      $ turnin -c cis620w -p p2 hwang_p2
      If there is no error message, your submission is successful.
    16. Your most recent submission will always automatically overwrite the previous one.

 

Exp19_Excel_Ch04_ML1_Pet_Supplies

 

Exp19_Excel_Ch04_ML1_Pet_Supplies

 

Project Description:

You are the inventory manager for Crafton’s Pet Supplies. You are currently preforming analysis to determine inventory levels, as well as the total value of inventory on hand. Your last steps will be to check the report for duplicate entries and format for printing.