Categories
Operating Systems

1. As thoroughly as possible, describe the security components of your approved

1. As thoroughly as possible, describe the security components of your approved information system. For discussion of server-side components, it is okay to make reasonable educated assumptions based on what you know about the typical configuration of the server-side of a client / server system.
2. Discuss any security concerns or vulnerabilities that your approved information system has.
***The approved information system is Facebook**

Categories
Operating Systems

1. As thoroughly as possible, describe the security components of your approved

1. As thoroughly as possible, describe the security components of your approved information system. For discussion of server-side components, it is okay to make reasonable educated assumptions based on what you know about the typical configuration of the server-side of a client / server system.
2. Discuss any security concerns or vulnerabilities that your approved information system has.
***The approved information system is Facebook**

Categories
Operating Systems

| Network & Host Name IPv4 information -> Use the IP from the VM website along w

| Network & Host Name
IPv4 information -> Use the IP from the VM website along with the right gateway and DNS server.
hostname -> Your student username. First part of your email i.e roary001
| Software Selection
Description
Base Environment -> Server
Additional software for Selected Environment -> DNS Name Server
| Root Password
Make sure the password is your pantherid. i.e 7654321
Fedora 36 // 2pts
| Network & Host Name
IPv4 information -> Use the IP from the VM website along with the right gateway and DNS server.
hostname -> Your student username. First part of your email i.e roary001
| Date & Time
Update the date & time with the values below
Region -> Asia
City -> Qatar
| Root Account
Make sure to enable root account
Make sure the password is your pantherid. i.e 7654321
Enable – Allow root SSH login with password
SL 7 // 2pts
| Network & Host Name
IPv4 information -> Use the IP from the VM website along with the right gateway and DNS server.
hostname -> Your student username. First part of your email i.e roary001
| Software Selection
Description
Base Environment -> Infrastructure Server
Add-Ons for Selected Environment -> MariaDB Database Server ( Only )
| User Settings // This is on the second screen
Make sure the password is your pantherid. i.e 7654321
Rocky 8 // 2pts
| Network & Host Name
IPv4 information -> Use the IP from the VM website along with the right gateway and DNS server.
hostname -> Your student username. First part of your email i.e roary001
| Software Selection
Description
Base Environment -> Minimal Install
Additional software for Selected Environment -> N/A
| Installation Destination
Description
Storage Configuration -> Custom
/boot512 MB
swap1 GB
/home768 MB
/PANTHERID3 GB
/max
| Root Password
Make sure the password is your pantherid. i.e 7654321
Ubuntu 22 // 2pts
| Choose type of install
Ubuntu Server (minimized)
| Network Connections
IPv4 information -> Use the IP from the VM website along with the right gateway and DNS server.
| Installer update available
Continue without updating
| Profile setup
Your name: <– Your first , last name i.e Roary Panther
Your server's name: <– Your student username. First part of your email i.e roary001
Pick a username: <– Your student username. First part of your email i.e roary001
Choose a password: <– Your pantherid. i.e 7654321
Confirm your password: <– Your pantherid. i.e 7654321
| SSH Setup
Select – Install OpenSSH server

Categories
Operating Systems

record the video while using the win11 Vwmare Snipping Tool Sticky Notes Weat

record the video while using the win11 Vwmare
Snipping Tool
Sticky Notes
Weather

You will add the apps to the Windows 11 taskjbar and thent modify an .XML file that include the apps on the taskbar. Finally, you will deploy the taskbar xml file using Local Group Policy.

Categories
Operating Systems

The immediate effects of system downtime take the spotlight moments after an out

The immediate effects of system downtime take the spotlight moments after an outage. Like the human body redirects its resources to fight infection after an injury, an organization’s IT staff springs into action to restore functionality. While the networks and data are unavailable, customers cannot log in to their accounts, orders are not processed, and networks and services can neither access nor transmit essential information.
Furthermore, even after the dust clears and the system is back online, complications of the outage may still linger. As your reading explains in some detail, the company may face legal, regulatory, social, and productivity concerns, not to mention the loss of consumer confidence and reputation.
The two case studies below represent two different system outages for vastly different companies. Each company is considering upgrading their systems to ensure higher availability. As you read each, consider the following factors:
The cost of downtime for the company
The length of downtime the company could tolerate financially in a year
The return on investment to increase availability
Assume that each of the companies has contacted you, as an independent consultant, and asked you to advise them whether or not they should upgrade their systems. Construct a report of 1–2 pages in length for each company in which you address each of the bulleted points above and make a recommendation either for or against an upgrade to increase availability.
The text contains a number of complex formulas on this matter, but you are not required to utilize them. However, some straightforward arithmetic calculations are likely necessary. Make sure to reference any sources you cite in your report. Keep in mind that there is no one correct answer to this Application, but any conclusions you draw should be supported by this week’s resources.
Case Study A
An online retailer sells specialty shoes for men, women, and children. It markets worldwide through its website, which is its only sales outlet. North America accounts for 40 percent of its sales, Europe accounts for 30 percent, Australia and New Zealand contribute 15 percent, and the remaining 15 percent originate in Asia and Africa.
The company averages 10 sales per hour, distributed fairly evenly throughout the day. The average sale is $200, on which it makes a profit of $50. The company is housed in South Carolina and employs 40 people at an average salary of $20 per hour. Half of the jobs are in the fulfillment department, which processes and ships orders.
The company uses a large, $35,000 Linux server to host its website. The server is down about twice per year for an average of four hours during each failure. During system outages, the fulfillment staff usually works overtime, for which it is paid 150% of the normal rate. To increase availability, the company would like to purchase a second server at approximately the same price as its existing server.
Case Study B
A major securities trading firm that serves primarily wealthy investors is based in Philadelphia, and it has branch offices in London, Paris, Singapore, and Australia. The firm’s trading activity is managed by a massive million-dollar redundant system housed at headquarters. It executes trades on all stock exchanges worldwide, so the system is active 24 hours per day, seven days a week.
The firm averages 100 trades per minute. An average trade is $50,000, on which it makes a 2% commission. Half of the commission is paid to the trader and half is paid to the brokerage firm. The trading system fails an average of two times per year, but the backup system can be brought into service in approximately five minutes. An upgraded system would eliminate one yearly outage. The system is expensive, and an upgrade may cost as much as $2,000,000.

Categories
Operating Systems

The immediate effects of system downtime take the spotlight moments after an out

The immediate effects of system downtime take the spotlight moments after an outage. Like the human body redirects its resources to fight infection after an injury, an organization’s IT staff springs into action to restore functionality. While the networks and data are unavailable, customers cannot log in to their accounts, orders are not processed, and networks and services can neither access nor transmit essential information.
Furthermore, even after the dust clears and the system is back online, complications of the outage may still linger. As your reading explains in some detail, the company may face legal, regulatory, social, and productivity concerns, not to mention the loss of consumer confidence and reputation.
The two case studies below represent two different system outages for vastly different companies. Each company is considering upgrading their systems to ensure higher availability. As you read each, consider the following factors:
The cost of downtime for the company
The length of downtime the company could tolerate financially in a year
The return on investment to increase availability
Assume that each of the companies has contacted you, as an independent consultant, and asked you to advise them whether or not they should upgrade their systems. Construct a report of 1–2 pages in length for each company in which you address each of the bulleted points above and make a recommendation either for or against an upgrade to increase availability.
The text contains a number of complex formulas on this matter, but you are not required to utilize them. However, some straightforward arithmetic calculations are likely necessary. Make sure to reference any sources you cite in your report. Keep in mind that there is no one correct answer to this Application, but any conclusions you draw should be supported by this week’s resources.
Case Study A
An online retailer sells specialty shoes for men, women, and children. It markets worldwide through its website, which is its only sales outlet. North America accounts for 40 percent of its sales, Europe accounts for 30 percent, Australia and New Zealand contribute 15 percent, and the remaining 15 percent originate in Asia and Africa.
The company averages 10 sales per hour, distributed fairly evenly throughout the day. The average sale is $200, on which it makes a profit of $50. The company is housed in South Carolina and employs 40 people at an average salary of $20 per hour. Half of the jobs are in the fulfillment department, which processes and ships orders.
The company uses a large, $35,000 Linux server to host its website. The server is down about twice per year for an average of four hours during each failure. During system outages, the fulfillment staff usually works overtime, for which it is paid 150% of the normal rate. To increase availability, the company would like to purchase a second server at approximately the same price as its existing server.
Case Study B
A major securities trading firm that serves primarily wealthy investors is based in Philadelphia, and it has branch offices in London, Paris, Singapore, and Australia. The firm’s trading activity is managed by a massive million-dollar redundant system housed at headquarters. It executes trades on all stock exchanges worldwide, so the system is active 24 hours per day, seven days a week.
The firm averages 100 trades per minute. An average trade is $50,000, on which it makes a 2% commission. Half of the commission is paid to the trader and half is paid to the brokerage firm. The trading system fails an average of two times per year, but the backup system can be brought into service in approximately five minutes. An upgraded system would eliminate one yearly outage. The system is expensive, and an upgrade may cost as much as $2,000,000.

Categories
Operating Systems

The Internet of Things (IoT) is becoming increasingly popular in both business a

The Internet of Things (IoT) is becoming increasingly popular in both business and everyday life.
Explain what the Internet of Things (IoT) is and provide a brief history, in your own words, of the IoT.
Discuss the potential impact that IoT can have on how people live.
Select a company and explain how the organization has benefited from the IoT. Detail specific examples of how the company benefited.
How has the IoT been impacted by the pandemic? Explain specific examples.
Directions:
Your well-written should be 4-5 pages in length, not including the title and reference pages. To make it easier to read and therefore grade, make sure you clearly delineate each section of your answer so it can be matched with the relevant question.
A single double space is done between references and between paragraph
Include a solid thesis statement, which is the main point you are making in the paper and everything in the paper is built around that key statement (which is usually the 2nd or 3rd sentence of the paper)
Keep the paragraph between 3-5 sentences
The paragraph should contain 1 thought or point
Avoid writing in 1st person , and don’t use contractions( can’t , don’t)
Avoid generalization (everyone, most people)
Avoid ending sentences with a preposition.
Make sure that each page does not include more than 3 references.
The conclusion should be summarizing all the topics or the most important point
The references should be varied ( YouTube , text books , sites , videos)
the textbook must be included as one of the references (attached)
the references should not be less than 5, make sure it’s new and updated ( not older than 5 years )
Required:
Chapter 4: Networks, Collaborative Technology, and the Internet of Things in Information Technology for Management: On-Demand Strategies for Performance, Growth, and Sustainability
Dustdar, S., Nepal, S., & Joshi, J. (2019). Introduction to the Special Section on Advances in Internet-based Collaborative Technologies. ACM Transactions on Internet Technology (TOIT) – Special Section on Advances in Internet-Based Collaborative Technologies, 19(3), 1–4.https://doi.org/10.1145/3361071
Aljeraisy, A., Barati, M., Rana, O., & Perera, C. (2021). Privacy laws and privacy by design schemes for the Internet of Things: A developer’s perspective. ACM Computing Surveys, 54(5), 102.
Wang, C., Kuo, J., Yang, D., & Chen, W. (2020). Collaborative social internet of things in mobile edge networks. IEEE Internet of Things Journal, 7(12), 11473–11491.

Categories
Operating Systems

IT402 Integrated Enterprise Systems Please use your keyboard (Don’t use handwri

IT402
Integrated Enterprise Systems
Please use your keyboard (Don’t use handwriting) also, (Use your own words, don’t copy and paste and avoid plagiarism)
All answered must be typed using Times New Roman (size 12, double-spaced) font.
WORD format only.
Please don’t forget references.
– You will find a Word file attached.

Categories
Operating Systems

IT402 Integrated Enterprise Systems Please use your keyboard (Don’t use handwri

IT402
Integrated Enterprise Systems
Please use your keyboard (Don’t use handwriting) also, (Use your own words, don’t copy and paste and avoid plagiarism)
All answered must be typed using Times New Roman (size 12, double-spaced) font.
WORD format only.
Please don’t forget references.
– You will find a Word file attached.

Categories
Operating Systems

You must submit two separate copies (one Word file and one PDF file) using the A

You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the allocated folder. These files must not be in compressed format.
It is your responsibility to check and make sure that you have uploaded both the correct files.
Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words, hide characters, use different character sets, convert text into image or languages other than English or any kind of manipulation).
Email submission will not be accepted.
You are advised to make your work clear and well-presented. This includes filling your information on the cover page.
You must use this template, failing which will result in zero mark.
You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question.
Late submission will result in ZERO mark.
The work should be your own, copying from students or other resources will result in ZERO mark.
Use Times New Roman font for all your answers.
1- Question one
Pipes and Sockets are examples of Inter-processes Communication, write a short summary explains these examples and compare between them.
2-Question Two
Some issues need to be considered in designing multi-threaded system. One of these issues involves Thread Cancellation. Discuss the two types of target-thread cancellation, support your answer with examples.
3- Question Thre
Imagine that you will design a simple scheduler for multi-processing system. For simplicity, this computing environments consisting of four single-core processers, each of these processors has a local scheduler for managing the execution of arriving jobs. The global scheduler is responsible for scheduling the jobs assigned for all the running processors.
Using creativity and design thinking, propose a design for scheduling algorithm that fairly distribute the jobs and minimize the waiting time between these four processors. Justify the applicability of your algorithm with example.
Hint: Combine two CPU scheduling algorithms that covered in the lecture