Primary Task Response Within the Discussion Board area, write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas. How do you manage concurrency in a distributed and embedded computing environment? Based on the concurrency mechanism you select, how can you effectively handle communication and synchronization at the operating system level? Investigate the library and Internet for information about distributed and embedded computing environments and concurrency mechanisms. Select either a distributed or embedded computing environment (such as cluster computing, cloud computing, or grid computing), and discuss the challenges of supporting communications and synchronization in the selected environment. Research at least 2 concurrency mechanisms, and describe how each mechanism handles communications and synchronization in the selected environment. week 3 mini  project Describe the proposed mechanism solution for operating system concurrency and how it handles communication and synchronization in the environment that most closely aligns with your selected project. Assignment: Describe the concurrency mechanism from the ones you researched in the Discussion Board assignment that are best suited for the enterprise and for the distributed environment that your enterprise will function in. The project deliverables are: Update the Operating Systems Design Document title page with the new date and project name. Update the previously completed sections based on instructor feedback. New Content ( 2–3 pages): Operating system concurrency mechanism A description of the enterprise’s environment (distributed or embedded) Thorough description of the selected concurrency mechanism How it effectively supports communication and synchronization Name the document “Yourname_CS630_IP3.doc.” Submit the document for grading.

Looking for solution of this Assignment?

WHY CHOOSE US?

We deliver quality original papers

Our experts write quality original papers using academic databases.We dont use AI in our work. We refund your money if AI is detected  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity.We have ZERO TOLERANCE TO USE OF AI

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay
 

Please bid only if you are agree at my time and budget The homework should be written in C language ” will not accept any other languages” there are 3 C files you will use I already upload it ALL instructions MUST be follow The word document contains all the instructions that you have to follow it

Looking for solution of this Assignment?

WHY CHOOSE US?

We deliver quality original papers

Our experts write quality original papers using academic databases.We dont use AI in our work. We refund your money if AI is detected  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity.We have ZERO TOLERANCE TO USE OF AI

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay
 

Questions 1. What is the one thing that a virus, a worm, spyware, and malicious code have in common? What are the differences among these three threats: a virus, a worm, and spyware? 2. How often should you update your antivirus protection? 3. Why is it a best practice to have and to carry an antivirus boot-up disk or CD?  4. Is the manual quick scan good enough protection for a system? 5. What best practices for the workstation domain that can mitigate the risks and threats caused by malicious code? 6. If you have an up-to-date antivirus program, do you still need a malware detection program like Windows Defender? 7. What are some of the most common symptoms of malware? 8. What risk or threat do malware applications, such as spyware, pose to the workstation domain?

Looking for solution of this Assignment?

WHY CHOOSE US?

We deliver quality original papers

Our experts write quality original papers using academic databases.We dont use AI in our work. We refund your money if AI is detected  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity.We have ZERO TOLERANCE TO USE OF AI

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay
 

Prompt For this assignment, you’re going to continue building on the website we discussed in Week 1. If you recall, during Week 1 we spent some time talking about a website for the Downtown Restaurant. This week, you will create the first two pages, home.html and contact.html.  Now, you have been asked to add a level of personalization to your website to improve the user experience for your customers. To do this, management has asked you to greet the customers by their first and last name and also display the current weather where they live. You will do this by creating a cookie that stores the customer’s name and location, and you will use that information to customize the contact page. When they first login, the users will be greeted by the information stored in the cookie. Be sure when you add these elements they flow well with your established UI (User Interface). Virtual Session_WK2_PRG250pptx.PPTX Assignment Instructions: Add a cookie to your website that contains the customer’s name and location. Use the sessionStorage property to display the current date on the page along with the day of the week. Use the cookie to display the customer’s name on the contact page. Use the cookie to display the weather where the customer lives. Use comments within the home page of your website to indicate the changes made. Include the name of the cookie you are using and the information you are storing. Provide at least one image on one of your pages. Provide at least one URL on one of your pages. Provide 3-5 meta tags between the two pages. Submission Requirements: Submit the html files that you modified and include a MS Word document with the code used to create and retrieve the information from your cookie. Submit all of the HTML, CSS, JavaScript, and image files as a compressed (.zip) file. Resources and References HTML5 web storage – What is web storage – Tutorial Republic web site (n.d.). Retrieved from https://www.tutorialrepublic.com/html-tutorial/html5-web-storage.php (Links to an external site.) HTML5 web storage – SP Lessons web site (n.d.). Retrieved from https://www.splessons.com/lesson/html5-web-storage/ (Links to an external site.) JavaScript lesson 19 client side web storage – DoingITeasyChannel (n.d.). Retrieved from https://youtu.be/gohSZNZ_BLU Window sessionStorage property – definition and usage – W3CSchools web site (n.d.). Retrieved from https://www.w3schools.com/jsref/prop_win_sessionstorage.asp

Looking for solution of this Assignment?

WHY CHOOSE US?

We deliver quality original papers

Our experts write quality original papers using academic databases.We dont use AI in our work. We refund your money if AI is detected  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity.We have ZERO TOLERANCE TO USE OF AI

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay
 

This quiz is based on chapter 6 in the text. Answer each question in a paragraph that contains at least five sentences: 1. Should society help workers dislocated when technology, like the Internet, elimlnates their jobs in a process called ‘ Creative Destruction ‘? 2. are we working more and earning less? 3. Would you want a telecommuting job? Why or why not? 4. Does the gig economy appeal to you? Why or why not? 5. How is an employee differentiated from a contracter under US law? 6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services? 7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs? 8. How much monitoring of employee activities at work is appropriate? 9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time? 10. What is the relationship betwee BYOD (bring your own device) and shadow IT . 11. What is cyberloafing?

Looking for solution of this Assignment?

WHY CHOOSE US?

We deliver quality original papers

Our experts write quality original papers using academic databases.We dont use AI in our work. We refund your money if AI is detected  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity.We have ZERO TOLERANCE TO USE OF AI

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay
 

ONE:Now that you have read the chapter about the OSI model, how would you change it? Are there inefficiencies or redundancies in the model? TWO: Learning Objectives In this lab, you’ll examine the layers of the OSI seven-layer model and the TCP/IP model. When you’ve completed this lab you will be able to ? Explain why layered models are used to describe data communication. ? Identify each of the seven layers of the OSI model. Lab Materials and Setup The materials you need for this lab are ? The Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks textbook ? Pencil and paper Instructions Work through the following tasks to investigate the details of network data delivery using the OSI seven-layer model. Task 1: Answer the following questions. 1. How does the concept of layers describe flow of information or communications? 2. How are layers used to describe data communications? 3. What is a mnemonic used for remembering the OSI model? 4. What is the OSI model and what are its benefits? 5. What are some advantages of the OSI model? 6. What is a PDU? 7. Explain data encapsulation. THREE:Use the following worksheet to complete the Hardware Lab . Make sure you also download the zip file with the images you will need for the lab. Attach your completed Hardware Lab worksheet to this drop box and submit it. Your submitted file can be in any of these formats: .doc, .docx, .rtf, or .pdf.

Looking for solution of this Assignment?

WHY CHOOSE US?

We deliver quality original papers

Our experts write quality original papers using academic databases.We dont use AI in our work. We refund your money if AI is detected  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity.We have ZERO TOLERANCE TO USE OF AI

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay
 

Check the attachment Part 1: Analyze the following table (see the Word document called “CS352 – IP3”) and reorganize the table into Boyce-Codd Normal Form, at each step describing what is needed to move to the next Normal Form and why each step meets the Normal Form requirements. Show unnormalized table given and progression through the normal forms up to Boyce Codd in logical data models. Include explanation of how each normal form is met as you progress through the process of breaking down this unnormalized table to tables meeting Boyce Codd normal form. Part 2: In addition, transform your data model (your EERD created in phase 2 IP) into a logical model, to third normal form. Describe why each table is in third Normal Form. In your logical data model identify the primary keys in each table as bolded and underlined and each foreign key as italicized and underlined. Submission for phase 3 IP includes: Logical Data Model for the supplied table(Part 1) with a description of how it moved through UNF to 1NF to 2NF to 3NF and Boyce Codd. Logical Data Model for Part 2 with a description of how each table is in third normal form.

Looking for solution of this Assignment?

WHY CHOOSE US?

We deliver quality original papers

Our experts write quality original papers using academic databases.We dont use AI in our work. We refund your money if AI is detected  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity.We have ZERO TOLERANCE TO USE OF AI

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay
 

Short Newsletter Item: The Dangers of Biting on a Phish Discussion Topic Write a short “newsletter” article (3 to 5 paragraphs) for the non-technical managers and employees at Sifers-Grayson to explain the following: (a) What is Phishing? (Focus on phishing emails and targeted attacks that include spear phishing and whaling.) (b) What “bad things” can happen when a successful phishing attack gives outsiders access to company networks and computers? (c) How can employees avoid “biting” on a “phish?” (d) How should employees report phishing attacks? Why is immediate reporting critical to stopping the attackers? Since this article is for a newsletter, you may use an informal but professional tone (address the reader as “you,” use “we” and “our” to refer to the organization’s perspective). The focus of the article should be upon changing how people think about and respond to computer security incidents. Humor is good but should not lessen the severity of the problem. Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your article.

Looking for solution of this Assignment?

WHY CHOOSE US?

We deliver quality original papers

Our experts write quality original papers using academic databases.We dont use AI in our work. We refund your money if AI is detected  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity.We have ZERO TOLERANCE TO USE OF AI

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay
 

Project Cost Management Harold Johnson is worried about the cost, so he has asked you to review the existing cost estimate to get a solid cost baseline to evaluate performance. Recall that your budget goal is $500,000 for the six-month project. Also remember from previous projects that even though Code Corp. is a very reliable company, you need to work closely with them to ensure all requirements are being integrated into the software and that the project is kept on track. You need to work with Code Corp to define and test mobile devices to ensure the application will be compatible. What you need to do: Summarize your responses to the following tasks in one word document or PDF and upload it to Canvas. Parts that are prepared with other software applications such Excel or MS Project should be copied and pasted into the word document (take a screen capture or use a snipping tool as necessary). Tasks Prepare and print a one-page cost estimate for the project, similar to the one provided in Figure 7-2 in Chapter 7. Use the WBS you created earlier, modified, if needed, to make sure you are including outsourced services and labor costs. Be sure to document assumptions you make in preparing the cost estimate. Assume a labor rate of $60/hour for the project manager and $50/hour for other project team members. Assume twice those numbers for outsourced labor. Using the cost estimate you created above, prepare a cost baseline by allocating the costs by WBS for each month of the project. Assume you have completed three months of the project. The BAC was $500,000 for this six-month project. Also assume the following: PV= $250,000 EV= $230,000 AC= $300,000 Using this information, answers the following questions: a – What is the cost variance, schedule variance, cost performance index (CPI), and schedule performance index (SPI) for the project? b – Use the CPI to calculate the estimate at completion (EAC) for this project. Use the SPI to estimate how long it will take to finish this project. Sketch an earned value chart using the above information, including the EAC point. See Figure 7-5 as a guide. Write a paragraph explaining what this chart shows. c – How is the project doing? Is it ahead of schedule or behind schedule? Is it under budget or over budget? Is it way off track or not? Should you alert your senior management and ask for assistance? Should you talk to your sponsor before the meeting to discuss this data?

Looking for solution of this Assignment?

WHY CHOOSE US?

We deliver quality original papers

Our experts write quality original papers using academic databases.We dont use AI in our work. We refund your money if AI is detected  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity.We have ZERO TOLERANCE TO USE OF AI

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay
 

The objective of this is to look into the importance of security administration in an organization. Also, look at the components of the security policies as well as how to deploy controls that ensure compliances with the organizational security policies. After reading Chapter 10, your task is to discuss DQ1 and DQ2 respectively. DQ1. Discuss the best practices in managing changes to windows systems and applications, and relate it to Deming Cycle. DQ2. Discuss the security administration’s task and state reasons why is very important to an organization. Note: All discussions must adhere to APA 6th edition format.Please, post atleast 250 words for the two discussions. Please, don’t forget to create an in-text citation before referencing any article.

Looking for solution of this Assignment?

WHY CHOOSE US?

We deliver quality original papers

Our experts write quality original papers using academic databases.We dont use AI in our work. We refund your money if AI is detected  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity.We have ZERO TOLERANCE TO USE OF AI

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay