Prior to beginning work on this assignment, read the following sections in your textbook: 9.1 to 9.6 and 9.9

Prior to beginning work on this assignment, read the following sections in your textbook: 9.1 to 9.6 and 9.9 in Chapter 9: Mass-Storage Structure. Finally, read the Operating System – Scheduling Algorithms tutorial (https://www.tutorialspoint.com/operating_system/os_process_scheduling_algorithms.htm)..

Part 1:
To complete this assignment, consider the following scenario:

A disk drive has 300 cylinders, numbered 0 to 299. The drive is currently serving a request at cylinder 51, and the previous request was at cylinder 56. The pending requests are received in the following order: 72, 56, 103, 111, 17, 189, 236, 198, and 88.
Describe how the disk arm moves to satisfy all the pending requests for each of the following disk-scheduling algorithms. (Perhaps you create a diagram similar to the diagrams in Section 9.4 to support your explanation.)

FCFS
SSTF
SCAN
Calculate the total distance (in cylinders) that the disk arm moves for each of the above disk-scheduling algorithms. Compare the algorithms and explain which algorithm is the most efficient (the shortest distance) for this scenario. Write a minimum of 250 words.

Part 2:

Compare the algorithms and determine which is the fairest for the next process in the queue. Explain why this algorithm will always be the fairest disk-scheduling algorithm.

Describe an example of circumstances where fairness would be an important goal. Describe a scenario where it would be important that the operating system be unfair. Write a minimum of 250 words.

The Scheduling Models paper

Must be a minimum of two double-spaced pages (500 words) in length (not including title, reference page, and diagrams) and formatted according to APA style as outlined in the Writing CenterLinks to an external site..
Must include a separate title page with the following:
Title of paper
Student’s name
Course name and number
Instructor’s name
Date submitted

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Corporate Proposal III: Windows and Linux Integration

500-750 words

1. Explain how Windows and Linux can work together in diverse environments.
2. Recommend a configuration for your corporation that best leverages the features of each operating system. Explain your recommendation.

The recommendation includes server, the operating system for server and workstations, what solutions bridge both linux and windows together

I have added links below for references if you’d like to use them, otherwise you can use your own.

https://www.computerworld.com/article/2754450/how-to-get-windows-and-linux-to-cooperate-on-the-network.html

https://technologyblog.rsmus.com/it-infrastructure/incorporating-linux-into-a-windows-network/

***MUST BE ORIGINAL WORK, WILL BE SUBMITTED FOR PLAGIARISM CHECK***

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Week 2: Homework – reaction to Video Lectures

Homework is due by Sunday at 11:59pm and should be submitted to the Canvas assignments area as specified below.

Turn your homework in on time – this represents your asynchronous attendance in the class.
Check the Canvas grade-book regularly. Homework turned in by Sunday night will be graded by Monday night each week. There is a 50% per week deduction for late homework (i.e. after 2 weeks late the maximum score on homework is 0 !!). Homework turned in incorrectly and resubmitted late will be graded as late.

Gradebook corrections will only be made up until 1 week after the assigned date.

Videos Lectures’ to watch for homework and threaded discussion at Canvas. The homework assignment is to choose and respond to 9 videos from the following. For each video that you select, state the name of the video and write a few sentences (4 or more) summarizing your reactions to the content. This is not to be a summary, but rather your reaction to the material. Additionally, do not include direct quotes from the videos – all writing should represent your own work. Also, do not turn in a bibliography referencing the videos.

Note that I am concentrating on content rather than grammar in your summary. Address as many specific points as possible and refer to material in every video. When submitting the assignment, upload it as an attachment in doc, docx, or txt format as a single file with all summaries included (no .odt, Mac .pages, or other file formats are accepted. Additionally, you cannot use OpenOffice to create the .doc, .docx, or .txt file formats. If you do not have Microsoft Word, use notepad on a PC or use TextEdit on a Mac.) Once your assignment is submitted to Canvas, it is also submitted automatically to Turnitin.com to check for plagiarism, therefore do not copy – not even from your own work turned in to other classes – even previous attempts at CS 3! Plagiarism will result in an F grade for the class.

YOU ARE WRITING ABOUT HOW YOU FEEL ABOUT EACH VIDEO, NOT SUMMARIZE. 4 SENTENCES IS FINE, TRY TO FIT AS MUCH AS YOU CAN IN 2 PAGES.

Choose 9 videos from any of the following:

https://www.ted.com/talks/david_lee_why_jobs_of_the_future_won_t_feel_like_work/up-next#t-22403 (Links to an external site.)

https://www.ted.com/talks/sebastian_thrun_and_chris_anderson_what_ai_is_and_isn_t/up-next (Links to an external site.)

https://www.ted.com/talks/tom_griffiths_3_ways_to_make_better_decisions_by_thinking_like_a_computer/up-next (Links to an external site.)

https://www.ted.com/talks/danielle_feinberg_the_magic_ingredient_that_brings_pixar_movies_to_life/up-next (Links to an external site.)

https://www.ted.com/talks/david_baker_5_challenges_we_could_solve_by_designing_new_proteins/up-next#t-587068 (Links to an external site.)

https://www.ted.com/talks/michael_rubinstein_see_invisible_motion_hear_silent_sounds/up-next#t-279721 (Links to an external site.)

https://www.ted.com/talks/nick_bostrom_what_happens_when_our_computers_get_smarter_than_we_are (Links to an external site.)

https://www.ted.com/talks/martin_ford_how_we_ll_earn_money_in_a_future_without_jobs (Links to an external site.)

https://www.ted.com/talks/robin_hanson_what_would_happen_if_we_upload_our_brains_to_computers (Links to an external site.)

https://www.ted.com/talks/noriko_arai_can_a_robot_pass_a_university_entrance_exam (Links to an external site.)

http://www.ted.com/index.php/talks/kwabena_boahen_on_a_computer_that_works_like_the_brain.html (Links to an external site.)

http://www.ted.com/talks/tristan_harris_how_better_tech_could_protect_us_from_distraction (Links to an external site.)

http://www.ted.com/talks/chris_urmson_how_a_driverless_car_sees_the_road (Links to an external site.)

http://www.ted.com/talks/margaret_gould_stewart_how_giant_websites_design_for_you_and_a_billion_others_too (Links to an external site.)

http://www.ted.com/index.php/talks/nicholas_negroponte_takes_olpc_to_colombia.html (Links to an external site.)

https://www.ted.com/talks/danny_hillis_the_internet_could_crash_we_need_a_plan_b (Links to an external site.)

https://www.ted.com/talks/mitch_resnick_let_s_teach_kids_to_code (Links to an external site.)

What’s wrong with your pa$$w0rd? (Links to an external site.)
http://www.ted.com/talks/ray_kurzweil_announces_singularity_university.html (Links to an external site.)

http://www.ted.com/talks/evan_williams_on_listening_to_twitter_users.html (Links to an external site.)
http://www.ted.com/talks/evgeny_morozov_is_the_internet_what_orwell_feared.html (Links to an external site.)

https://www.ted.com/talks/conrad_wolfram_teaching_kids_real_math_with_computers (Links to an external site.)

https://www.ted.com/talks/david_mccandless_the_beauty_of_data_visualization (Links to an external site.)

https://www.ted.com/talks/peter_molyneux_demos_milo_the_virtual_boy (Links to an external site.)

https://www.ted.com/talks/christopher_m00t_poole_the_case_for_anonymity_online

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Writers choice Essay

assignment this week is to put together an argument either for or against the concept of a surveillance state. Your paper can take on either side, but your grade is going to be based on the persuasiveness of your argument. Can you defend your choice? Can you showcase why your choice is the right choice? Can you defend the ethics of your choice? Can you defend the legality of your choice? These are just a few of the questions you will want to answer. Your paper should be between 4-6 pages in length of content, i.e. excluding cover page and references.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Writers choice Essay

Each student will pick a controversial surveillance incident from the news. Once you pick this surveillance incident, you will lay out for your fellow students an argument from both sides of the incident, i.e. support for the surveillance and a dissent from for the surveillance. In addition, when presenting your dissent, make sure you include recommendations on how the issue could have been resolved.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Module 5 – Discussion

1. Prepare a substantive response, usually about a 300 to 500-word response and Read this prompt and do your research.
1. Pretend that you are planning a trip to three foreign countries next month. Consult your wireless carrier to determine if your mobile phone would work properly in those countries. Identify costs and other alternatives to have your phone work properly.

2. Write a response to report your findings. Discuss if you gain any knowledge from conducting this research.

2. Remember to apply as many concepts and terminologies from the chapter to illustrate your understanding of this week’s materials.

NOTE: To earn the maximum points for the graded DQ response, please make sure that your responses use key concepts from this week’s assigned chapters of this module (and preceding chapters if relevant).
Besides the weekly graded DQ response, each student must make three or more substantive comments on at least two different individuals’ posts

3. Now that you have read this chapter, write a short discussion to let me know:

What topics were easy to understand?
What topics were hard to understand? What would make it easier for you?
Other feedback about what to keep, remove, modify, or add?
Add one study question or discussion question for this chapter and explain what you expect as the answer.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Introduction The question becomes less if you will have an incident and more when you will have one. Ignoring

Introduction
The question becomes less if you will have an incident and more when you will have one. Ignoring this fact will place you and your organization in a precarious position. Proper planning for an incident will indicate to your customers, stakeholders, and key leadership that you take security seriously and will instill confidence in their business systems. Should an incident occur, your preparation will allow you to quickly identify the scope of damage because you will have identified the data that requires special handling and protection, including PII, PHI, intellectual property, corporate confidential information, and financial information about your organization.

However, preparation isn’t just an effort for your security team.

Note: Security Team

Students may find it incredibly helpful to start by defining and creating a graphical representation of the Cybersecurity Incident Response Team (CSIRT). Definition of the CSIRT should be based upon your understanding of the organization. You may need to conduct some research for illustrative examples.

Starting the exercise with a defined understanding of the CSIRT will result in more a focused, better defined incident response.

It means that you assist organizational leadership in communicating the goals of the security policy and the importance of the employees’ roles in supporting it. Aside from the benefit of having a smoother recovery, having a comprehensive incident-handling process regarding special data may protect you from civil or criminal procedures should your organization be brought to court for failing to protect sensitive data. Once you’ve gotten buy-in from organization leadership for your incident response plan, you need to continue to refine and improve it as threats evolve.

Incident Scenario
For this assignment, you will create an incident response runbook (aka. playbook or “use case”), which is a written guide for identifying, containing, eradicating, and recovering from cybersecurity incidents. The document is usually the output of the preparation phase of the Incident Response process and is a part of your overall Incident Response Plan.

An end-user receives an email from the help desk stating that there was irregular activity associated with their email account and they will not be able to send or receive emails until it is resolved. Several end users click on the link in the email and immediately items on his/her workstation begin to act strangely. Suddenly, none of the files on the workstation can be opened and now end in “.crypt”. A message pops up on the end user’s screen demanding payment of 1.84 Bitcoins as a ransom for the organization’s now encrypted data. As of May 2021, Bitcoin is Approximately $54,301/Bitcoin, making the ransom in this scenario just shy of $100,000.

Soon after that, other employees begin to report they have a strange note popping up on their screen as well. Before long, all computers – workstations and servers – have the popup on their screens and are unable to function. This is where the Incident Response process begins.

Create Your Runbook
There are several Runbooks for several types of threats (Malware, DDoS, Botnet, Social Engineering). Make sure the Runbook is the correct Runbook for the scenario. An Incident Response Playbook (Runbook) is designed to provide a step-by-step walk-through for most probable and impactful cyber threats to your organization. The Playbook will ensure that certain steps of the Incident Response Plan are followed appropriately and serve as a reminder if certain steps in the IRP are not in place.

Your Runbook should consist of:

An overview section of the identified threat details information about the threat.

Preparation steps or triage processes needed to prevent or recover from the threat
Contact information of the in-house IR team
Communication tree
Escalation

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Please keep the Concept map and the word doc separate, the textbook source is noted at the bottom. You

Please keep the Concept map and the word doc separate, the textbook source is noted at the bottom.

You will be including revised content from this interactive assignment in your OS Theory Concept Map final assignment. Prior to completing work on this interactive assignment, you may wish to review the instructions included for the OS Theory Concept Map final assignment in Week 5 to see how it fits into your overall final project.

To complete this week’s interactive assignment, you will continue building the OS Theory Concept Map by addressing the following topics concerning controlling and coordinating computer memory:

Outline the objectives and functions of memory management in operating systems. (Resource: Leverage Figures 7.1, 7.2, 7.3, and 7.4 from the textbook.)
Compare and contrast the physical address space with the virtual address space as they relate to different memory mapping techniques in operating systems.
Logically arrange the essential concepts about memory management into a hierarchy of nodes that branch from the main idea. Include cross-links where necessary to show relationships in different sections of the concept map. Use connecting nodes to accurately describe each relationship between topics that connect. Section 3 must have at least two nodes and at least four connecting nodes.

After completing Section 3 of the concept map, post a link to your OS Theory Concept Map in the discussion forum for your peers to review.

Textbook:
Silberschatz, A., Galvin, P. B.,

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

For your initial post, describe a scenario where several systems are connected to a single printer through a network.

For your initial post, describe a scenario where several systems are connected to a single printer through a network. Explain the scheduling criteria conflicts that would occur in the scenario that you described. Indicate factors that would impede or improve overall utilization and performance. Your initial post must be a minimum of 250 words.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Part 1. Pick a phrase that relates to your graduate project or to any area of interest in the

Part 1. Pick a phrase that relates to your graduate project or to any area of interest in the information or computer technology.
The project is The Future of IoT in Healthcare.

Choose two web search engines such as Google and another search engine. Enter your phrase, and compare the “top 10” pages returned by each engine. Try putting double quotes around the phrase, and compare the results to those produced by the first search. Explore the advanced search features of the two search engines.

Part 2. Conduct a search on the phrase ‘dubious search results, and then describe two of these articles.

Part 3. Conduct a search to see if there exists a better academic research search engine. Perform your first search (above) using this engine.

Part 4. Conduct an Internet search on the technology, Alexa. This summary should include a descriiption of the alternate technology, its current status (i.e., is it available now or just in the experimental stages), and how it might benefit you in your research.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount