Computer Science
[SOLUTION] Challenges of Working with Multiple Worksheets
Business concerns today call for industries to work with multiple worksheets for a variety of reasons. Some of those reasons include budgeting concerns, year-end predictions, multiple departments, and multiple locations. Discuss the challenges of working with multiple worksheets, the importance of pulling data from various worksheets into a single worksheet, and the ways in which an Excel 3-D worksheet could be a solution to a complex challenge.
[SOLUTION] Benefits of Online Catalog
Discuss the benefits of an online product catalog.
[SOLUTION] Bike Rental Application Marketing Potentialing
I am creating a bike rental application where the inventory is provided by the supplier. A similar application can be found: Spinlister – spinlister.comThe market potential or open source significance for this application should be written. Below are the points that should be addressed:Market Potential or Open Source Significance (between 250 and 500 words). Address the following: Market potential, commercial promise, or open source value Technology and market entry barriers competitors and differentiation. Operational and support challenges. Scalability Evidence of user interest (provide references) [Optional: Social and environmental impact] Notes on similar/related products (provide references) Novelty of your solution, innovative characteristics
[SOLUTION] Transaction Processing
Create a PowerPoint presentation which outlines the activities in each phase of Transaction Processing. Discuss the pros and cons of a Transaction processing system.
[SOLUTION] History of Computing
so there should be three header as listen below-Electronic Numerical Integrator and Calculator (ENIAC), the first general-purpose electronic computer-Von Neumann’s Architecture-UNIVAC, the first commercial computer for business and government applicationssummarize eachDescribe events related to the section.Include the years when the events happened.What is the significance of these events in a wider context? please cite the source in a reference page
[SOLUTION] Proposal for Technology Solution
SCENARIOFor this task, you will write a proposal in response to the attached Request for Proposals (RFP) from the Seamus Company. The companys background information is included in the attached Seamus Company Context. The attached RFP Questions from Vendors will help to inform your proposal.Your proposal should demonstrate your research and your technology solution to the problem and show the organization you can meet its needs. Consider what the organization wants (e.g., low cost, high quality, efficiency) and how your proposed technology solution will meet the organizations needs. The body of your proposal should clearly and specifically outline the solution and how it will workREQUIREMENTSCreate a proposal for the Seamus Company by doing the following:A. Create a title page that includes each of the following elements: project name that summarizes the nature of the solution name of the proposer (individual or company) signature block with a space for your signature and the dateB. Create a table of contents.C. Create an abstract that includes each of the following: summary of the problem recommendation of the solution description of how the proposed solution benefits the customer outcomes of the project funding requirements your expertise relevant to the solution you proposeNote: Expertise described here could be real or hypothetical to fit the scenarioD. Create the body of your proposal by doing the following:1. Explain your proposed solution as it relates to the requirements in the attached Request for Proposals (RFP).2. Summarize three published works or case studies that inform the implementation of the proposed solution.3. Describe how the goals, supporting objectives, and deliverables of the proposed project will be accomplished.4. Provide a projected timeline with completion dates of the deliverables for your project.5. Provide a list of resources and their associated costs needed to implement the proposal.6. Explain how you will use an evaluation framework to measure the success and effectiveness of the project once it is completed.E. Justify how the technology solution meets the business needs of the Seamus Company.F. Create a letter of transmittal or cover letter that includes the following: an introduction a body that expands on the reasons for the proposal a conclusionNote: Any supplemental material that would help the company or organization understand the details of the solution should be placed in an additional section titled Appendix.G. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.H. Demonstrate professional communication in the content and presentation of your submission.
[SOLUTION] Operating System Upgrade
It is a phased assignment. I’ve completed phase 1.It is purely theoretical: i.e. How would you accomplish this.Ph1:Project Selection:The first step is to select an enterprise as the target for your operating system upgrade proposal. This project will be used as the basis for each of the assignments throughout the course and should conform to the following guidelines:Nontrivial: The selected enterprise should be large enough to reflect the need to upgrade operating systems for a distributed, virtual environment.Domain Knowledge: You should be familiar enough with the organization to allow focus on its operating system’s needs.Select an enterprise that fits these requirements, and submit your proposal to your instructor before proceeding further with the assignments in the course. Approval should be sought within the first days of the course. Your instructor will tell you how to submit this proposal and what notification will be given for project approval.Assignment:You will be developing a comprehensive operating system strategy report for the assignments in this course. Your first task in this process will be to select an enterprise to use as the basis of yourprojects. You will also create the shell document for the final Key Assignment project deliverable that you will be working on during each unit. As you proceed through each project phase, you will add content to each section of the final document to gradually complete the final project delivery. Appropriate research should be conducted to support the analysis in your report. Assumptions may be made when necessary.Submit the project proposal to your instructor for approval.Create the Operating Systems Design Document shell (89 pages, including blank pages)Use WordTitle PageCourse number and nameProject nameStudent nameDateTable of ContentsUse autogenerated TOC.Separate pageBe sure to update the fields of the TOC so it is up-to-date before submitting your project.Section Headings: Create each heading on a new page with “TBD” as content except for the sections listed New Content below.Project outlineOS Processor andCore (Week 1)Scheduling Algorithms (Week 2)OS Concurrency Mechanism (Week 3)OS Security Risks and Mitigation Strategy (Week 4)Future Considerations Using Emerging Technology (Week 5)New Content (23 pages)Project OutlineProvide a brief description of the enterprise (can by hypothetical) in which the design proposal has the potential of being adopted.Provide a summary of current operating system in use.Material can be taken from the approved proposal that was submitted to the instructor.Be sure that this project is approved by the instructor.OS Processor and CoreDiscuss the benefits for upgrading the operating system utilizing a multi-processor, multi-core configuration to support a distributed or virtual environment.Discuss the steps that will need to take place to upgrade the processor and core.Describe which requirements this will support for the upgrade.Name the document “YourName_CS630_IP1.doc.”Submit the document for grading.I have to complete the other phasesPhase 2:In an operating system, scheduling algorithms are one of the key success factors in running jobs or processes that request the processor imbedded in the operating system.Assignment:Determine which scheduling algorithms (from the ones you researched in the Discussion Board assignment) are best suited for the enterprise you selected.The project deliverables are the following:Update the Operating Systems Design Document title page with the new date and project name.Update the previously completed sections based on instructor feedback.Include new content (23 pages) on scheduling algorithms.Describe whether your environment is a virtual or nonvirtual environment.Based on which environment, describe at least 2 scheduling algorithms you intend to use in that environment.Discuss some of the benefits and challenges that your selection of scheduling algorithms presents.Name the document “Yourname_CS630_IP2.doc.”Submit the document for grading.Phase 3:Describe the proposed mechanism solution for operating system concurrency and how it handles communication and synchronization in the environment that most closely aligns with yourselected project.Assignment:Describe the concurrency mechanism from the ones you researched in the Discussion Board assignment that are best suited for the enterprise and for the distributed environment that your enterprise will function in.The project deliverables are:Update the Operating Systems DesignDocument title page with the new date and project name.Update the previously completed sections based on instructor feedback.New Content ( 23 pages):Operating system concurrency mechanismA description of the enterprises environment (distributed or embedded)Thorough description of the selected concurrency mechanismHow it effectively supports communication and synchronizationName the document “Yourname_CS630_IP3.doc.”Submit the document for grading.Phase4:As is true with all components in any computing environment, security considerations are paramount for operating systems as well. Performing risk assessments and identifying mitigation strategies in advance is a way to ensure that security has been addressed at the operating system level. Virtualized operating systems bring a new set of challenges.AssignmentFor this assignment, you will be compiling your draft of your Key Assignment by incorporating all of the feedback you have received from your instructor and classmates in this weeks Discussion Board. You will also be adding new content related to identifying security risks and potential mitigation strategies.The project deliverables are the following:Update the Operating Systems Design Document title page with the new date and project name.Update the previously completed sections based on instructor feedback.New content (23 pages) regarding security should include the following:A description of the areas of an operating system that should be evaluated for performing a risk assessmentA thorough description of at least 5 risks that pertain to your selected operating system solutionA description of the risk mitigation approach for each riskName the document “Yourname_CS630_IP4.doc.”Submit the document for grading.Please submit your assignment.Final Phase 5:Key AssignmentProject: You will finish your Key Assignment project in this last week, which was to develop an Operating Systems Design Document with your proposal for an enterprise that you selected by looking at emerging technologies and architectures to see how they might support future requirements.In the previous 4 weeks, you were first asked to select a real or fictitious enterprise that plans to upgrade its operating systems for movement to a distributed and virtual environment. Each week, you contributed with proposals for particular components of the operating system that culminated in an overall Key Assignment operating systems design report as follows:Part 1 Tasks (Objectives from Week 14):Week 1: Description of the enterprise operating system’s overall technical challenge and the proposed solution as it relates to the processor and core in a distributed environmentWeek 2: Description of the proposed solutions as they relate to scheduling algorithmsWeek 3: Description of the proposed solution as it relates to an operating system concurrency mechanismWeek 4: Identification of security risks and mitigation strategies to deal with the risksPart 2 Tasks (Objectives for Week 5):In the final week, you are given the assignment to explore emerging computing technology and computer system architectures to assist you in making recommendations on how to extend present operating system functions to support new requirements. This is your final assignment, which is a proposal based on what you perceive are the present operating system challenges as well as near future challenges for the enterprise you selected.The project deliverables are the following:Update the Operating Systems Design Document title page with the new date and project name.Update the previously completed sections based on instructor and peer review feedback.Add the following new content:Future considerations using emerging technologyIdentify and describe at least 3 emerging technologies or architectures that have the potential for supporting future requirements.Discuss the specific current or future enterprise strategic requirements that could benefit from the emerging technologiesDiscuss the potential benefits for adopting these emerging technologies.Name the document “YourName_CS630_IP5.doc.”Submit the document for grading.
[SOLUTION] Cybersecurity and Risk Management
Summary of Work: Research user activities from the purview of daily system connections made to ICT platform(s) Research differences in internal and external connections and types of use Research ICT user classifications and roles Research the different types of ICT platforms and ecosystemsDeliverables:1. Provide a synopsis of the current state of affairs in ICT platforms and ecosystems in so far as security is concerned (5 marks)2. Discuss the different types of users in an ICT ecosystem. Try to provide some classifications used in the industry? (5 marks)3. Discuss differences between internal and external access to ICT assets, describing each of these two types (5 marks)4. Create a diagram of an ICT ecosystem that illustrates the main assets in such a composition. Feel free to use your favorite illustration tool and insert it into your document as an image (10 marks)
[SOLUTION] Class Design
Part I Discuss the steps of class design and the importance of each step to the overall design. Part II Discuss the application of the GRASP principles in Class Design discussed in Larman (2001) and how they supplement the steps of class design.
[SOLUTION] ACME Inc. Lay Out
Assignment Instructions: ACME, Inc. is growing like crazy! Now, we need to put into place a more secure and faster connection between our headquarters and our satellite offices. The two locations are approximately one mile apart and are in a heavily populated area. You can make assumptions as to what technologies, cabling, etc. are available. In a Word document, you need to lay out, how you would connect these two facilities together using what you feel to be the best solution. Include a budget, figures are going to be a range, which is understood What technologies, hardware, software, cabling, etc. are you using to make the connection Why is your choice the best choice (justify!)?
Use Promo Code: FIRST15