In: Computer Science
Review the following files associated with block IO:
block/genhd.c
fs/partitions/check.c
block/ll_rw_blk.c
include/linux/bio.h
include/linux/blkdev.h
include/linux/genhd.h
block/elevator.c
Discuss what you found in these files. What is the purpose of the code in each file? How do they fit together to block IO?
these are the files that are provided to me, everything here is what i can see as far as the question goes.
block/genhd.c
fs/partitions/check.c
block/ll_rw_blk.c
include/linux/bio.h
include/linux/blkdev.h
include/linux/genhd.h
block/elevator.c
In: Computer Science
Careers in ICT are constantly changing as technology changes offer new innovations and opportunities. There are new jobs being created in the areas of cybersecurity, big data, cloud computing and more. Select a new area of ICT which you feel could influence and direct your career opportunities. Write about 200 words on this stating how you feel that your career could be directed to new opportunities in this field.
note: please solve it as soon as possible, no time for me.
In: Computer Science
Question 1: Consider various aspects of cloud based solutions and investigate the strengths and weaknesses of cloud based solutions, taking into consideration the environment in which the solution will be deployed for the proposed system.
Question 2: Compare and contrast Unified Process (UP) and Scrum. Then recommend either Unified Process or Scrum you will use for the proposed system and briefly describe why.
Background Information:
Jack Greig and Daniel Cox have several years of experience of running an auto-parts business as a supplier in a major city of Australia. The current warehouse management system is not able to handle highly dynamic procedures that can help them move and store inventory at peak efficiency and lowest cost. Jack and Daniel have decided to develop a new Auto-Parts Warehouse Management System where its functionality can be applied throughout all core warehouse processes, transforming the warehouse into a competitive advantage. You are the business system analyst assigned to develop this system.
In your meeting with Jack and Daniel, they provided significant details regarding the basic operations of the system. They expect the system will perform the various functions such as receiving all types of orders, inventory control, order processing, pick up and process orders, order load management, outbound documentation, system alerts, packing orders, and crystal reports.
Please note, you must consider the number of wireless communication devices that configure with the proposed system and enables the warehouse management to run the distribution centre using real-time operations. These extensive system functions will improve warehouse operations by minimising costs and increasing productivity.
Note: Answers should be close to 4 pages.
Criteria:
A review of the strengths and weaknesses of cloud-based solutions, taking into consideration the environment in which the solution will be deployed for the proposed system. |
Clearly identified strengths and weaknesses of cloud solutions. As well as demonstrate in-depth understanding of the environment that the solution would be used in. |
Compare and contrast Unified Process (UP) and Scrum. Then recommend either Unified Process or Scrum you will use for the proposed system and briefly describe why. |
Response clearly state the differences between Unified Process and Scrum methodologies with strong justification about which methodology is suitable for the proposed system. |
In: Computer Science
Discuss two of your own life or work experiences that you feel have enabled you to develop skills which you will be able to transfer to your professional career. You should write about ½ a page on this. Select the responses of 2 of your colleagues to this question, and discuss with each how you think that their life and other work experiences can contribute to their professional skills development. Compare their responses with your own.
note: please solve it as soon as possible, no time for me.
In: Computer Science
The programming language is Java. Write the code you would use to fill the variable cubed with the value stored in x to the third power.
In: Computer Science
What software process models are the best and why ?
and I want 3 well-reasoned statements for not choosing
the models Also, write a short critique of the each process.
There are 3 general process model:
-The waterfall model
-Incremental development
-Integration and configuration
In: Computer Science
Show the machine code corresponding to the Y86 version of the following code. Assume that the code starts at location 0x050. For each statement, list address: code bytes.
int sumInts ( long int n) { /* Add the integers from 1..n. */ long int i; long int sum = 0; for ( i = 1; i <= n; i++ ) { sum += i; } return sum; }
In: Computer Science
Please Answer!!!
In: Computer Science
**Text file**
Kmart, 1450 Summit Avenue, Oconomowoc WI
Sears, 2050 Southgate Rd, Colorado Spgs CO
-----------------------------------------------------------------
Write a function, void getName(char strName[], const char strLine[]), that accepts a string (strLine) encoded in the same format as a line of code in the example file above, and returns the name in strName.
Write a function, void getAddress(char strAddress[], const char strLine[]), that accepts a string (strLine) encoded in the same format as a line of code in the example file above, and returns the address in strAddress.
Write a function, void getCity(char strCity[], const char strLine[]), that accepts a string (strLine) encoded in the same format as a line of code in the example file above, and returns the city in strCity.
Write a function, void getState(char strState[], const char strLine[]), that accepts a string (strLine) encoded in the same format as a line of code in the example file above, and returns the 2-character state abbreviation in strState.
*Please no hard-coded
* C language
In: Computer Science
Create ER diagram for the following:
A database has been designed for a Human Resources for a school in the UK. The database includes records of the teachers and their holidays. The Dean of this school has the power to approve those holidays for all teachers in the school.
For each teacher, Human Resources keeps track of the Teacher's ID, name, Cell phone number(s), total number of holidays for each year, number of unemployed holiday days remaining in the present year, age, date of the employment, Department name.
Some teachers may work as supervisors. For those teachers, as well as the attributes mentioned above, we also keep track of the date when they are supervisors, in addition to the total time they spend to be supervisor and their categorical level (Category 1, Category 2, Category 3, Category 4 or Category 5).
The Human Resources Department in the school keeps track every holiday has been taken by each teacher. For each holiday, The Human Resources keep track, Unique holiday ID, the number of days taken (spent) in this holiday, the start day and end day of a holiday. Sometimes (in a few cases), an alternative phone number may be documented for a holiday.
The Human Resources Department in the school keeps track every reward has been taken by each teacher. For each reward, The Human Resources keep track, Unique Reward ID, the number of rewards, Date of a reward, teacher name and the amount of the reward.
Each holiday is documented for only one teacher. A teacher can take many holidays per year. Each holiday has been approved by many supervisors and each supervisor has the power to approve many holidays for many teachers. Each supervisor has the power to approve the holidays for many teachers and each teacher may have many supervisors and may not. Every supervisor has the power to give many rewards to each teacher, but does not have to reward any. Every teacher can get many rewards every year.
In: Computer Science
There is a technique called “fabrication” constitutes one dimension of social engineering attack. Think of three (successful or unsuccessful) social engineering attack cases that you know from media or from your private life. Describe the cases in narrative form (what happened and how the course of each attack unfolded) and analyze the fabricating elements of the cases. Examine, in what ways the attackers sought to fool the victims. Moreover, in what ways they sought to build confidence and credibility (i.e. make the situation seem valid). What kind of frames was constituted?
In: Computer Science
explain the concept of Corporate Information Security. What is it? Why is it important?
In: Computer Science
C++ program to implement Matrix Class with following requirements,
Classes :- matrix.cpp and main.cpp (to test it) with following requirements: -
Please use Vectors of double.
In: Computer Science
4. Write a program to compute the sum of digits of an integer. For example, given the integer 35931, your program should output 21. (21 is the sum 3 + 5 + 9 + 3 + 1)
PYTHON
In: Computer Science