Questions
how a logical address is translated to a physical address by hard disk controller

how a logical address is translated to a physical address by hard disk controller

In: Computer Science

Review the following files associated with block IO: block/genhd.c fs/partitions/check.c block/ll_rw_blk.c include/linux/bio.h include/linux/blkdev.h include/linux/genhd.h block/elevator.c Discuss...

Review the following files associated with block IO:

block/genhd.c

fs/partitions/check.c

block/ll_rw_blk.c

include/linux/bio.h

include/linux/blkdev.h

include/linux/genhd.h

block/elevator.c

Discuss what you found in these files. What is the purpose of the code in each file? How do they fit together to block IO?

these are the files that are provided to me, everything here is what i can see as far as the question goes.

block/genhd.c

fs/partitions/check.c

block/ll_rw_blk.c

include/linux/bio.h

include/linux/blkdev.h

include/linux/genhd.h

block/elevator.c

In: Computer Science

Careers in ICT are constantly changing as technology changes offer new innovations and opportunities. There are...

Careers in ICT are constantly changing as technology changes offer new innovations and opportunities. There are new jobs being created in the areas of cybersecurity, big data, cloud computing and more. Select a new area of ICT which you feel could influence and direct your career opportunities. Write about 200 words on this stating how you feel that your career could be directed to new opportunities in this field.

note: please solve it as soon as possible, no time for me.

In: Computer Science

Question 1: Consider various aspects of cloud based solutions and investigate the strengths and weaknesses of...

Question 1: Consider various aspects of cloud based solutions and investigate the strengths and weaknesses of cloud based solutions, taking into consideration the environment in which the solution will be deployed for the proposed system.

Question 2: Compare and contrast Unified Process (UP) and Scrum. Then recommend either Unified Process or Scrum you will use for the proposed system and briefly describe why.

Background Information:

Jack Greig and Daniel Cox have several years of experience of running an auto-parts business as a supplier in a major city of Australia. The current warehouse management system is not able to handle highly dynamic procedures that can help them move and store inventory at peak efficiency and lowest cost. Jack and Daniel have decided to develop a new Auto-Parts Warehouse Management System where its functionality can be applied throughout all core warehouse processes, transforming the warehouse into a competitive advantage. You are the business system analyst assigned to develop this system.

In your meeting with Jack and Daniel, they provided significant details regarding the basic operations of the system. They expect the system will perform the various functions such as receiving all types of orders, inventory control, order processing, pick up and process orders, order load management, outbound documentation, system alerts, packing orders, and crystal reports.

Please note, you must consider the number of wireless communication devices that configure with the proposed system and enables the warehouse management to run the distribution centre using real-time operations. These extensive system functions will improve warehouse operations by minimising costs and increasing productivity.

Note: Answers should be close to 4 pages.

Criteria:

A review of the strengths and weaknesses of cloud-based solutions, taking into consideration the environment in which the solution will be deployed for the proposed system.

Clearly identified strengths and weaknesses of cloud solutions. As well as demonstrate in-depth understanding of the environment that the solution would be used in.

Compare and contrast Unified Process (UP) and Scrum. Then recommend either Unified Process or Scrum you will use for the proposed system and briefly describe why.

Response clearly state the differences between Unified Process and Scrum methodologies with strong justification about which methodology is suitable for the proposed system.

In: Computer Science

Discuss two of your own life or work experiences that you feel have enabled you to...

Discuss two of your own life or work experiences that you feel have enabled you to develop skills which you will be able to transfer to your professional career. You should write about ½ a page on this. Select the responses of 2 of your colleagues to this question, and discuss with each how you think that their life and other work experiences can contribute to their professional skills development. Compare their responses with your own.

note: please solve it as soon as possible, no time for me.

In: Computer Science

The programming language is Java. Write the code you would use to fill the variable cubed...

The programming language is Java. Write the code you would use to fill the variable cubed with the value stored in x to the third power.

In: Computer Science

What software process models are the best and why ? and I want  3 well-reasoned statements for...

What software process models are the best and why ?
and I want  3 well-reasoned statements for not choosing the models Also, write a short critique of the each process.

There are  3 general process model:

-The waterfall model

-Incremental development

-Integration and configuration

In: Computer Science

Show the machine code corresponding to the Y86 version of the following code. Assume that the...

Show the machine code corresponding to the Y86 version of the following code. Assume that the code starts at location 0x050. For each statement, list address: code bytes.

int sumInts ( long int n) { /* Add the integers from 1..n. */ long int i; long int sum = 0; for ( i = 1; i <= n; i++ ) { sum += i; } return sum; }

In: Computer Science

Please Answer!!! Why is public-key cryptography be used to encrypt a symmetric key in a digital...

Please Answer!!!

  1. Why is public-key cryptography be used to encrypt a symmetric key in a digital envelope instead of encrypting the message directly?
  2. What types of data should be encrypted?
  3. When should data be encrypted?

In: Computer Science

**Text file** Kmart, 1450 Summit Avenue, Oconomowoc WI Sears, 2050 Southgate Rd, Colorado Spgs CO -----------------------------------------------------------------...

**Text file**

Kmart, 1450 Summit Avenue, Oconomowoc WI
Sears, 2050 Southgate Rd, Colorado Spgs CO

-----------------------------------------------------------------

Write a function, void getName(char strName[], const char strLine[]), that accepts a string (strLine) encoded in the same format as a line of code in the example file above, and returns the name in strName.

Write a function, void getAddress(char strAddress[], const char strLine[]), that accepts a string (strLine) encoded in the same format as a line of code in the example file above, and returns the address in strAddress.

Write a function, void getCity(char strCity[], const char strLine[]), that accepts a string (strLine) encoded in the same format as a line of code in the example file above, and returns the city in strCity.

Write a function, void getState(char strState[], const char strLine[]), that accepts a string (strLine) encoded in the same format as a line of code in the example file above, and returns the 2-character state abbreviation in strState.

*Please no hard-coded

* C language

In: Computer Science

Create ER diagram for the following: A database has been designed for a Human Resources for...

Create ER diagram for the following:

A database has been designed for a Human Resources for a school in the UK. The database includes records of the teachers and their holidays. The Dean of this school has the power to approve those holidays for all teachers in the school.   

For each teacher, Human Resources keeps track of the Teacher's ID, name, Cell phone number(s), total number of holidays for each year, number of unemployed holiday days remaining in the present year, age, date of the employment, Department name.

Some teachers may work as supervisors. For those teachers, as well as the attributes mentioned above, we also keep track of the date when they are supervisors, in addition to the total time they spend to be supervisor and their categorical level (Category 1, Category 2, Category 3, Category 4 or Category 5).

The Human Resources Department in the school keeps track every holiday has been taken by each teacher. For each holiday, The Human Resources keep track, Unique holiday ID, the number of days taken (spent) in this holiday, the start day and end day of a holiday. Sometimes (in a few cases), an alternative phone number may be documented for a holiday.

The Human Resources Department in the school keeps track every reward has been taken by each teacher. For each reward, The Human Resources keep track, Unique Reward ID, the number of rewards, Date of a reward, teacher name and the amount of the reward.

Each holiday is documented for only one teacher. A teacher can take many holidays per year. Each holiday has been approved by many supervisors and each supervisor has the power to approve many holidays for many teachers. Each supervisor has the power to approve the holidays for many teachers and each teacher may have many supervisors and may not. Every supervisor has the power to give many rewards to each teacher, but does not have to reward any. Every teacher can get many rewards every year.

In: Computer Science

There is a technique called “fabrication” constitutes one dimension of social engineering attack. Think of three...

There is a technique called “fabrication” constitutes one dimension of social engineering attack. Think of three (successful or unsuccessful) social engineering attack cases that you know from media or from your private life. Describe the cases in narrative form (what happened and how the course of each attack unfolded) and analyze the fabricating elements of the cases. Examine, in what ways the attackers sought to fool the victims. Moreover, in what ways they sought to build confidence and credibility (i.e. make the situation seem valid). What kind of frames was constituted?

In: Computer Science

explain the concept of Corporate Information Security. What is it? Why is it important?

explain the concept of Corporate Information Security. What is it? Why is it important?

In: Computer Science

C++ program to implement Matrix Class with following requirements, Classes :- matrix.cpp and main.cpp (to test...

C++ program to implement Matrix Class with following requirements,

Classes :- matrix.cpp and main.cpp (to test it) with following requirements: -

Please use Vectors of double.

  1. Declare and define an matrix class: -
  • The matrix stores doubles. Implement a default constructor which initializes square 1 x 1 matrix that contains  0.0.
  • Implement a constructor that accepts a positive integer n and creates a square n x n matrix that contains 0.0s. Throw an exception if the integer passed to the constructor is zero or negative.
  • Implement a constructor that accepts two positive integers r and c and creates matrix with r rows and c columns that contains 0.0s. Throw an exception if either integer passed to the constructor is zero or negative.
  • Implement a constructor that accepts a one-dimensional array/vector of double. If you use an array, it might be helpful to also pass in the size of the array to indicate the number of elements in the array. The size of the array/double must have an integer square root, i.e., the size of the array/double must be 1, or 4, or 9, or 16, etc. Create a square matrix of size 1 x 1, or 2 x 2, or 3 x 3, or 4 x 4, etc., and populate it using the values from the array/double. If the size of the array/double does not have an integer square root, throw an exception.
  • Implement a 3-parameter Setter that accepts two integers representing row and column and a double representing new value for specified location. Throw an exception if integers are negative or too large.
  • Implement a 2-parameter Getter that accepts two integers representing row and column and returns value in the matrix from specified location. Throw an exception if the integers are negative or too large.
  • Implement a function called clear which sets all values in the matrix to 0.0.
  • Implement a destructor called ~matrix.
  • Implement an overloaded insertion operator so we can print the matrix to std::cout or other streams.
  • Implement == and != operators. The equality operators must check if the matrices are same size and contain the same values in the same locations.
  • Implement unary increment and decrement operators. You will need a prefix and a postfix version of each. The operators should (respectively) increment or decrement each value in the matrix by 1.0.
  • Implement the assignment operator using the copy-and-swap algorithm.
  • Overload operator +=, operator +, operator - =, and operator - .These will only work if the matrices are the same size otherwise throw an exception. Do not overload operator / or operator/=
  • Overload operator* and operator*= . For operator* and operator*= , be careful. You will need to remember that for 2 matrices a and b, the product matrix c is possibly a different size. If matrix a is 1 x 4 and matrix b is 4 x 3, the size of the product matrix c will be 1 x 3. If the number of columns of the first operand is not equal to the number of rows of the second operand, throw an exception.

In: Computer Science

4. Write a program to compute the sum of digits of an integer. For example, given...

4. Write a program to compute the sum of digits of an integer. For example, given the integer 35931, your program should output 21. (21 is the sum 3 + 5 + 9 + 3 + 1)

PYTHON

In: Computer Science