Questions
Answer True or False for the following statements Q1) NFS requires that NIS (yp) be running...

Answer True or False for the following statements

Q1) NFS requires that NIS (yp) be running

Q2) Changes to the NIS database can be made on the slave server

Q3) In single-user mode, the kernel is not running

Q4) A file will be removed from the files system when the link count has become zero

Q5) When the Sun system is reset or first powered on, the screen blanks and a Sun logo is displayed along with some other information about the hardware on the console. At this point, the STOP-A key combination can be pressed to interact with the PROM code. A prompt of "ok" is offered.

Q6) RAID-0 is the referred to as "mirroring". Two (or more) partitions, all of the same size, each store an exact copy of all data, disk-block by disk-block. Mirroring gives strong protection against disk failure: if one disk fails, there is another with the an exact copy of the same data. Mirroring can also help improve performance in I/O-laden systems, as read requests can be divided up between several disks.

Q7) The super user (root) has user id 1 (one).

Q8) Using a -9 with the kill command, allows the process to trap the signal and run the signal handlers that may be associated with the process.

Q9) Only the super-user or an equivalent role can run nfsd

Q10) If field 7 of the password file is empty, csh (the C-Shell) will be used for that user account

Q11) In Solaris, the following command init 5 will reboot the system

In: Computer Science

ou are the Senior Systems Administrator for a community based charity. Your charity is involved in...

ou are the Senior Systems Administrator for a community based charity. Your charity is involved in locating and providing accommodation, mental health services, training and support services to disadvantaged people in the community. Your charity currently runs a small datacentre that has some 50 x86 64 bit servers running mainly Windows Server 2008 R2 for desktop services, database and file services. It also has about 10 Red Hat Enterprise Linux 5 servers for public facing Web pages, services and support. Your charity is considering joining a community cloud provided by a public cloud vendor in order to provide a number of applications to all 500 support staff and administrative users. The community cloud would also be used to store the charity’s 200TB of data. This data contains a considerable amount of confidential information about the people to whom the charity provides services. A small number of the charity’s applications are mission critical and the data that those applications use is both confidential and time sensitive. The cloud vendor has made a presentation to management that indicates that operational costs will drop dramatically if the cloud model is adopted. You are asked to assess whether this model is in the best interests of the business. 1. Describe the steps that you would take to do a Risk Management assessment of this proposal. 2. Ramgovind, Eloff and Smith proposed in their 2010 paper that an information security analysis should include the requirements of Identification and authorisation, authorisation, confidentiality, Integrity, non-repudiation and availability. Discuss whether these requirements are adequate for a proper security assessment for a proposed move to an IaaS model for the charity. 3. A potential migration to the Cloud raises many issues around Governance. Discuss the governance issues that you see arising from a migration of on-premise servers to an IaaS model. 4. The charity’s board has proposed a move to migrate its servers to an IaaS model. Discuss the methods that you would propose to the board to assess the SLA of the Cloud Provider. 5. The board has decided, as an initial step, to move the office automation and database servers to the AWS cloud in order to begin the migration process, and test their strategy. Describe the steps that you would include in the plan to migrate these services.

looking for more specific answer for question 4 and 5

In: Computer Science

JAVA PROGRAM Without changing changing main or PlayOneGame, you need to write the rest of the...

JAVA PROGRAM

Without changing changing main or PlayOneGame, you need to write the rest of the methods. Please complete "Rock, Scissor, Paper" game.

Main:

public static void main(String[] args )
{
   int wins = 0;
   int losses = 0;
   PrintWelcomeMessage();            // Just says hello and explains the rules
   while( PlayerWantsToPlay() )      // Asks the player if they want to play, and returns true or false
   {
      boolean outcome = PlayOneGame();  // One full game.  We do NOT come back here on a tie.  The game is not over on a tie.  
      if( outcome == true )
         wins++;
      else
         losses++;
   }
   PrintGoodByeMessage( wins, losses ); // Prints the outcome of the games
}

Playonegame:

static boolean PlayOneGame()
{
   int AI; int player; int outcome;
   do
   {
      AI = AIPick(); // 0,1,2
      player = PlayerPick() // 0,1,2
      outcome = ComputeWinner(AI, Player)// 0,1,2
   } while( outcome == 0 );// while tied

   if( outcome == 1 )
      return true; // they won
   else
      return false;// they lost
}

In: Computer Science

Write a python programme in a Jupyter notebook which asks the user to input the number...

Write a python programme in a Jupyter notebook which asks the user to input the number of radioactive nuclei in a sample, the number at a later time, and the elapsed time. The programme should calculate and display the decay constant and the half-life. The decay is described by the equations:

? = ? ?−?? ?0

?1/2 = ln (2)

.

Test your programme a sample that contains 4.00x108 nuclei initially and 1.57x107 nuclei after 150 seconds.

SO THEREFORE A PROGRAM THAT WILL ENABLE ME TO INPUT THE ABOVE VALUE TO TEST IT. THANKS

In: Computer Science

PYTHON Exercise 3. Phone Number and Email Address Extractor Say you have the boring task of...

PYTHON Exercise 3. Phone Number and Email Address Extractor

Say you have the boring task of finding every phone number and email address in a long web page or document. If you manually scroll through the page, you might end up searching for a long time. But if you had a program that could search the text in your clipboard for phone numbers and email addresses, you could simply press ctrl-A to select all the text, press ctrl-C to copy it to the clipboard, and then run your program. It could replace the text on the clipboard with just the phone numbers and email addresses it finds.

So, your phone and email address extractor will need to do the following: - Get the text off the clipboard. - Find all phone numbers and email addresses in the text. - Paste them onto the clipboard.

In: Computer Science

*C PROGRAMMING* Create a program which requires the computer to guess the user's number from 1-100....

*C PROGRAMMING*

Create a program which requires the computer to guess the user's number from 1-100. The user does not need to enter their number at any point. The computer should just guess a random number, and then the user can choose whether or not the number is too high or too low, and if the computer does not guess the correct number, it will will keep guessing and eliminate the values from the range that is either too high or too low (depending on the user's selection after a guess is made).

EXAMPLE OF PROGRAM LOGIC:

num = 38 (user's selection - not actual input)

1 to 100 (high and low variables initialized)

computer guess 50 (guess determined by 1 + 100 / 2)
high (user says the number is too high)

49 (new high value - if high subtract 1 from guess and store in high)
computer guess 25 (guess determined by 1 + 49 / 2)
low (user)

26 (new low value - if low add 1 to guess and store in low)
computer guess 38 (guess determined by 26 + 50 / 2)
Correct! (user)

In: Computer Science

I need to have someone design a website using Code one JavaScript server application using Node.js...

I need to have someone design a website using

  • Code one JavaScript server application using Node.js for routing, Express.jsfor framework and Handlebars.js for templating
  • Necessary npm modules are: express, express-handlebars, path and body-parser

- it willl have a drop down box with 5 names of titles of a picture.

- highlite 1 name in dropdown box and there is a select button to make web site go to that picture stored on server..

this is my third question on this site and i have yet to receive any help. so I really need help on this now because i am so far behind

In: Computer Science

The following program calls the fork() system call to create a child process. Suppose that the...

The following program calls the fork() system call to create a child process.

Suppose that the actual pids of the parent process and child process are as follows:

Parent process: 801

Child process:   802 (as returned by fork)

Assume all supporting libraries have been included.

=> Use the answer text field to write the values of the pids printed at lines 1, 2, 3, and 4 (indicate each line number and the value printed).

int main()

{

     pid_t pid, pid1;

     pid = fork(); /* fork a child process */

     if (pid < 0) {

          fprintf(stderr, "Error creating child.\n");

          exit(-1);

     }

     else if (pid > 0) {

          wait(NULL); /* move off the ready queue */

          pid1 = getpid();

          printf(pid); /* Line 1 */

          printf(pid1); /* Line 2 */

     }

     else {

          pid1 = getpid();

          printf(pid); /* Line 3 */

          printf(pid1); /* Line 4 */

     }

     return 0;

}

In: Computer Science

Privacy and Security The purpose of this exercise is to review the privacy and security policies...

Privacy and Security

The purpose of this exercise is to review the privacy and security policies of a web site.   Pick a commercial web site (one that sells a product online), locate the privacy policy and the security policy, and read both.   Complete the Web Analysis form and provide the following information:

  • Provide a summary of the privacy policy.   What did you find comforting about the policy?   What did you find in the policy that concerns you?

  • Provide a summary of the security policy.

  • Opinion:   Are these policies defined to protect you, the consumer, or YOU, the business?   Explain your answer.

In: Computer Science

Implement the constructor, accessor (getter) and mutator (setter) methods indicated in the comments below for the...

Implement the constructor, accessor (getter) and mutator (setter) methods indicated in the comments below for the following class Player.

public class PlayerTester
{
public static void main(String[] args)
{
Player p = new Player("John Adam");
p.addScore(70);
p.addScore(80);
System.out.println("Average score is " + p.averageScore());
}
}

public class Player
{
private String name;
private double totalScore;
private int gamesPlayed;

//constructor with one parameter for the player name - 2 points

//Three accessor methods: getName(), getTotalScore(), getGamesPlayed() - 2 points each

//One mutator method: addScore(double) - 2 points

public double averageScore()
{
double avg = totalScore / gamesPlayed;
return avg;
}
}

In: Computer Science

I need new and unique answers, please. (Use your own words, don't copy and paste), Please...

I need new and unique answers, please. (Use your own words, don't copy and paste), Please Use your keyboard (Don't use handwriting) Thank you...

Question 2: [2.5 Points]

For each of the following design goals, assign into its corresponding category (Quality Attributes).

  1. TicketDistributor must be able to process and distribute 100 thousand user’s concert tickets within 15 seconds limit.
  1. The online banking system must be able to run on iOS, Windows, and Linux.
  1. The website should be always accessible to users 24/7. It should tolerate server crashes and high traffic load.
  1. The application should be finalized and deployed within a month.
  1. Users should know how to use the children’s game for the first time within 1 hour.

In: Computer Science

How should one go about proving the following distributions without using truth tables only using logical...

How should one go about proving the following distributions without using truth tables only using logical laws.

[ X ∧ (Y ⇒ Z) ≡ ? ]

[ (Y ≡ Z ) ⇒ X ≡ ? ]

In: Computer Science

Systems Development Life Cycle is composed of five phases. If you have been hired to develop...

Systems Development Life Cycle is composed of five phases. If you have been hired to develop an information system for your university. Indicate for each case in which phase you are when handling each of the following reports with justifications.

1. You obtained report showing whether the information system is feasible or not      

[ Select one]

a. Maintenance

b. Implementation

c. Design

d. Investigation

e. Analysis

2. You want to correct error that when the system is running

[ Select one]

a. Maintenance

b. Implementation

c. Design

d. Investigation

e. Analysis

.

3. You obtained the system requirements in the form of logical model

[ Select one]

a. Maintenance

b. Implementation

c. Design

d. Investigation

e. Analysis

4. You obtained system specification from a logical model

[ Select one]

a. Maintenance

b. Implementation

c. Design

d. Investigation

e. Analysis

  

In: Computer Science

write a program in c language to count the number of spaces ina sentence .the sentence...

write a program in c language to count the number of spaces ina sentence .the sentence is saved in the string 'sentence'
write it in a repl.it and along with input,output and algorithm

In: Computer Science

1. Discuss the elements of a database system. Like The database schema Schema objects Indexes Tables...

1. Discuss the elements of a database system. Like

  • The database schema
  • Schema objects
  • Indexes
  • Tables
  • Fields and columns
  • Records and rows
  • Keys
  • Relationships
  • Data types

2. Discuss the key components of a database management system architecture and how they collaborate.

3. Discuss why a database management system needs a good query optimizer.

In: Computer Science