Answer True or False for the following statements
Q1) NFS requires that NIS (yp) be running
Q2) Changes to the NIS database can be made on the slave server
Q3) In single-user mode, the kernel is not running
Q4) A file will be removed from the files system when the link count has become zero
Q5) When the Sun system is reset or first powered on, the screen blanks and a Sun logo is displayed along with some other information about the hardware on the console. At this point, the STOP-A key combination can be pressed to interact with the PROM code. A prompt of "ok" is offered.
Q6) RAID-0 is the referred to as "mirroring". Two (or more) partitions, all of the same size, each store an exact copy of all data, disk-block by disk-block. Mirroring gives strong protection against disk failure: if one disk fails, there is another with the an exact copy of the same data. Mirroring can also help improve performance in I/O-laden systems, as read requests can be divided up between several disks.
Q7) The super user (root) has user id 1 (one).
Q8) Using a -9 with the kill command, allows the process to trap the signal and run the signal handlers that may be associated with the process.
Q9) Only the super-user or an equivalent role can run nfsd
Q10) If field 7 of the password file is empty, csh (the C-Shell) will be used for that user account
Q11) In Solaris, the following command init 5 will reboot the system
In: Computer Science
ou are the Senior Systems Administrator for a community based charity. Your charity is involved in locating and providing accommodation, mental health services, training and support services to disadvantaged people in the community. Your charity currently runs a small datacentre that has some 50 x86 64 bit servers running mainly Windows Server 2008 R2 for desktop services, database and file services. It also has about 10 Red Hat Enterprise Linux 5 servers for public facing Web pages, services and support. Your charity is considering joining a community cloud provided by a public cloud vendor in order to provide a number of applications to all 500 support staff and administrative users. The community cloud would also be used to store the charity’s 200TB of data. This data contains a considerable amount of confidential information about the people to whom the charity provides services. A small number of the charity’s applications are mission critical and the data that those applications use is both confidential and time sensitive. The cloud vendor has made a presentation to management that indicates that operational costs will drop dramatically if the cloud model is adopted. You are asked to assess whether this model is in the best interests of the business. 1. Describe the steps that you would take to do a Risk Management assessment of this proposal. 2. Ramgovind, Eloff and Smith proposed in their 2010 paper that an information security analysis should include the requirements of Identification and authorisation, authorisation, confidentiality, Integrity, non-repudiation and availability. Discuss whether these requirements are adequate for a proper security assessment for a proposed move to an IaaS model for the charity. 3. A potential migration to the Cloud raises many issues around Governance. Discuss the governance issues that you see arising from a migration of on-premise servers to an IaaS model. 4. The charity’s board has proposed a move to migrate its servers to an IaaS model. Discuss the methods that you would propose to the board to assess the SLA of the Cloud Provider. 5. The board has decided, as an initial step, to move the office automation and database servers to the AWS cloud in order to begin the migration process, and test their strategy. Describe the steps that you would include in the plan to migrate these services.
looking for more specific answer for question 4 and 5
In: Computer Science
JAVA PROGRAM
Without changing changing main or PlayOneGame, you need to write the rest of the methods. Please complete "Rock, Scissor, Paper" game.
Main:
public static void main(String[] args ) { int wins = 0; int losses = 0; PrintWelcomeMessage(); // Just says hello and explains the rules while( PlayerWantsToPlay() ) // Asks the player if they want to play, and returns true or false { boolean outcome = PlayOneGame(); // One full game. We do NOT come back here on a tie. The game is not over on a tie. if( outcome == true ) wins++; else losses++; } PrintGoodByeMessage( wins, losses ); // Prints the outcome of the games }
Playonegame:
static boolean PlayOneGame() { int AI; int player; int outcome; do { AI = AIPick(); // 0,1,2 player = PlayerPick() // 0,1,2 outcome = ComputeWinner(AI, Player)// 0,1,2 } while( outcome == 0 );// while tied if( outcome == 1 ) return true; // they won else return false;// they lost }
In: Computer Science
Write a python programme in a Jupyter notebook which asks the user to input the number of radioactive nuclei in a sample, the number at a later time, and the elapsed time. The programme should calculate and display the decay constant and the half-life. The decay is described by the equations:
? = ? ?−?? ?0
?1/2 = ln (2)
.
Test your programme a sample that contains 4.00x108 nuclei initially and 1.57x107 nuclei after 150 seconds.
SO THEREFORE A PROGRAM THAT WILL ENABLE ME TO INPUT THE ABOVE VALUE TO TEST IT. THANKS
In: Computer Science
PYTHON Exercise 3. Phone Number and Email Address
Extractor
Say you have the boring task of finding every phone number and
email address in a long web page or document. If you manually
scroll through the page, you might end up searching for a long
time. But if you had a program that could search the text in your
clipboard for phone numbers and email addresses, you could simply
press ctrl-A to select all the text, press ctrl-C to copy it to the
clipboard, and then run your program. It could replace the text on
the clipboard with just the phone numbers and email addresses it
finds.
So, your phone and email address extractor will need to do the
following: - Get the text off the clipboard. - Find all phone
numbers and email addresses in the text. - Paste them onto the
clipboard.
In: Computer Science
*C PROGRAMMING*
Create a program which requires the computer to guess the user's number from 1-100. The user does not need to enter their number at any point. The computer should just guess a random number, and then the user can choose whether or not the number is too high or too low, and if the computer does not guess the correct number, it will will keep guessing and eliminate the values from the range that is either too high or too low (depending on the user's selection after a guess is made).
EXAMPLE OF PROGRAM LOGIC:
num = 38 (user's selection - not actual input) 1 to 100 (high and low variables initialized) computer guess 50 (guess determined by 1 + 100 / 2) high (user says the number is too high) 49 (new high value - if high subtract 1 from guess and store in high) computer guess 25 (guess determined by 1 + 49 / 2) low (user) 26 (new low value - if low add 1 to guess and store in low) computer guess 38 (guess determined by 26 + 50 / 2) Correct! (user)
In: Computer Science
I need to have someone design a website using
- it willl have a drop down box with 5 names of titles of a picture.
- highlite 1 name in dropdown box and there is a select button to make web site go to that picture stored on server..
this is my third question on this site and i have yet to receive any help. so I really need help on this now because i am so far behind
In: Computer Science
The following program calls the fork() system call to create a child process.
Suppose that the actual pids of the parent process and child process are as follows:
Parent process: 801
Child process: 802 (as returned by fork)
Assume all supporting libraries have been included.
=> Use the answer text field to write the values of the pids printed at lines 1, 2, 3, and 4 (indicate each line number and the value printed).
int main()
{
pid_t pid, pid1;
pid = fork(); /* fork a child process */
if (pid < 0) {
fprintf(stderr, "Error creating child.\n");
exit(-1);
}
else if (pid > 0) {
wait(NULL); /* move off the ready queue */
pid1 = getpid();
printf(pid); /* Line 1 */
printf(pid1); /* Line 2 */
}
else {
pid1 = getpid();
printf(pid); /* Line 3 */
printf(pid1); /* Line 4 */
}
return 0;
}
In: Computer Science
Privacy and Security
The purpose of this exercise is to review the privacy and security policies of a web site. Pick a commercial web site (one that sells a product online), locate the privacy policy and the security policy, and read both. Complete the Web Analysis form and provide the following information:
Provide a summary of the privacy policy. What did you find comforting about the policy? What did you find in the policy that concerns you?
Provide a summary of the security policy.
Opinion: Are these policies defined to protect you, the consumer, or YOU, the business? Explain your answer.
In: Computer Science
Implement the constructor, accessor (getter) and mutator (setter) methods indicated in the comments below for the following class Player.
public class PlayerTester
{
public static void main(String[] args)
{
Player p = new Player("John Adam");
p.addScore(70);
p.addScore(80);
System.out.println("Average score is " + p.averageScore());
}
}
public class Player
{
private String name;
private double totalScore;
private int gamesPlayed;
//constructor with one parameter for the player name - 2 points
//Three accessor methods: getName(), getTotalScore(), getGamesPlayed() - 2 points each
//One mutator method: addScore(double) - 2 points
public double averageScore()
{
double avg = totalScore / gamesPlayed;
return avg;
}
}
In: Computer Science
I need new and unique answers, please. (Use your own words, don't copy and paste), Please Use your keyboard (Don't use handwriting) Thank you...
Question 2: [2.5 Points]
For each of the following design goals, assign into its corresponding category (Quality Attributes).
In: Computer Science
How should one go about proving the following distributions without using truth tables only using logical laws.
[ X ∧ (Y ⇒ Z) ≡ ? ]
[ (Y ≡ Z ) ⇒ X ≡ ? ]
In: Computer Science
Systems Development Life Cycle is composed of five phases. If you have been hired to develop an information system for your university. Indicate for each case in which phase you are when handling each of the following reports with justifications.
1. You obtained report showing whether the information system is feasible or not
[ Select one]
a. Maintenance
b. Implementation
c. Design
d. Investigation
e. Analysis
2. You want to correct error that when the system is running
[ Select one]
a. Maintenance
b. Implementation
c. Design
d. Investigation
e. Analysis
.
3. You obtained the system requirements in the form of logical model
[ Select one]
a. Maintenance
b. Implementation
c. Design
d. Investigation
e. Analysis
4. You obtained system specification from a logical model
[ Select one]
a. Maintenance
b. Implementation
c. Design
d. Investigation
e. Analysis
In: Computer Science
write a program in c language to count the number of
spaces ina sentence .the sentence is saved in the string
'sentence'
write it in a repl.it and along with input,output and
algorithm
In: Computer Science
1. Discuss the elements of a database system. Like
2. Discuss the key components of a database management system architecture and how they collaborate.
3. Discuss why a database management system needs a good query optimizer.
In: Computer Science