Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

assignement 4 CR

Nova Southeastern University

College of Engineering and Computing

Winter 2025 – Master Level Course

Term Code: 202530 – CRN: 30675 Sec: L01 Cr: 3.0

Dates: 8 weeks: 01/06/2025 – 03/02/2025

MSIT 650 Platform and Network Tech (3 Credits)

Midterm Exam

Check Syllabus and Calendar for % and due date

Make sure you provide enough detail to your answer to show you
understand the question, simple answers (no detail) or 1 or 2
sentences as answers will be worth little.

Most answers are about ½ page each at a minimum

1. Explain in the windows operating system how the operating system changes from

one process to the next, basically the context switch (do not include the algorithms

used by the scheduler, or scheduler activities)

2. Explain in the windows operating system, how an interrupt is handled (for example a

keyboard entry), What sees the key press.

3. Of the three basic operating systems we have covered, windows, Linux and mac, if

you had a customer that was new to PC systems, what questions would you ask them

to determine which operating system they should use/purchase.

4. What are all the file system types that Windows and a Mac use by the operating

system and how large of a file is supported in each (max size), What file systems are

supported by Linux. (list 3 of the more popular)

5. A customer running Windows 11, wants to use Windows XP for older applications, it

has been suggested that they use a VM (Virtual Machine). Explain the steps should

the customer take to install a XP operating system into a VM running on the

windows 11 machine.

6. Describe at least 10 reasons why a server operating system is more robust than your

standard pc-based operating system.

7. What is the max number of simultaneous users that the windows 10 operating system

supports, what is the max number of simultaneous users that a Mac operating system

supports? In your opinion why is there a limit?

8. Explain the steps that should be taken to install a device driver into a windows

operating system, (you can use an example). What steps should be taken to install a

new device into a Mac.

9. You want to upgrade your PC from windows XP to windows 11, is there an upgrade

path? Explain. You also would like to upgrade from windows 8.1 to windows 10,

explain the steps you should take.

10. What does windows 11 zero Trust do? how does this affect you if you are going

to upgrade to Microsoft windows 11?

11. What fundamental change has occurred in windows that it is no longer necessary

to install drivers?

12. Explain the differences between the Von Neumann vs. Harvard architecture? If

you want to modify instructions, which architecture should be chosen?

13. How is a CPU cache used to increase the performance of the Operating system?,

who controls the usage, the operating system or the CPU. Explain

14. What is the difference between a UNIX operating system and a Linux Operating

system? Which was developed first? Why was UNIX developed?

15. What is a “Page Fault” in an operating system and why is it used and how does

the operating system deal with this. Is a “page fault” hardware or software?

16. Explain the difference between Multitasking and Multi-Processing and why and

when are they used?

17. What is the difference between a SoC and a multiprocessor, Give an example of

each.

18. How wide is your data bus and address bus on the computer you use.

19. What is the difference between time-sharing processing and Multi-user

processing. When are they used and is it important to make sure you work with one

or the other, i.e. which one is more responsive.

20. What is the difference between soft real-time and Hard real-time operating

systems, what does windows server and non-server support? What does Linux

support? What does windows 11 support

21. Is an Intel I9 CPU a microprocessor, a microcomputer or a system on a chip?

Explain what it is and why is it not the other two.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

SQL & Data Management

Write a SQL query to find the second-highest salary from an Employee table without using LIMIT. Given a Sales table with Date, Product_ID, and Revenue, write a query to find the cumulative revenue per product over time. Design a normalized database schema for an e-commerce application handling customers, orders, and

SQL 1

SQL help Exercise 8: Write your SQL statement in a file named CIS276DA_Lesson3Exercise8_MEID.sql. Run the script and export the results to CIS276DA_Lesson3Exercise8_MEID.csv. Exercise 9: Write your SQL statement in a file named CIS276DA_Lesson3Exercise9_MEID.sql. Run the script and export the results to CIS276DA_Lesson3Exercise9_MEID.csv. Exercise 10: Write your SQL statement in a

framework

  This week you identify an appropriate theoretical foundation or practice orientation as the theoretical framework through which to view your proposed project. Let’s discuss how you are determining an appropriate theoretical framework for your proposed study. Choose one of the following for your post: Discuss the theoretical foundation or

questionnare

 in the files are the screenshots of my learning styles questionnaire The simple online learning style inventory you took this week, Index of Learning Styles QuestionnaireLinks to an external site., evaluated whether you are active or reflective, sensing or intuitive, visual or verbal, or sequential or global. For this discussion,

Help SQL

SQL Statements Exercise 8: Write your SQL statement in a file named CIS276DA_Lesson3Exercise8_MEID.sql. Run the script and export the results to CIS276DA_Lesson3Exercise8_MEID.csv. Exercise 9: Write your SQL statement in a file named CIS276DA_Lesson3Exercise9_MEID.sql. Run the script and export the results to CIS276DA_Lesson3Exercise9_MEID.csv. Exercise 10: Write your SQL statement in a

Project 1

Follow the attach instructions to complete this work. Project #1: Supply Chain Risk Analysis Overview For this project, you will write a research-based report on Cyber and IT supply chain risks which the client company, Sifers-Grayson must be aware of. This report will be presented to the company’s executive leadership

Cyber

Many security experts argue that their primary concern isn’t hardware or software. It’s peopleware. Successful attacks often rely on some form of social engineering either to obtain access information or for the attack itself. Phishing, in particular, has become a growing concern. Research a phishing technique, including an actual case

CMAP 605

Unit 8 Assignment Directions: Project 3: Paper for Cybersecurity Conference Read the scenario and then write a white paper that follows all the steps listed below. For more information on writing white papers, visit the UMGC Library Writing Center. Scenario Your company requires you to present a white paper at

An application is requesting an I/O operation from the OS, which consists of several steps. The current step is: Block the current application. What are the next two steps?

An interrupt occurs. Data transfer for the current application completes. Execute kernel function in kernel mode. Transfer execution to another application. An interrupt occurs. Block the current application. Data transfer for the current application completes. Transfer execution from another application back to the kernel in kernel mode. this are the option give me the

Worksheet

To complete this assignment, review the prompt and grading rubric in the Module Four Worksheet Activity Guidelines and Rubric. You will also need the Module Four Worksheet. When you have finished your work, submit the assignment here for grading and instructor feedback.

Activity

To complete this assignment, review the prompt and grading rubric in the Module Four Activity Guidelines and Rubric. When you have finished your work, submit the assignment here for grading and instructor feedback.

Computer Science assignment

A. Description of the Assignment Imagine that a company has been using the Linux operating system / kernel for all of its products that are used in a broad range of commercial applications in the past, but the company is currently considering developing an operating system / kernel for real-time

chapter 1 powerpoint presentation

Presentation Document Project Always think of the end user interaction. How will any individual interact with the product you create? Products must comply with law. Your goal is for the end user to have a positive experience with the product while being compliant. Microsoft PowerPoint (Microsoft 365 App) is the

Computer Science A quick assignment on DABS

JUnit Assignment Description: You work for a large flooring company that sells hard wood and carpeted floors. Salesmen go out to people’s home to sell them flooring. You created a program that allows the salesmen to compute the area of a room. Salesmen typically carry laptops on each sales call.

research and critical analysis jan 25 2025

CLASS/HW: 1st Research Article – Screenshots, Methodology & Results (W. 3) Assignment Content Top of Form Prep Task Ensure you have your FIRST research article intended to be used in your Literature Review for later. (1) CONFIRM: that you have applied the required search parameters – last 10 years, full

neural networks that computes the XOR

  Project 2: neural networks that computes the XOR Construct by hand a neural network that computes the XOR function of two inputs. Make sure to specify what sort of units you are using. Show how to build neural network with no hidden layer to implement XOR. If this is

Activation Function

Suppose you had a neural network with linear activation functions. That is, for each unit the output is some constant c times the weighted sum of the inputs.  Assume that the network has one hidden layer. For a given assignment to the weights w, write down equations for the value

binary classification problem with ensemble learning.

Consider a binary classification problem with an ensemble learning algorithm that uses simple majority voting among K learned hypotheses. Suppose that each hypothesis has error E and that the errors made by each hypothesis are independent of the others. Calculate a formula for the error of the ensemble algorithm in