Expert answer:Need help with computer science and Operating Syst

Answer & Explanation:I need someone to complete Milestone II. I have completed Milestone one and will attach it as well as the information needed to complete Milestone II. If you need more information, please contact me. If you read the PDF file, it will giive you all information need to complete the assignment. Read milestone one to understand the information that I started on teh fictious company. DO NOT CHARGE ME BEFORE TALKING TO ME AND WE AGREE ON THE PRICE. I AM ONLY WILLING TO PAY 20 DOLLARS FOR THIS.it_600_final_project_and_rubric.pdfoperating_system_milestone_1.docxit_600_milestone_two_template__1_.doc
it_600_final_project_and_rubric.pdf

operating_system_milestone_1.docx

it_600_milestone_two_template__1_.doc

Unformatted Attachment Preview

IT 600 Final Project Guidelines and Rubric
Overview
IT professionals are often called upon to make decisions, provide recommendations, and perform analyses that require an in-depth understanding
of the inner workings of an operating system. This summative assessment will provide students with the knowledge and skills required to achieve
and maintain this level of understanding throughout their careers. For the summative assessment, students will perform a technical evaluation of
an operating system. Students will be offered a choice of operating systems to analyze. Students will use real-time and log-based tools, empirical
observation, and scholarly research to analyze the core subsystems of the operating system. For each subsystem, students will research and
describe the technology used in that subsystem and compare it to other available technologies. For the final report, students will assess the results
of their analyses and perform an overall evaluation of the operating system, with recommendations for how it might be improved.
For the summative assessment you will perform an in-depth technical evaluation of an operating system. The evaluation will be made in terms of
the ability of the system and its supporting hardware to meet a set of organizational needs and technical requirements. The organization is a global
enterprise that provides premium technical support to other enterprise businesses.
Management will use your evaluation as one element among several in their assessment of options for future technology adoption. You will define
the technical requirements, based on tasks performed by the organization, the applications used, system loads, security, system management,
maintenance, and performance. The scope of the evaluation will include analyses and assessments of the hardware-software interface, the
techniques used to implement processes and threads, the file systems supported by the operating system, the input/output subsystem, and the
operating system security features. You will use these analyses and assessments to produce a comprehensive evaluation, which will be written in
the form of a detailed technology review.
SNHU will provide tools to support analysis of some commonly used operating systems, but you may select another operating system if you have
the resources to do so. There will also be several milestones throughout the course that will allow you to develop the evaluation incrementally.
The project is divided into three milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality
final submissions. These milestones will be submitted in Modules Two, Three, and Seven. Your final report will be submitted in Module Nine.
Prompt
Your technical evaluation of an operating system should include analyses and assessments of the hardware-software interface, the techniques used
to implement processes and threads, the file systems supported by the operating system, the I/O subsystem, and the operating system security
features. You will use these analyses and assessments to produce a comprehensive evaluation, which will be written in the form of a detailed
technology review.
Specifically, the following critical elements must be addressed:
I.
Organizational Needs and Requirements
A. Develop an organizational profile that analyzes the tasks performed by the organization, the computer applications in use or
expected to be in use, and the estimated system loads anticipated for the operating system.
B. What are the organizational, security, and performance and reliability requirements related to operating system function,
management, and maintenance?
II.
Computer Architecture
A. What hardware is required to host the operating system? This should include an identification of the minimal hardware required
and an assessment of what would be needed to support organizational needs and requirements.
B. Analyze the architecture in terms of support and functionality of process management, memory management, I/O, and mass
storage.
C. Analyze the architectural support for multiprocessor systems and assess the organization, connection, and control aspects. What are
some architectural issues that might arise regarding technologies used in multiprocessor systems and how would you recommend
utilizing multiprocessor systems in light of these issues?
III.
Process Management
A. Assess the operating system process management in terms of its responsiveness to organizational requirements. Use process
monitoring tools to gather data for your assessment.
B. Assess software tools for thread analysis and deadlock detection that are available for the operating system. What strategies does
the operating system provide for handling deadlocks?
C. What support does the operating system provide for multiprocessing? Assess the applicability and ability of the operating system to
allocate tasks between multiple processors.
IV.
Memory Management
A. Describe how the types of memory supported by the operating system are used. What memory abstraction does the system use?
Use an analysis tool to investigate the mapping to physical memory.
B. Describe the system support for virtual memory, memory paging, and segmentation. Use a monitoring tool to assess their activity
under heavily loaded conditions.
C. Assess the techniques used for memory management policy and mechanism separation and their utility in managing complexity.
V.
I/O and Mass Storage
A. Describe the hardware-software interface for I/O management used by the operating system. Various techniques are used for
enabling the operating system to communicate with devices. What techniques are supported and what are their advantages and
disadvantages?
B. Analyze the file systems supported by the operating system. Use file system performance tests to assess the available file systems.
C. What is the relationship between scheduled process context switching and I/O interrupt handling? Analyze the use of device
interrupts in the operating system and compare them to other possible approaches to input/output.
VI.
Security
A. What formal security model does the system support? Analyze the system to determine what support it provides for implementing
security models and assess the relevant tools and services made available to administrators.
B. Recommend techniques and best practices to further support security of the operating system.
VII.
Overall Evaluation: Using the defined requirements, analyses, and assessments, develop a comprehensive detailed technology
recommendation. Include an integrated assessment of the operating system’s capability to support organizational needs and technical
requirements.
Milestones
Milestone One: Situation Analysis
In Module Two, you will conduct a situational analysis. You will write a short paper that describes the business-related challenges faced by the
organization. This milestone will be graded with the Milestone One Rubric.
Milestone Two: Analytical Organizational Profile
In Module Three, you will conduct an analytical organizational profile. Your work will be completed in the Milestone Two Template document. This
milestone will be graded with the Milestone Two Rubric.
Milestone Three: Full Organizational Profile
In Module Seven, you will complete a full organizational profile. Your work will be completed in the Milestone Three Template document. This
milestone will be graded with the Milestone Three Rubric.
Final Submission: Technical Evaluation of an Operating System
In Module Nine, you will consider the questions below and make revisions to the document you submitted for Milestone Three. With your
Milestone Three document in front of you, consider the following and make revisions as necessary:
a)
b)
c)
d)
e)
f)
g)
h)
Have you incorporated all of the feedback and suggestions you received from your instructor?
Does your submission address all of the critical elements outlined above?
Does the operating system you selected match the specific requirements your organization identified?
Do you have title and references pages?
Is your submission at least 15 pages of content not including title and reference pages?
Have you supported each of your positions with a credible source?
Have you properly cited your sources and made proper attribution for any copyrighted graphics or photos?
Does your submission make a clearly stated recommendation for an operating system?
Your final submission should be a polished artifact containing all of the critical elements of the final project. It should reflect the incorporation of
feedback gained throughout the course. This submission will be graded using the Final Project Rubric (below).
Deliverables
Milestone
One
Two
Three
Deliverable
Module Due
Grading
Situation Analysis
Analytical Organizational Profile
Two
Three
Graded separately; Milestone One Rubric
Graded separately; Milestone Two Rubric
Full Organizational Profile
Seven
Graded separately; Milestone Three Rubric
Final Submission: Technical Evaluation
of an Operating System
Nine
Graded separately; Final Project Rubric
Final Project Rubric
Guidelines for Submission: Your report should be 15 pages double-spaced paper or the completed template provided in Milestone Three,
professionally written, with necessary citations in APA format and any accompanying visuals or additional artifacts submitted as part of an
appendix section.
Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more
information, review these instructions.
Critical Elements
Organizational
Profile
Exemplary (100%)
Meets “Proficient” criteria and
organizational profile shows keen
insight into organizational needs
and requirements
Function,
Management, and
Maintenance
Meets “Proficient” criteria and
draws insightful conclusions or
inferences about the implications
of the requirements for the
operating system
Hardware
Meets “Proficient” criteria and
draws insightful conclusions or
inferences about the implications
of the requirements for the
hardware
Support and
Functionality
Meets “Proficient” criteria and
analysis shows keen insight into
the significance of the
architecture for process
management, memory
management, I/O, and mass
storage
Proficient (90%)
Develops an accurate and detailed
organizational profile that
analyzes the tasks performed by
the organization, the computer
applications in use or expected to
be in use, and the estimated
system loads
Fully describes the organizational,
security, performance, and
reliability requirements as they
relate to operating system
function, management, and
maintenance
Needs Improvement (70%)
Develops an organizational profile
that analyzes the tasks performed
by the organization, the computer
applications in use or expected to
be in use, and the estimated
system loads, but with gaps in
accuracy or details
Describes the organizational,
security, performance, and
reliability requirements as they
relate to operating system
function, management, and
maintenance, but with gaps in
details
Accurately explains the hardware Explains the hardware required to
required to support the operating support the operating system, and
system, and assesses the
assesses the hardware needed to
hardware needed to support
support organizational needs and
organizational needs and
requirements, but with gaps in
requirements
accuracy or details
Accurately analyzes the
Analyzes the architecture in terms
architecture in terms of support
of support and functionality of
and functionality of process
process management, memory
management, memory
management, I/O, and mass
management, I/O, and mass
storage, but analysis is inaccurate
storage
or lacking detail
Not Evident (0%)
Does not develop an
organizational profile that
analyzes the tasks performed by
the organization, the computer
applications in use or expected to
be in use, and the estimated
system loads
Does not describe the
organizational, security,
performance, and reliability
requirements as they relate to
operating system function,
management, and maintenance
Value
5.75
Does not explain the hardware
required to support the operating
system
5.75
Does not analyze the architecture
in terms of support and
functionality of process
management, memory
management, I/O, and mass
storage
5.75
5.75
Architectural Issues Meets “Proficient” criteria and
analysis shows keen insight into
the significance of the
architecture multiprocessor
systems
Responsiveness to
Organizational
Requirements
Software Tools
Support
Memory
Abstraction
Assess Activity
Techniques
Meets “Proficient” criteria and
draws insightful conclusions or
inferences about the value of
process management in terms of
its responsiveness to
organizational requirements
Meets “Proficient” criteria and
shows keen insight into the
significance of deadlocks and
related problems and the tools
and techniques used in detection,
recovery, avoidance, and
prevention
Meets “Proficient” criteria and
evidences keen insight into the
technology of multiprocessing and
its applicability in organizational
needs and requirements
Meets “Proficient” criteria and
shows keen insight into the
significance of the memory
abstraction for system utility
Meets “Proficient” criteria and
shows keen insight into the
advantages and disadvantages of
memory management
technologies
Meets “Proficient” criteria and
shows keen insight into how
separation of policy from
mechanism can serve as a general
principle for reducing complexity
Accurately analyzes the
architectural support for
multiprocessor systems and
assesses the organization,
connection, and control aspects of
the system
Assesses operating system
process management in terms of
its responsiveness to
organizational requirements,
using process monitoring tools to
gather data
Assesses software tools for thread
analysis and deadlock detection
available for the operating system
and explains associated strategies
Analyzes the architectural support Does not analyze the architectural
for multiprocessor systems and
support for multiprocessor
assesses aspects of the system,
systems
but with gaps in accuracy or
details
5.75
Assesses operating system
Does not assess operating system
process management but the
process management
assessment lacks detail or the use
of process monitoring tools is not
evident
5.75
Assesses software tools for thread
analysis and deadlock detection
available for the operating system
and explains associated strategies,
but with gaps in detail or accuracy
Does not assess software tools for
thread analysis and deadlock
detection available for the
operating system and explain
associated strategies
5.75
Accurately assesses the
applicability and ability of the
operating system to allocate tasks
between multiple processors
Assesses the applicability and
ability of the operating system to
allocate tasks between multiple
processors, but with gaps in
accuracy, analysis, or detail
Describes how the types of
memory supported by the
operating systems function but
with gaps in detail or accuracy
Assesses the system support for
virtual memory, memory paging,
and segmentation, but the
assessment lacks accuracy or
detail
Assesses the techniques used for
memory management policy and
mechanism for their utility in
managing complexity, but some
techniques are omitted or the
assessment lacks accuracy
Does not assess the applicability
and ability of the operating
system to allocate tasks between
multiple processors
5.75
Does not describe how the types
of memory supported by the
operating systems function
5.75
Does not assess the system
support for virtual memory,
memory paging, and
segmentation
5.75
Does not assess the techniques
used for memory management
policy and mechanism separation
for their utility in managing
complexity
5.75
Accurately describes how the
types of memory supported by
the operating systems function
based on analysis
Assesses the system support for
virtual memory, memory paging,
and segmentation
Assesses the techniques used for
memory management policy and
mechanism separation for their
utility in managing complexity
Hardware-Software Meets “Proficient” criteria and
Interface
draws insightful conclusions or
inferences about I/O techniques
across the full range of devices
and I/O subsystems
File Systems
Context Switching
and I/O Interrupt
Handling
Security Model
Recommended
Techniques
Overall Evaluation
Articulation of
Response
Describes the hardware-software
interface for I/O management,
but lacks detail or accuracy of
explanation around the role of the
operating system in controlling
the computer’s I/O
Analyzes the file systems
supported by the operating
system, but the analysis is
incomplete or inaccurate
Does not describe the hardwaresoftware interface for I/O
management
5.75
Does not analyze the file systems
supported by the operating
system
5.75
Analyzes the relationship between
scheduled process context
switching and I/O interrupt
handling and compares to other
approaches, but the analysis is
incomplete or inaccurate
Meets “Proficient” criteria and
Analyzes the system to determine
evidences keen insight into the
the formal security model the
value of formal security models
system supports, but with gaps in
detail or accuracy
Meets “Proficient” criteria and
Recommends techniques and best Recommends techniques and best
evidences keen insight into the
practices to further support
practices, but the
effect recommended techniques security of the operating system
recommendations are not
and best practices would have on
applicable to the operating
further supporting security of the
system or would not logically
operating system
support security
Meets “Proficient” criteria and
Develops a comprehensive,
Develops a technology
evidences keen insight into the
integrated technology
recommendation for the case, but
value of the recommendations
recommendation for the case
is not comprehensive or not
and their feasibility
based on the analyses,
based on the analyses,
assessments, and defined
assessments, and defined
requirements
requirements
Submission is free of errors
Submission has no major errors
Submission has major errors
related to citations, grammar,
related to citations, grammar,
related to citations, grammar,
spelling, syntax, and organization spelling, syntax, or organization
spelling, syntax, or organization
and is presented in a professional
that negatively impact readability
and easy-to-read format
and articulation of main ideas
Does not analyze the relationship
between scheduled process
context switching and I/O
interrupt handling or compare to
other approaches
5.75
Does not analyze the system to
determine the formal security
model the system supports
5.75
Does not recommend techniques
and best practices for supporting
the operating system
5.75
Does not develop a technology
recommendation for the case
5.75
Submission has critical errors
related to citations, grammar,
spelling, syntax, or organization
that prevent understanding of
ideas
Earned Total
2.25
Meets “Proficient” criteria and
draws insightful conclusions or
inferences about the performance
of the file systems supported by
the operating system
Meets “Proficient” criteria and
demonstrates clearly the
applicability of context switching
and I/O interrupt handling
technologies
Fully describes the hardwaresoftware interface for I/O
management used by the
operating system
Analyzes the file systems
supported by the operating
system, including an assessment
of file system performance
Accurately and comprehensively
analyzes the relationship between
scheduled process context
switching and I/O interrupt
handling and compares to other
approaches
Concisely analyzes the system to
determine the formal security
model the system supports
100%
Running head: TSI OS SUPPORT FOR GPOS FEATURES
TSI OS Sup …
Purchase answer to see full
attachment

How it works

  1. Paste your instructions in the instructions box. You can also attach an instructions file
  2. Select the writer category, deadline, education level and review the instructions 
  3. Make a payment for the order to be assignment to a writer
  4.  Download the paper after the writer uploads it 

Will the writer plagiarize my essay?

You will get a plagiarism-free paper and you can get an originality report upon request.

Is this service safe?

All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 20% with the discount code ESSAYHELP