State two advantages and two disadvantages of a layered operating system.

Coursework 1 Question 1 State two advantages and two disadvantages of a layered operating system. ). - Advantages of layered operating systems are: . It is decomposable and therefore effects separation of concerns and different abstraction levels 2. It allows good maintenance, where you can make changes without affecting layer interfaces - Disadvantages of layered operating systems are: . It is difficult to exactly assign of functionalities to the correct and appropriate layer 2. Because of having too many layers, performance of the system is degraded Question 2 a. Give definitions for: turnaround time, throughput, processor utilisation b. When might a context switch occur? What exactly is saved? Why? c. In the presence of asynchronous interrupts, even the most innocent looking program can produce mysterious results. If concurrency can produce subtle bugs, why use it? 2). a. Turnaround time: - is the time taken between the submission and complete execution of a process, which includes the actual running time and waiting time for accessing the resources Throughput: - is the amount of work, in other words, the rate of completion of processes a computer can carry out in a certain time (a unit time). Throughput basically defines the degree of performance of a computer/system Processor utilisation: - indicates the percentage of time

  • Word count: 907
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

This research project is being conducted to formulate an answer or theory to the question, 'why do individuals use complementary therapy for the maintenance of health?'

Introduction This research project is being conducted to formulate an answer or theory to the question, 'why do individuals use complementary therapy for the maintenance of health?' Using a single case study a member of the 'accessible population' shall be interviewed using the semi-structured interview method. The data analysed is to provide a generalised answer that can be applied to the population being studied, which for the purposes of this research project are those who partake in complementary therapies. The overall aim of the research project is to "obtain as representative a range of responses as possible to enable you [the researcher] to fulfil the objectives of the study and to provide answers to key questions". (Bell, 1999) Background (of the topic) Using the quantitative research method a questionnaire was designed as a group project. This questionnaire consisted of 10 closed questions, which included demographic questions, all of which had multiple-choice answers (refer to appendix 1). The questions were designed so that the overall answers when collated would provide an answer for the question 'Why does an individual use a complementary therapy for the maintenance of health?' Through the results collated from all of the group members' we found that over half of those partaking in the questionnaire had received treatment for a medical condition.

  • Word count: 3161
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

This documentation seeks to solve the drought management problem by design of a Drought Early Warning and Management System (DEWMS). The Ministry of Agriculture, under which the Department

Software development DROUGHT MANAGEMENT SYSTEM INTRODUCTION Historically, more emphasis has been placed on the response component of drought management, with little or no attention to mitigation, preparedness, prediction or monitoring. With the present awareness of the effects of ongoing climate change and global warning, the importance of a meteorological early warning system becomes more apparent. Since drought is a natural calamity, awareness only might not be sufficient to overcome this occurrence hence a system that handles both awareness and management of this disaster upon occurrence is imperative. Granted that there are numerous ways of combating drought, a well-structured system of integrating all these methodologies is required. Such as system has the advantage of being able to anticipate areas that may cut back on water supply requirements, ability to run more frequent forecasts of the expected water supply and also allow more accurately calibrated forecasts. All these seemingly hectic problems can be easily solved with an integrated computer based system. This documentation seeks to solve the drought management problem by design of a Drought Early Warning and Management System (DEWMS). The Ministry of Agriculture, under which the Department of Meteorology falls, shall best manage this system. Drought prone areas shall be the primary beneficiaries advisories

  • Word count: 1434
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Which properties of HTTP waste bandwidth? What is the additional problem using HTTP/1.0 together with TCP? How does HTTP/1.1 improve the situation?

Assignment 2 . Which properties of HTTP waste bandwidth? What is the additional problem using HTTP/1.0 together with TCP? How does HTTP/1.1 improve the situation? The Hypertext Transfer Protocol (HTTP) is a stateless application protocol. An HTTP transaction consists of an HTTP request issued by a client and an HTTP response from a server. Stateless means that all HTTP transactions are independent of each other. HTTP does not remember and transaction, request, or response. HTTP causes many problems in wireless networks: * Bandwidth and delay: HTTP has not been designed with low bandwidth and high delay connections in mind. HTTP protocol headers are quite large and redundant. Many information fields are transferred repeatedly with each request because HTTP is stateless. Servers transfer content uncompressed. As TCP connections are typically used for each item on the web page, a huge overhead comes with each item in HTTP/1.0. Another problem is caused by the DNS look-up, necessary for many items on a web page, reducing bandwidth and increasing the delay even further. * Caching: Caching in quite often disabled by content providers. Many companies want to place advertisements on web pages and need feedback, e.g. through the number of clicks. Many present-day page contain dynamic objects that cannot be cached, e.g., access counters. * POSTing: Sending content form a client to

  • Word count: 2734
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

High End CAD/CAM Packages: Parametric Modelling packages dominate the high end market, such as Pro/Engineer, Unigraphics and CATIA. Parametric modelling i

Literature Survey High End CAD/CAM Packages: Parametric Modelling packages dominate the high end market, such as Pro/Engineer, Unigraphics and CATIA. Parametric modelling is basically explained as; rather than models being constructed like a blob of plasticine, with bits being added or removed to make changes, the user constructs a list of features or parts, which are stored by the program and can be used to change the model by rebuilding it with modified parameters. Parts drawn and saved are imported into an assembly where they are mated or constrained to build complex assemblies. One feature that seperates the high end packages to the mid range is how the programs have evolved, programs such as SolidWorks, Inventor, and Solid Edge have always run on Windows and as a result haven't had major changes to their user interfaces. But high-end programs such as the ones mentioned above have undergone major interface overhaul, a result of migrating from UNIX-based systems. Unigraphics or as it's known now NX (due to the company acquiring and merging with a package called I-deas, which is a styling product capabable of suitable automotive surfacing applications), is a parametric modelling package with CAM capabilities. NX is widely used throughout the engineering industry, especially in the automotive and aerospace sectors. This is due its ability do generate a model

  • Word count: 1830
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Are Your Offline and Online Campaigns Co-ordinated?

Are Your Offline and Online Campaigns Co-ordinated? Many people seem to be scared of emarketing. Often the reason for this is that they don't where to start. Are you one of them? If so, are you aware that you're losing out? At least one of your competitors is gaining the edge while you sit around wondering what you should do. But if you have a website, and include the address in your marketing campaigns then, believe it or not, you're doing emarketing. Find that scary? I hope not! After all it was quite easy to include it in all your campaigns! But there's more to it then that. If you are including your email address then people are going to visit your website. Just as you tell people to call a 1800 number you are inviting them to your website. But are your offline and online campaigns co-ordinated? Your prospects will expect to see a mirror image of your offline image online. If you're sending out direct mail (and including your web address) inviting people to enter a competition or fill in a form either by post or online, have you checked to see if the form is on your site? You would be amazed the amount of companies that have made this mistake. Your response is going to be affected. People expect your online campaign to match the part of the offline campaign that they're holding in their hand. Don't believe me? Then imagine you receive a piece of direct mail or see

  • Word count: 502
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Optimal Path Planning Applied to Ant Foraging

Optimal Path Planning Applied to Ant Foraging Microsystems and Machine Vision Laboratory Materials and Engineering Research Institute Sheffield Hallam University, Keywords: Robotics, artificial intelligence, path planning, ant foraging, swarm intelligence. Introduction The development of swarm technologies has become prevalent due to future applications in a variety of domains: medical, bioinformatics, military/defence, surveillance, even internet television broadcasting. Future space missions will exploit such technologies to enable spacecraft to be sent to places previously inaccessible, to ensure greater protection of space assets, and to increase the likelihood of mission success [1]. Social insect societies consist of individuals with simple behaviour, yet at the collective level the societies are capable of solving complex tasks. Although the capabilities of a single ant in an ant colony are limited, ants can collectively find the shortest path from the nest to the source of food. Ants are generally very efficient in finding food and building a nest just by using simple rules. Ants make use of pheromones, a chemical substance to mark a trail. They roam randomly until they pick up the scent of the pheromone, at which point of time they will decide to either follow the trail or continue to roam randomly. Using these techniques, ants are capable of finding the

  • Word count: 1199
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Data Warehouse Security

Security Measures used to protect privacy of information "In many ways the average data warehouse team still lives in a world of naive innocence. The team is so busy sourcing data and deciding on hardware and software that a comprehensive security plan simply hasn't been done ... In many cases, sensitive information is lying right on the table and hasn't been abused only because no one has tried to grab it yet. The situation is similar to leaving a car unlocked in a shopping center parking lot. You might go for years without having the car broken into just because the thieves have not turned their attention to it yet." - Ralph Kimball Data warehouses have been an important way for organizations to efficiently use digital information for decision making. Simply put, a data warehouse is a database system that focuses on data storage specifically structured for query and analysis (Kimball, 2002). That is, data warehouses are able to optimize database related queries and analysis tools with their data analysis abilities. All of the organisation's decisive information can be found in a convenient format to retrieve and use. This can include information about operational systems information and other company information, such as products and customer details. These details can include names and addresses, bank account numbers and other confidential information. Such data stored in

  • Word count: 2691
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

RFID (Radio Frequency Identification Devices)-

I. RFID (Radio Frequency Identification Devices)- An Introduction: RFID is an automated data-capture technology that can be used to electronically identify, track, and store information about groups of products, individual items, or product components. The technology consists of three key pieces: RFID tags; RFID readers; and a data collection, distribution, and management system. RFID tags are small or miniaturized computer chips programmed with information about a product or with a number that corresponds to information that is stored in a database. The tags can be located inside or on the surface of the product, item, or packing material. RFID readers are querying systems that interrogate or send signals to the tags and receive the responses. These responses can be stored within the reader for later transfer to a data collection system or instantaneously transferred to the data collection system. Lastly, data collection systems consist of computers running data processing software, which typically are networked with a larger information management system. [IDC, 2004. Online] RFID technology is not new; it has been around since World War II (in aircraft Identification Friend or Foe systems) and in limited use in inventory management since the 1970's. The technology relies on the transfer of packets of information through radio waves or electromagnetic waves. However, it has

  • Word count: 4759
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

This paper will propose a testing strategy for Internet E-Commerce applications and assess its strengths and weaknesses. The testing strategy mainly focuses on the testing of the web components

Comp546 Software Quality Assurance Group Project Testing Strategy for Internet Applications Table of Content . Introduction ..................................................................... 1 2. Types of Web Applications .................................................... 1 2.1 Internet Presence 2.2 Internet e-commerce 2.3 Intranet 2.4 Extranet 2.5 Internet media distribution 2.6 Non-Internet media distribution 2.7 Non-Internet application 2.8 Focus of this paper 3. Differences between Web and Traditional Client-Server Systems ....... 3 3.1 Client-Side Applications 3.2 Server-Based Applications 3.3 Web Systems 3.3 Interoperability Issues 3.5 Piggyback Off Existing Systems 3.6 Gray Box Testing 4. Key areas of Focus for web application testing ............................. 7 4.1 People 4.2 Tools 4.3 Process 4.4 Environment 5. Detailed Testing Process ....................................................... 7 6. Web Testing Key Challenges .................................................. 9 6.1 Scalability and performance 6.2 Time to market 6.3 Usability Test 6.4 High demand for regression testing 6.5 Other factors 7. Testing methods ................................................................. 10 7.1 Seven Categories of Tests 7.2 Test types for Static/Dynamic, Automatic/Manual 7.3 Static Testing 7.4 Web Page Integration

  • Word count: 13329
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay