Get help from the best in academic writing.

The control of processes and threads is of deep concern by developers

Question Get Answer The control of processes and threads is of deep concern by developers of all operating systems capable of handling “real or emulated” simultaneous computer activity. Threads are typically created by processes (initially invoked by the user or another process). Discuss how an operating system manages these processes and threads, how they are instantiated and discarded, how the activity is controlled, along with the respective advantages and disadvantages of both process and thread. Do not discuss MS Windows OS. Instead, you may choose from Linux, UNIX, ROS, z/OS, or VM.

Consider the following business rules for a patient appointment system………A

Question Get Answer Consider the following business rules for a patient appointment system………A doctor can be scheduled for many appointments, but may not have any scheduled at all. Each appointment is scheduled with exactly 1 doctor. A patient can schedule 1 or more appointments. One appointment is scheduled with exactly 1 patient. An appointment must generate exactly 1 bill, a bill is generated by only 1 appointment. One payment is applied to exactly 1 bill, and 1 bill can be paid off over time by several payments. A bill can be outstanding, having nothing yet paid on it at all. One patient can make many payments, but a single payment is made by only 1 patient. Some patients are insured by an insurance company. If they are insured, they can only carry insurance with one company. An insurance compnay can have many patients carry their policies. For patients that carry insurance, the insurance company will make payments, each single payment is made by exactly 1 insurance company.business rules for a patient appointment system……According to the information:1 identifies the entities,2 attributes of entities,3cardinality of entities,4 degree of relationship and types of relationship b/w entities.Also table the diagram with suitable words

1.1 How to keep data in synch across regions? 1 point

Question Get Answer 1.Question 1 How to keep data in synch across regions? 1 point Cloud SQLCloud BigtableCloud DatastoreCloud Storage2.Question 2An existing application uses websockets. To help migrate the application to cloud you should:1 pointRedesign the application to use HTTP streaming.Redesign the application to use distributed sessions instead of websockets.Do nothing to the application. HTTP(S) load balancing natively supports websocket proxying.Review websocket encryption requirements with the security team.3.Question 3A company is building an image tagging pipeline. 1 pointCloud DatastoreCloud DataflowCloud Pub/SubCloud Bigtable4.Question 4How to store data to be accessed once a month and not needed after five years.1 pointMulti-regional class, lifecycle policy to delete after 5 years.Multi-regional class, lifecycle policy change to Coldline after 5 years.Nearline class, lifecycle policy change to Coldline after 5 years.Nearline class, lifecycle policy to delete after 5 years.5.Question 5A company has a new IoT pipeline. Which services will make this design work?Select the services that should be used to replace the icons with the number “1” and number “2” in the diagram.1 pointCloud IoT Core, Cloud DatastoreCloud Pub/Sub, Cloud StorageCloud IoT Core, Cloud Pub/SubApp Engine, Cloud IoT Core6.Question 6Multi-petabyte database for analysts that only know SQL and must be available 24 x 7.1 pointCloud StorageCloud SQLBigQueryCloud Datastore7.Question 7Which service completes the CI/CD pipeline?Which service should be used in the icon with the question mark in the diagram?1 pointCloud Pub/SubCloud Container BuilderCloud StorageCloud Dataproc8.Question 8Simply and reliably clone a Linux VM to another project in another region.1 pointUse Linux dd and netcat to stream the root disk to the new VM.Snapshot the root disk and select it for the new VM.Create image from the root disk with Linux dd, create disk from the image, and use it in the new VM.Snapshot the root disk, create image, and use the image for the new VM root disk.9.Question 9A company has this business requirement: “”Improve security by defining and adhering to a set of security and Identity and Access Management (IAM) best practices for cloud.”Company security has locked out SSH access to production VMs. How can operations manage the VMs?1 pointConfigure a VPN to allow SSH access to VMs.Develop a Cloud API application for all operations actions.Grant operations team access to use Cloud Shell.Develop an application that grants temporary SSH access.10.Question 10What security strategy would you recommend for PII (Personally Identifiable Information) data on Cloud Storage?1 pointSigned URL with expiration.Read-only access to users, and default ACL on bucket.No Cloud IAM roles to users, and granular ACLs on bucket.Public access, random names, and share URLs in confidence.11.Question 11A company has decided to use Cloud SDK tools to deploy to App Engine Flexible. Which one of the following requirements does this meet?1 pointRequirement 1: Support failover of the production environment to the cloud during an emergency.Requirement 2: Encrypt data on the wire and at rest.Requirement 3: Use managed services whenever possible.Requirement 4: Identify production services that can migrate to the cloud to save capacity.12.Question 12Which of the following business requirements can Cloud DNS help satisfy?1 pointSupport multiple VPN connections between the production data center and cloud environment.Analyze and optimize architecture for performance in the cloud.Build a reliable and reproducible environment with scaled parity of production.Support failover of the production environment to cloud during an emergency.13.Question 13A company has business requirements to keep up with industry transformation and growth by adopting leading technology and to use “incremental innovation” based on business insights. Which one of the following Google Cloud Platform features will support this requirement?1 pointGoogle has many years of experience with containers.Compute Engine provides automatic discounts with increased usage.Cloud Machine Learning and BigQuery are designed for petabyte scale.Compute Engine bills per minute, saving costs compared to hourly billing.14.Question 14A game company wants to meet its scaling requirements and also provide insights to investors. Which solution will best meet these needs?1 pointImport delayed MySQL game statistics to BigQuery for provisioning analysis and indicator reporting.Use Stackdriver custom metrics for autoscaling and reporting.Autoscale based on CPU load and use Data Studio to share metrics.Autoscale based on network latency as a measure of user experience.15.Question 15A company wants to test a risky update to an App Engine application requiring live traffic. Which of the following options is the best approach?1 pointDeploy as default temporarily, then roll it back.Create separate isolated test project and onboard users.Create second App Engine project, then redirect a subset of users.Deploy a new version, use traffic splitting to test a percentage.16.Question 16How to automatically and simultaneously deploy new code to each cluster?1 pointUse an automation tool, such as Jenkins.Change the clusters to activate federated mode.Use Parallel SSH with Google Cloud Shell and kubectl.Use Container Builder to publish the new images.17.Question 17A microservice has intermittent problems that bursts logs. How can you trap it for live debugging?1 pointLog into machine with microservice and wait for the log messages.Look for error in Stackdriver Error Reporting dashboard.Configure microservice to send traces to Stackdriver Trace.Set a log metric in Stackdriver logging, alert on it past a threshold.18.Question 18A company wants penetration security testing that primarily matches an end user perspective.1 pointNotify Google you are going to run a penetration test.Deploy scanners in the cloud and test from there.Use on prem scanners over VPN.Use on prem scanners over public Internet.19.Question 19A sales company runs weekly resiliency tests of the current build in a separate environment by replaying the last holiday sales load. What can improve resiliency?1 pointApply twice the load to the test.Run the resiliency tests daily instead of weekly.Use preemptible instances.Develop a script that mimics a zone outage and add it to the test.20.Question 20Release failures keep causing rollbacks in a web application. Fixes to QA process reduced rollbacks by 80%. What additional steps can you take?1 pointReplace the platform’s relational database systems with a NoSQL database.Fragment the monolithic platform into microservices.Remove the QA environment. Start executing canary releases.Remove the platform’s dependency on relational database systems.21.Question 21A car reservation system has long-running transactions. Which one of the following deployment methods should be avoided?1 pointExecute canary releases.Perform A/B testing prior to release.Introduce a blue-green deployment model.Introduce a pipeline deployment model.22.Question 22Last week a region had a 1% failure rate in web tier VMs? How should you respond?1 pointMonitor the application for a 5% failure rate.Duplicate the application on prem to compensate for failures in the cloud.Perform a root cause analysis, reviewing cloud provider and deployment details to prevent similar future failures.Halt all development until the application issue can be found and fixed.23.Question 23Why is it a recommended best practice not to assign blame to an individual or an organization?1 pointIt might humiliate them. It would be wrong.Because you might be wrong and you might assign blame to the wrong party.Because it prematurely ends analysis, so you don’t discover root cause in the technology or procedures.Because it can be really hard to find out who is at fault.24.Question 24A healthcare company wants to compliantly use Cloud Storage to store customer medical (HIPAA) data.1 pointCloud Storage is already HIPAA compliant by default.HIPAA compliance is not currently supported for Cloud Storage.Execute a Business Associate Agreement (BAA), but you must still use the service in a HIPAA compliant way.Execute a Business Associate Agreement (BAA).25.Question 25Which network feature could help a company meet its global service expansion goals by reducing latency?1 pointHTTP/TCP load balancingNetwork TCP/UDPCloud RouterCloud Content Delivery Network (CDN)I understand that submitting work that isn’t my own may result in permanent failure of this course or deactivation of my Coursera account. Learn more about Coursera’s Honor Code

Consider an array of 17 entries used to store keys using a hashing

Computer ScienceQuestion Consider an array of 17 entries used to store keys using a hashing mechanism. If the hash function used is h (X) = X mod 17 and the sequence of inserted keys is {3, 32, 54, 66, 67, 83, 16, 100, 17} a) If you use hashing with chaining: i. Draw the resulting array ii. How many items will be probed in order to find the key 100 in the table? iii. How many items will be probed before the algorithm realizes that the element 117 is not in the table? b) If you use hashing with linear probing: i. Draw the resulting array ii. How many items will be probed in order to find the key 100 in the table? iii. How many items will be probed before the algorithm realizes that the element 117 is not in the table? c) If you use hashing with quadratic probing: i. Draw the resulting array ii. How many items will be probed in order to find the key 100 in the table? iii. How many items will be probed before the algorithm realizes that the element 117 is not in the table?

A subsequence is palindromic if it is the same whether read left to

Question A subsequence is palindromic if it is the same whether read left to right or right to left. For instance, the sequence A,C,G,T,G,T,C,A,A,A,A,T,C,G has many palindromic subsequences, including A,C,G,C,A and A, A, A, A (on the other hand, the subsequence A, C , T is not palindromic).Devise an algorithm that takes a sequence x [1, . . . , n] and returns the (length of the) longest palindromic subsequence. Its running time should be O(n2).

Describe the difference between a chained conditional and a nested

Question Get Answer Describe the difference between a chained conditional and a nested conditional. Give your own example of each. Do not copy examples. Deeply nested conditionals can become difficult to read. Describe a strategy for avoiding nested conditionals. Give your own example of a nested conditional that can be modified to become a single conditional, and show the equivalent single conditional.

Describe five vulnerabilities associated with the IT system as described

Question Get Answer Describe five vulnerabilities associated with the IT system as described and before security controls are implemented.(b) Based on possible Threat Actors, briefly describe a risk associated with each of these vulnerabilities; using a scale of 1 – 5, assign a Probability of Occurrence and Consequence of Occurrence to each risk.(c) For each of these risks, identify a feasible risk treatment (risk reduction, transference, avoidance, or acceptance) with a short rationale for each.(d) Assume a risk has been identified resulting from a vulnerability in the system that manages the Patient Information Database. The estimated cost to restore the database if it is entirely lost or corrupted is assessed as $1M, and the economic damage due to patients and doctors moving to other hospitals is estimated to be an additional $1M. Based on published information on cyberattacks in the health care industry, the estimated number of successful attacks based on exploitation of the vulnerability is four (4) per year, and each successful attack is estimated to cost the hospital 5% of the estimated total potential loss. Further assume that a commercial product has been identified that will reduce the loss from a breach by a factor of ten (10) to 0.5% of the total. What is the maximum annual total cost for this product to achieve a positive return on the investment to procure it (i.e., a positive Control Value)?Make assumptions where necessary.

Make a python that implements a dictionary and uses the split function

Question Make a python that implements a dictionary and uses the split function Tutorial on sets and dictionary can be found at : (left side in the Table of Contents 5.4 and 5.5) https://docs.python.org/2/tutorial/datastructures.html#dictionariesTutorial on strings can be found at https://en.wikibooks.org/wiki/Python_Programming/Strings( 5) Ask the user for a string and create the following dictionary: The values are the letters in the string, with the corresponding key being the place in the string, please print the dictionary. For example, if the user entered the string “CSC120” then create the following dictionary d d = {0:’C’, 1:’S’, 2:’C’, 3:’1′, 4:’2′, 5:’0′}( 5) Make the length of the dictionary d using a len function In this case the answer is 6 ( 5) Ask the user for a key(integer). If the key is in the dictionary display the corresponding value. As an example if the user entered 2 display ‘C’ if the user entered a key that was not in the dictionary display “Error key not found”. ( 5) Ask the user for a value (one of the characters in our example). If the value is in the dictionary display “Value found” otherwise display “Value not found”. As an example if the user entered ‘C’ display “Value found” ( 5) Ask the user for a character and add it to the dictionary and display the dictionary. As an example, if the user enters ‘X’ then the key should be the next integer (in this case 6 but in general it should be related to the length of the dictionary ) For this example d = {0:’C’, 1:’S’, 2:’C’, 3:’1′, 4:’2′, 5:’0′, 6:’X’}( 5) Replace the last key: value combination with your last name and display the dictionary. Assuming your last name is Euler d before d = {0: ‘C’,1:’S’, 2:’C’, 3:’1′, 4:’2′, 5:’0′, 6:’X’} d after d = {0: ‘C’,1:’S’, 2:’C’, 3:’1′, 4:’2′, 5:’0′, 6:’Euler’}( 5) Ask the user for a key and delete it and its corresponding value from the dictionary, then display the dictionary. As an example, if the user enters 0 then the key and its value (0: ‘C’) should be deleted from the dictionary If the key is not in the dictionary print ‘key not found’. For this example d = {1:’S’, 2:’C’, 3:’1′, 4:’2′, 5:’0′, 6:’Euler’}( 15) Ask the user for a string of digits, separated by commas. Print out the corresponding values for those digits using the split function. For example if the user enters the string “3, 1, 6” then print out “1SEuler” An issue is how to handle digits that exceed the range of key values, for example, in our case, any digits in the range 1…6 should generate a corresponding value but any digit(s) > 6 OR < 1 has to be handled appropriately – in our case replace the corresponding missing value with '*'. As an example if the user entered 0, 1,2,11,6 (Note 0 and 11 are not keys in d then you should print '*SC*EulerUse the split() function to separate a string into words and the int() to change the string into an integer as follows: s = '6,11,22' # assume user entered this value s = s.split(',') # separate string into words by ,

Essay Writing at Allessays.Online

4.9 rating based on 17,037 ratings

17037 reviews

Review This Service




Rating: