open and close source 2 page double space
User Generated
fnzrw22@lnubb.pbz
Computer Science
Description
Open/Closed Source: Write a 2-page paper defining and comparing open source and closed source operating systems. Provide examples of each.
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
This question has not been answered.
Create a free account to get help with this and any other question!
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
MU New Software Initiative to Compete with Providers Such as Turbo Tax in DMV MEMO
Facts:You are in the new DevOps group at a medium-sized tax preparation firm, TaxSpot, where the organization runs a tax p ...
MU New Software Initiative to Compete with Providers Such as Turbo Tax in DMV MEMO
Facts:You are in the new DevOps group at a medium-sized tax preparation firm, TaxSpot, where the organization runs a tax preparation service. They are planning to make their software online fordirect client input for the next peak tax season (January through April) and want to make sure that they have the resources to successfully support this new initiative and compete with providers such as TurboTax in the DMV (DC, Maryland, Virginia), They are looking to youradvice on delivering the service effectively to support the peak tax season and to be reduced for the off-season as part of the company’s move to DevOps.They anticipate about 2,400 concurrent users on the application each day of the peak season and 1,000 in the off-season. All client data will be preloaded before the application opens.Details of the applicationMain MenuThe application has a secure web interface with a menu allowing the user to log in and create a new filing, copy from a previous filing, update a filing, upload documents, submit to IRS, and file for an extension.Login/AuthenticationConfidentiality is a major consideration and the system will offer two-factor authentication with secure communications. The login component handles all the authentication and access controls for the systemNew Filing20% of the users create a new case when they access the system in the peak season and 10% at other times. Copy from a Previous FilingAbout 20% of the users in peak time and 30% at other times are beginning the process by merely using the application to copy data from their last year’s submission.Update FilingAbout 20% of the users in peak time and 40% at other times are simply updating previously entered or copied information. The component has 4 different services representing each of the different parts of the informationUpload DocumentsAbout 20% of the users in peak time and 14% in other times merely use the application to upload documents necessary to support their primary filings, e.g., additional schedules. The component is a stand-alone application.Submit to IRSAbout 10% of users in peak time and 5% in other time are making a submission to the IRS. The submit system has 3 services: validation, error reporting and the actual submission to IRS. Extension FilingAbout 10% of the users in peak time and 1% in other times use the application to file the required tax extension when they do not have the complete documents ready. The component is a stand-alone application.Part 1: Memo with AttachmentsDraw a component diagram of the application showing for each module the services that are necessary.Prepare a memo to the CIO (Maya Jennings) with a copy to the CFO (Peter Brown) and the CEO (Jennifer Mueller) which details the following:An overview of the application.The value of using a cloud solution when there is such a big variation in usage over the year.The value of using a cloud solution in case the anticipated user base is larger or smaller than anticipated.How DevOps will help support the application as changes in tax rules occur.Note: writing is important, the CIO does not like contractions or elaborate sentences. Your memo should be 1 page.Attach the component diagram. Refer to the attachment in your memo.Part 2: Use Case/User StoriesPrepare individual user stories for the main functions of the TaxSpot system.
6 pages
Discussions
Discussion 1 (Chapter 3): Why are the original/raw data not readily usable by analytics tasks? What are the main data prep ...
Discussions
Discussion 1 (Chapter 3): Why are the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps? List and ...
completed 5 unit
Completed Unit 5 1.) Select three certifications and discuss the type of individual who may be interested in pursuing ...
completed 5 unit
Completed Unit 5 1.) Select three certifications and discuss the type of individual who may be interested in pursuing each one. 2.) Describe the typical duties of a security manager that are strictly managerial and not technical in nature. 3.) Describe the three categories of information security professionals. 4.) Describe the role of due care and due diligence in terms of their role in reducing liability exposure. Requirements: - Learner successfully applied critical thinking to the case study analysis & recommendations/actions taken. - Learner successfully incorporates a minimum of two per question scholarly sources to support their position. (No more than 10% of the entire submission should be from referenced sources. In other words, the references should support the learner’s work not be the bulk of what is written). - Learner met the criteria for academic writing (i.e. no spelling or grammar errors, properly formatted paragraphs, APA formatting used for references, etc.). - Learner met per question 300 word count minimum. One reference can be the reading material that is provided. Whitman, M. E., & Mattord, H. J. (2013). Management of information security (4th ed.). Stamford, CT: Cengage Learning. Please seperate the answers like the questions and place the reference at the end of them.
5 pages
Project Plan Cyber Securiy
a. Select 1 methodology to use for a project plan for this initiative. b. Create a simplified project plan such as the exa ...
Project Plan Cyber Securiy
a. Select 1 methodology to use for a project plan for this initiative. b. Create a simplified project plan such as the examples listed in the ...
CGS 1100 UF Creating and Modifying Tables and Other Database Objects Coding Task
I need someone efficient in Microsoft Access to apply thre instructions to the other worksheet.
CGS 1100 UF Creating and Modifying Tables and Other Database Objects Coding Task
I need someone efficient in Microsoft Access to apply thre instructions to the other worksheet.
Privacy and Corporate Liability
Red Clay’s senior leadership team are reviewing the company's Annual Report, which the CEO will presented at the next qu ...
Privacy and Corporate Liability
Red Clay’s senior leadership team are reviewing the company's Annual Report, which the CEO will presented at the next quarterly shareholder's meeting. That report includes the following risk statement.We could be liable if third-party equipment recommended and installed by us, i.e. voice activated smart home controllers, infringes on the privacy of our residential clients.Research how smart devices sense and record information from the environment around them. For example, an device might be designed to listen and record voice inputs OR it might record other sources of private information about movement, locking / unlocking of doors with dates and times, use of devices, etc.Using your research, write a two-page briefing paper (five to seven paragraphs) that corporate board members can use to explain how the third party equipment could infringe on customer privacy and why the company might be liable for damages if customers experience a loss of privacy. Your target audience is Red Clay Renovation's to shareholders. Provide specific examples of the types of risk events that could occur and the potential impacts (e.g. financial, reputation, client trust, etc.) Your examples should relate to Red Clay and the course case study. Remember, the board members and shareholders are likely non-technical, so make sure your paper can be understood by laymen.Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting.
Similar Content
King Saud University Cybersecurity Policy Discussion
Consider your organization or another organization with which you are familiar. Briefly describe the organization and then...
software engineering For Project 2
all the information just from this link https://www.marymount.edu/PROJECT 2For Project 2, you are going to develop a blue-...
California College-San Diego Alexa on Raspberry Pi Paper
Hi Stellita! How are you doing! 😀I have work I need your help please!I need it done by Monday afternoon please!...
Locate an article or example of a real use case based on this week's lesson. If you can't find an article or use case example make one up. Write a 1-2 summary of the use case and describe how it is similar or different from the use case in the textbook.
Locate an article or example of a real use case based on this week's lesson. If you can't find an article or use case exam...
Campbellsville University Impact of Big Data on Businesses Discussion
find 2-3 recent peer reviewed articles (within the past 3 years) that closely relate to Impact of Big Data on Businesses. ...
Need computer science help with "Disks and Printers"
identify the make and model of one (1) laser printer and one (1) inkjet
printer that are similarly priced. Evaluate the q...
Build A Computer Project.
Assume that cost is not a problem, create your own computer. Think about the hardware and software you prefer to use....
Erm Responses
I highly appreciate your thoughts regarding the application of SRM in “creating opportunities for interaction and risk d...
20200712213018portfolio Milestone Example Study Pool
Big data, as is most popularly known, is an aspect that deals with a vast amount of data. The data...
Related Tags
Book Guides
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
MU New Software Initiative to Compete with Providers Such as Turbo Tax in DMV MEMO
Facts:You are in the new DevOps group at a medium-sized tax preparation firm, TaxSpot, where the organization runs a tax p ...
MU New Software Initiative to Compete with Providers Such as Turbo Tax in DMV MEMO
Facts:You are in the new DevOps group at a medium-sized tax preparation firm, TaxSpot, where the organization runs a tax preparation service. They are planning to make their software online fordirect client input for the next peak tax season (January through April) and want to make sure that they have the resources to successfully support this new initiative and compete with providers such as TurboTax in the DMV (DC, Maryland, Virginia), They are looking to youradvice on delivering the service effectively to support the peak tax season and to be reduced for the off-season as part of the company’s move to DevOps.They anticipate about 2,400 concurrent users on the application each day of the peak season and 1,000 in the off-season. All client data will be preloaded before the application opens.Details of the applicationMain MenuThe application has a secure web interface with a menu allowing the user to log in and create a new filing, copy from a previous filing, update a filing, upload documents, submit to IRS, and file for an extension.Login/AuthenticationConfidentiality is a major consideration and the system will offer two-factor authentication with secure communications. The login component handles all the authentication and access controls for the systemNew Filing20% of the users create a new case when they access the system in the peak season and 10% at other times. Copy from a Previous FilingAbout 20% of the users in peak time and 30% at other times are beginning the process by merely using the application to copy data from their last year’s submission.Update FilingAbout 20% of the users in peak time and 40% at other times are simply updating previously entered or copied information. The component has 4 different services representing each of the different parts of the informationUpload DocumentsAbout 20% of the users in peak time and 14% in other times merely use the application to upload documents necessary to support their primary filings, e.g., additional schedules. The component is a stand-alone application.Submit to IRSAbout 10% of users in peak time and 5% in other time are making a submission to the IRS. The submit system has 3 services: validation, error reporting and the actual submission to IRS. Extension FilingAbout 10% of the users in peak time and 1% in other times use the application to file the required tax extension when they do not have the complete documents ready. The component is a stand-alone application.Part 1: Memo with AttachmentsDraw a component diagram of the application showing for each module the services that are necessary.Prepare a memo to the CIO (Maya Jennings) with a copy to the CFO (Peter Brown) and the CEO (Jennifer Mueller) which details the following:An overview of the application.The value of using a cloud solution when there is such a big variation in usage over the year.The value of using a cloud solution in case the anticipated user base is larger or smaller than anticipated.How DevOps will help support the application as changes in tax rules occur.Note: writing is important, the CIO does not like contractions or elaborate sentences. Your memo should be 1 page.Attach the component diagram. Refer to the attachment in your memo.Part 2: Use Case/User StoriesPrepare individual user stories for the main functions of the TaxSpot system.
6 pages
Discussions
Discussion 1 (Chapter 3): Why are the original/raw data not readily usable by analytics tasks? What are the main data prep ...
Discussions
Discussion 1 (Chapter 3): Why are the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps? List and ...
completed 5 unit
Completed Unit 5 1.) Select three certifications and discuss the type of individual who may be interested in pursuing ...
completed 5 unit
Completed Unit 5 1.) Select three certifications and discuss the type of individual who may be interested in pursuing each one. 2.) Describe the typical duties of a security manager that are strictly managerial and not technical in nature. 3.) Describe the three categories of information security professionals. 4.) Describe the role of due care and due diligence in terms of their role in reducing liability exposure. Requirements: - Learner successfully applied critical thinking to the case study analysis & recommendations/actions taken. - Learner successfully incorporates a minimum of two per question scholarly sources to support their position. (No more than 10% of the entire submission should be from referenced sources. In other words, the references should support the learner’s work not be the bulk of what is written). - Learner met the criteria for academic writing (i.e. no spelling or grammar errors, properly formatted paragraphs, APA formatting used for references, etc.). - Learner met per question 300 word count minimum. One reference can be the reading material that is provided. Whitman, M. E., & Mattord, H. J. (2013). Management of information security (4th ed.). Stamford, CT: Cengage Learning. Please seperate the answers like the questions and place the reference at the end of them.
5 pages
Project Plan Cyber Securiy
a. Select 1 methodology to use for a project plan for this initiative. b. Create a simplified project plan such as the exa ...
Project Plan Cyber Securiy
a. Select 1 methodology to use for a project plan for this initiative. b. Create a simplified project plan such as the examples listed in the ...
CGS 1100 UF Creating and Modifying Tables and Other Database Objects Coding Task
I need someone efficient in Microsoft Access to apply thre instructions to the other worksheet.
CGS 1100 UF Creating and Modifying Tables and Other Database Objects Coding Task
I need someone efficient in Microsoft Access to apply thre instructions to the other worksheet.
Privacy and Corporate Liability
Red Clay’s senior leadership team are reviewing the company's Annual Report, which the CEO will presented at the next qu ...
Privacy and Corporate Liability
Red Clay’s senior leadership team are reviewing the company's Annual Report, which the CEO will presented at the next quarterly shareholder's meeting. That report includes the following risk statement.We could be liable if third-party equipment recommended and installed by us, i.e. voice activated smart home controllers, infringes on the privacy of our residential clients.Research how smart devices sense and record information from the environment around them. For example, an device might be designed to listen and record voice inputs OR it might record other sources of private information about movement, locking / unlocking of doors with dates and times, use of devices, etc.Using your research, write a two-page briefing paper (five to seven paragraphs) that corporate board members can use to explain how the third party equipment could infringe on customer privacy and why the company might be liable for damages if customers experience a loss of privacy. Your target audience is Red Clay Renovation's to shareholders. Provide specific examples of the types of risk events that could occur and the potential impacts (e.g. financial, reputation, client trust, etc.) Your examples should relate to Red Clay and the course case study. Remember, the board members and shareholders are likely non-technical, so make sure your paper can be understood by laymen.Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting.
Earn money selling
your Study Documents