SlideShare a Scribd company logo
1 of 28
IT 600 Final Project Milestone Two Template: Analytical
Organizational Profile
Directions: Insert your answers directly in the Student Analysis
column below by doing the following:
· In each of the “Tech Description” fields, describe the GPOS
feature using relevant technical terms and topic-related details.
· In each of the “Business Requirement” fields, describe (in
business terms) how the absence of this GPOS feature impacts a
business such as TSI.
Note: Consider the work you did for Milestone One as you
populate the table.
GPOS Feature
Profile Criteria
Student Analysis
Multiprogramming
Tech Description
Business Requirement
Multiprocessing
Tech Description
Business Requirement
Multithreading
Tech Description
Business Requirement
Virtual Memory
Tech Description
Business Requirement
System Call Interface
Tech Description
Business Requirement
Security
Tech Description
Business Requirement
Device Drivers
Tech Description
Business Requirement
Fault Tolerance
Tech Description
Business Requirement
IT 600 Final Project Guidelines and Rubric
Overview
IT professionals are often called upon to make decisions,
provide recommendations, and perform analyses that require an
in-depth understanding
of the inner workings of an operating system. This summative
assessment will provide students with the knowledge and skills
required to achieve
and maintain this level of understanding throughout their
careers. For the summative assessment, students will perform a
technical evaluation of
an operating system. Students will be offered a choice of
operating systems to analyze. Students will use real-time and
log-based tools, empirical
observation, and scholarly research to analyze the core
subsystems of the operating system. For each subsystem,
students will research and
describe the technology used in that subsystem and compare it
to other available technologies. For the final report, students
will assess the results
of their analyses and perform an overall evaluation of the
operating system, with recommendations for how it might be
improved.
For the summative assessment you will perform an in-depth
technical evaluation of an operating system. The evaluation will
be made in terms of
the ability of the system and its supporting hardware to meet a
set of organizational needs and technical requirements. The
organization is a global
enterprise that provides premium technical support to other
enterprise businesses.
Management will use your evaluation as one element among
several in their assessment of options for future technology
adoption. You will define
the technical requirements, based on tasks performed by the
organization, the applications used, system loads, security,
system management,
maintenance, and performance. The scope of the evaluation will
include analyses and assessments of the hardware-software
interface, the
techniques used to implement processes and threads, the file
systems supported by the operating system, the input/output
subsystem, and the
operating system security features. You will use these analyses
and assessments to produce a comprehensive evaluation, which
will be written in
the form of a detailed technology review.
SNHU will provide tools to support analysis of some commonly
used operating systems, but you may select another operating
system if you have
the resources to do so. There will also be several milestones
throughout the course that will allow you to develop the
evaluation incrementally.
The project is divided into three milestones, which will be
submitted at various points throughout the course to scaffold
learning and ensure quality
final submissions. These milestones will be submitted in
Modules Two, Three, and Seven. Your final report will be
submitted in Module Nine.
Prompt
Your technical evaluation of an operating system should include
analyses and assessments of the hardware-software interface,
the techniques used
to implement processes and threads, the file systems supported
by the operating system, the I/O subsystem, and the operating
system security
features. You will use these analyses and assessments to
produce a comprehensive evaluation, which will be written in
the form of a detailed
technology review.
Specifically, the following critical elements must be addressed:
I. Organizational Needs and Requirements
A. Develop an organizational profile that analyzes the tasks
performed by the organization, the computer applications in use
or
expected to be in use, and the estimated system loads
anticipated for the operating system.
B. What are the organizational, security, and performance and
reliability requirements related to operating system function,
management, and maintenance?
II. Computer Architecture
A. What hardware is required to host the operating system? This
should include an identification of the minimal hardware
required
and an assessment of what would be needed to support
organizational needs and requirements.
B. Analyze the architecture in terms of support and
functionality of process management, memory management, I/O,
and mass
storage.
C. Analyze the architectural support for multiprocessor systems
and assess the organization, connection, and control aspects.
What are
some architectural issues that might arise regarding
technologies used in multiprocessor systems and how would you
recommend
utilizing multiprocessor systems in light of these issues?
III. Process Management
A. Assess the operating system process management in terms of
its responsiveness to organizational requirements. Use process
monitoring tools to gather data for your assessment.
B. Assess software tools for thread analysis and deadlock
detection that are available for the operating system. What
strategies does
the operating system provide for handling deadlocks?
C. What support does the operating system provide for
multiprocessing? Assess the applicability and ability of the
operating system to
allocate tasks between multiple processors.
IV. Memory Management
A. Describe how the types of memory supported by the
operating system are used. What memory abstraction does the
system use?
Use an analysis tool to investigate the mapping to physical
memory.
B. Describe the system support for virtual memory, memory
paging, and segmentation. Use a monitoring tool to assess their
activity
under heavily loaded conditions.
C. Assess the techniques used for memory management policy
and mechanism separation and their utility in managing
complexity.
V. I/O and Mass Storage
A. Describe the hardware-software interface for I/O
management used by the operating system. Various techniques
are used for
enabling the operating system to communicate with devices.
What techniques are supported and what are their advantages
and
disadvantages?
B. Analyze the file systems supported by the operating system.
Use file system performance tests to assess the available file
systems.
C. What is the relationship between scheduled process context
switching and I/O interrupt handling? Analyze the use of device
interrupts in the operating system and compare them to other
possible approaches to input/output.
VI. Security
A. What formal security model does the system support?
Analyze the system to determine what support it provides for
implementing
security models and assess the relevant tools and services made
available to administrators.
B. Recommend techniques and best practices to further support
security of the operating system.
VII. Overall Evaluation: Using the defined requirements,
analyses, and assessments, develop a comprehensive detailed
technology
recommendation. Include an integrated assessment of the
operating system’s capability to support organizational needs
and technical
requirements.
Milestones
Milestone One: Situation Analysis
In Module Two, you will conduct a situational analysis. You
will write a short paper that describes the business-related
challenges faced by the
organization. This milestone will be graded with the Milestone
One Rubric.
Milestone Two: Analytical Organizational Profile
In Module Three, you will conduct an analytical organizational
profile. Your work will be completed in the Milestone Two
Template document. This
milestone will be graded with the Milestone Two Rubric.
Milestone Three: Full Organizational Profile
In Module Seven, you will complete a full organizational
profile. Your work will be completed in the Milestone Three
Template document. This
milestone will be graded with the Milestone Three Rubric.
Final Submission: Technical Evaluation of an Operating System
In Module Nine, you will consider the questions below and
make revisions to the document you submitted for Milestone
Three. With your
Milestone Three document in front of you, consider the
following and make revisions as necessary:
a) Have you incorporated all of the feedback and suggestions
you received from your instructor?
b) Does your submission address all of the critical elements
outlined above?
c) Does the operating system you selected match the specific
requirements your organization identified?
d) Do you have title and references pages?
e) Is your submission at least 15 pages of content not including
title and reference pages?
f) Have you supported each of your positions with a credible
source?
g) Have you properly cited your sources and made proper
attribution for any copyrighted graphics or photos?
h) Does your submission make a clearly stated recommendation
for an operating system?
Your final submission should be a polished artifact containing
all of the critical elements of the final project. It should reflect
the incorporation of
feedback gained throughout the course. This submission will be
graded using the Final Project Rubric (below).
Deliverables
Milestone Deliverable Module Due Grading
One Situation Analysis Two Graded separately; Milestone One
Rubric
Two Analytical Organizational Profile Three Graded separately;
Milestone Two Rubric
Three Full Organizational Profile Seven Graded separately;
Milestone Three Rubric
Final Submission: Technical Evaluation
of an Operating System
Nine Graded separately; Final Project Rubric
Final Project Rubric
Guidelines for Submission: Your report should be 15 pages
double-spaced paper or the completed template provided in
Milestone Three,
professionally written, with necessary citations in APA format
and any accompanying visuals or additional artifacts submitted
as part of an
appendix section.
Instructor Feedback: This activity uses an integrated rubric in
Blackboard. Students can view instructor feedback in the Grade
Center. For more
information, review these instructions.
Critical Elements Exemplary (100%) Proficient (90%) Needs
Improvement (70%) Not Evident (0%) Value
Organizational
Profile
Meets “Proficient” criteria and
organizational profile shows keen
insight into organizational needs
and requirements
Develops an accurate and detailed
organizational profile that
analyzes the tasks performed by
the organization, the computer
applications in use or expected to
be in use, and the estimated
system loads
Develops an organizational profile
that analyzes the tasks performed
by the organization, the computer
applications in use or expected to
be in use, and the estimated
system loads, but with gaps in
accuracy or details
Does not develop an
organizational profile that
analyzes the tasks performed by
the organization, the computer
applications in use or expected to
be in use, and the estimated
system loads
5.75
Function,
Management, and
Maintenance
Meets “Proficient” criteria and
draws insightful conclusions or
inferences about the implications
of the requirements for the
operating system
Fully describes the organizational,
security, performance, and
reliability requirements as they
relate to operating system
function, management, and
maintenance
Describes the organizational,
security, performance, and
reliability requirements as they
relate to operating system
function, management, and
maintenance, but with gaps in
details
Does not describe the
organizational, security,
performance, and reliability
requirements as they relate to
operating system function,
management, and maintenance
5.75
Hardware
Meets “Proficient” criteria and
draws insightful conclusions or
inferences about the implications
of the requirements for the
hardware
Accurately explains the hardware
required to support the operating
system, and assesses the
hardware needed to support
organizational needs and
requirements
Explains the hardware required to
support the operating system, and
assesses the hardware needed to
support organizational needs and
requirements, but with gaps in
accuracy or details
Does not explain the hardware
required to support the operating
system
5.75
Support and
Functionality
Meets “Proficient” criteria and
analysis shows keen insight into
the significance of the
architecture for process
management, memory
management, I/O, and mass
storage
Accurately analyzes the
architecture in terms of support
and functionality of process
management, memory
management, I/O, and mass
storage
Analyzes the architecture in terms
of support and functionality of
process management, memory
management, I/O, and mass
storage, but analysis is inaccurate
or lacking detail
Does not analyze the architecture
in terms of support and
functionality of process
management, memory
management, I/O, and mass
storage
5.75
http://snhu-
media.snhu.edu/files/production_documentation/formatting/rubr
ic_feedback_instructions_student.pdf
Architectural Issues
Meets “Proficient” criteria and
analysis shows keen insight into
the significance of the
architecture multiprocessor
systems
Accurately analyzes the
architectural support for
multiprocessor systems and
assesses the organization,
connection, and control aspects of
the system
Analyzes the architectural support
for multiprocessor systems and
assesses aspects of the system,
but with gaps in accuracy or
details
Does not analyze the architectural
support for multiprocessor
systems
5.75
Responsiveness to
Organizational
Requirements
Meets “Proficient” criteria and
draws insightful conclusions or
inferences about the value of
process management in terms of
its responsiveness to
organizational requirements
Assesses operating system
process management in terms of
its responsiveness to
organizational requirements,
using process monitoring tools to
gather data
Assesses operating system
process management but the
assessment lacks detail or the use
of process monitoring tools is not
evident
Does not assess operating system
process management
5.75
Software Tools
Meets “Proficient” criteria and
shows keen insight into the
significance of deadlocks and
related problems and the tools
and techniques used in detection,
recovery, avoidance, and
prevention
Assesses software tools for thread
analysis and deadlock detection
available for the operating system
and explains associated strategies
Assesses software tools for thread
analysis and deadlock detection
available for the operating system
and explains associated strategies,
but with gaps in detail or accuracy
Does not assess software tools for
thread analysis and deadlock
detection available for the
operating system and explain
associated strategies
5.75
Support
Meets “Proficient” criteria and
evidences keen insight into the
technology of multiprocessing and
its applicability in organizational
needs and requirements
Accurately assesses the
applicability and ability of the
operating system to allocate tasks
between multiple processors
Assesses the applicability and
ability of the operating system to
allocate tasks between multiple
processors, but with gaps in
accuracy, analysis, or detail
Does not assess the applicability
and ability of the operating
system to allocate tasks between
multiple processors
5.75
Memory
Abstraction
Meets “Proficient” criteria and
shows keen insight into the
significance of the memory
abstraction for system utility
Accurately describes how the
types of memory supported by
the operating systems function
based on analysis
Describes how the types of
memory supported by the
operating systems function but
with gaps in detail or accuracy
Does not describe how the types
of memory supported by the
operating systems function
5.75
Assess Activity
Meets “Proficient” criteria and
shows keen insight into the
advantages and disadvantages of
memory management
technologies
Assesses the system support for
virtual memory, memory paging,
and segmentation
Assesses the system support for
virtual memory, memory paging,
and segmentation, but the
assessment lacks accuracy or
detail
Does not assess the system
support for virtual memory,
memory paging, and
segmentation
5.75
Techniques
Meets “Proficient” criteria and
shows keen insight into how
separation of policy from
mechanism can serve as a general
principle for reducing complexity
Assesses the techniques used for
memory management policy and
mechanism separation for their
utility in managing complexity
Assesses the techniques used for
memory management policy and
mechanism for their utility in
managing complexity, but some
techniques are omitted or the
assessment lacks accuracy
Does not assess the techniques
used for memory management
policy and mechanism separation
for their utility in managing
complexity
5.75
Hardware-Software
Interface
Meets “Proficient” criteria and
draws insightful conclusions or
inferences about I/O techniques
across the full range of devices
and I/O subsystems
Fully describes the hardware-
software interface for I/O
management used by the
operating system
Describes the hardware-software
interface for I/O management,
but lacks detail or accuracy of
explanation around the role of the
operating system in controlling
the computer’s I/O
Does not describe the hardware-
software interface for I/O
management
5.75
File Systems
Meets “Proficient” criteria and
draws insightful conclusions or
inferences about the performance
of the file systems supported by
the operating system
Analyzes the file systems
supported by the operating
system, including an assessment
of file system performance
Analyzes the file systems
supported by the operating
system, but the analysis is
incomplete or inaccurate
Does not analyze the file systems
supported by the operating
system
5.75
Context Switching
and I/O Interrupt
Handling
Meets “Proficient” criteria and
demonstrates clearly the
applicability of context switching
and I/O interrupt handling
technologies
Accurately and comprehensively
analyzes the relationship between
scheduled process context
switching and I/O interrupt
handling and compares to other
approaches
Analyzes the relationship between
scheduled process context
switching and I/O interrupt
handling and compares to other
approaches, but the analysis is
incomplete or inaccurate
Does not analyze the relationship
between scheduled process
context switching and I/O
interrupt handling or compare to
other approaches
5.75
Security Model
Meets “Proficient” criteria and
evidences keen insight into the
value of formal security models
Concisely analyzes the system to
determine the formal security
model the system supports
Analyzes the system to determine
the formal security model the
system supports, but with gaps in
detail or accuracy
Does not analyze the system to
determine the formal security
model the system supports
5.75
Recommended
Techniques
Meets “Proficient” criteria and
evidences keen insight into the
effect recommended techniques
and best practices would have on
further supporting security of the
operating system
Recommends techniques and best
practices to further support
security of the operating system
Recommends techniques and best
practices, but the
recommendations are not
applicable to the operating
system or would not logically
support security
Does not recommend techniques
and best practices for supporting
the operating system
5.75
Overall Evaluation
Meets “Proficient” criteria and
evidences keen insight into the
value of the recommendations
and their feasibility
Develops a comprehensive,
integrated technology
recommendation for the case
based on the analyses,
assessments, and defined
requirements
Develops a technology
recommendation for the case, but
is not comprehensive or not
based on the analyses,
assessments, and defined
requirements
Does not develop a technology
recommendation for the case
5.75
Articulation of
Response
Submission is free of errors
related to citations, grammar,
spelling, syntax, and organization
and is presented in a professional
and easy-to-read format
Submission has no major errors
related to citations, grammar,
spelling, syntax, or organization
Submission has major errors
related to citations, grammar,
spelling, syntax, or organization
that negatively impact readability
and articulation of main ideas
Submission has critical errors
related to citations, grammar,
spelling, syntax, or organization
that prevent understanding of
ideas
2.25
Earned Total 100%
Running head: TSI OS SUPPORT FOR GPOS FEATURES
TSI OS SUPPORT FOR GPOS FEATURES
4
TSI OS Support for GPOS features
Tyrone Armstrong
Professor Farooq Afzool
Southern New Hampshire University
Operating Systems
01/03/2015
Looking at the current challenges facing I&M bank you
will understand the need for developing a new operating system
which will be in a position of addressing them to help the back
from being declared insolvent as a result of the fraudulent
activities facing them. The organization lacks the capacity to
control their issues related to the threats. Several customers
have brought their complaints (Fred, 2006).
The current operating system the company relies on has
simple encryption which makes it easier for the hackers to
sneak in and alter the statements and other vital data which
affects the financial position of the bank. The system lacks the
tracking trail which can help to show which data have been
changed. In this case the operating system they are looking for
should be in a position of making sure the data stored are
temper proof and no one can make any alterations to the data
has their must bean authentication allowing the changes with
valid reasons and within the consent of the management (Fred,
2006).
For example, looking at the report by the financial fraud
action UK, they have reported that, firms within British fraud
have increased by 59% which translates to £35.9 within a period
of six months. According to these reports, vishing fraud has
become one of the most common fraud taking places. In this
case the operating system they are looking forward to bring into
place will have inbuilt features which will help n controlling
penetrations of the hackers and to make sure they curve the
menace and rescue the bank from being closed down when they
are declared insolvent form these malicious activities (Green,
2006).
In a banking industry, the best operating system will be
required to make sure they have in place what they require for
running their activities. As much we have based it on security,
multi processing is a very important feature which the TSI OS
will be required to poses. The system will be required to make
sure they have delivered the right results to the management and
make sure there is efficient flow of operations without any
interruptions of the overall performance of the banking process.
When running, the OS will be required to have good virtual
memory to avoid restarts while in use. This will help in making
sure any intruders are identified easily and correct actions are
taken to make sure they do make any changes (Green, 2006).
Referring to the menace of attacks the back has
experienced over time, system call interface will be very
important as they will help in making sure no one gets access to
the data and they are able to communicate while running the
program. This OS will be effective in making sure they improve
their operations and makes sure they don’t fall prey of these
hackers.
On the other hand, a good operating system needs to have
track map which helps in making trails of what they are
searching. In this case, administrator will be looking to know
what factors are affecting them and what they need to do so that
they can have results of what has been searched most. These
trails are used to show the usage of the operating system and
what needs to be changed to make sure the efficiency is
maintained.
As I conclude, this operating system will be used to makes
sure attain the intended results and help the firms from the
attacks and safe guard the customers data and other important
details regarding their benefits of choosing that bank as one of
their choice (Fred, 2006). Covering these details in depth will
constitute to a well developed research paper which will address
all the intended materials.
References
Fred C. (2006) Frauds, Spies, and Lies – and How to Defeat
Them. ISBN 1-878109-36-7 (2006). ASP Press.
Green, P. (2006). Lying, Cheating, and Stealing: A Moral
Theory of White Collar Crime. Oxford University Press, 2006

More Related Content

Similar to IT 600 Final Project Milestone Two Template Analytical Organi.docx

Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...shyaminfo30
 
75629 Topic prevention measures for vulneranbilitiesNumber of.docx
75629 Topic prevention measures for vulneranbilitiesNumber of.docx75629 Topic prevention measures for vulneranbilitiesNumber of.docx
75629 Topic prevention measures for vulneranbilitiesNumber of.docxsleeperharwell
 
lake city institute of technology
lake city institute of technology lake city institute of technology
lake city institute of technology RaviKalola786
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and designRobinsonObura
 
IT 510 Final Project Guidelines and Rubric Overview The final projec.docx
IT 510 Final Project Guidelines and Rubric Overview The final projec.docxIT 510 Final Project Guidelines and Rubric Overview The final projec.docx
IT 510 Final Project Guidelines and Rubric Overview The final projec.docxcareyshaunda
 
Hospital E-Token Management(outdoor)
Hospital E-Token Management(outdoor)Hospital E-Token Management(outdoor)
Hospital E-Token Management(outdoor)ANISUR RAHMAN
 
86One of the fi rst activities of an analyst is to determi.docx
86One of the fi rst activities of an analyst is to determi.docx86One of the fi rst activities of an analyst is to determi.docx
86One of the fi rst activities of an analyst is to determi.docxransayo
 
IT 510 Final Project Guidelines and Rubric Overview .docx
IT 510 Final Project Guidelines and Rubric  Overview .docxIT 510 Final Project Guidelines and Rubric  Overview .docx
IT 510 Final Project Guidelines and Rubric Overview .docxvrickens
 
System Development Life_IntroductionCycle.pdf
System Development Life_IntroductionCycle.pdfSystem Development Life_IntroductionCycle.pdf
System Development Life_IntroductionCycle.pdfpncitechnologies
 
System Analysis and Design Project documentation
System Analysis and Design Project documentationSystem Analysis and Design Project documentation
System Analysis and Design Project documentationMAHERMOHAMED27
 
Report on SOFTWARE DEVELOPMENT LIFE CYCLE SDLC
Report on SOFTWARE DEVELOPMENT LIFE CYCLE SDLC Report on SOFTWARE DEVELOPMENT LIFE CYCLE SDLC
Report on SOFTWARE DEVELOPMENT LIFE CYCLE SDLC Neetu Marwah
 
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...eyavagal
 
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...uopassignment
 
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...uopassignment
 
Data Flow Diagram (DFD) TipsProcesses VerbsDataflows N.docx
Data Flow Diagram (DFD) TipsProcesses VerbsDataflows N.docxData Flow Diagram (DFD) TipsProcesses VerbsDataflows N.docx
Data Flow Diagram (DFD) TipsProcesses VerbsDataflows N.docxwhittemorelucilla
 

Similar to IT 600 Final Project Milestone Two Template Analytical Organi.docx (20)

Sdlc
SdlcSdlc
Sdlc
 
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
 
Sdlc1
Sdlc1Sdlc1
Sdlc1
 
75629 Topic prevention measures for vulneranbilitiesNumber of.docx
75629 Topic prevention measures for vulneranbilitiesNumber of.docx75629 Topic prevention measures for vulneranbilitiesNumber of.docx
75629 Topic prevention measures for vulneranbilitiesNumber of.docx
 
lake city institute of technology
lake city institute of technology lake city institute of technology
lake city institute of technology
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and design
 
IT 510 Final Project Guidelines and Rubric Overview The final projec.docx
IT 510 Final Project Guidelines and Rubric Overview The final projec.docxIT 510 Final Project Guidelines and Rubric Overview The final projec.docx
IT 510 Final Project Guidelines and Rubric Overview The final projec.docx
 
Hospital E-Token Management(outdoor)
Hospital E-Token Management(outdoor)Hospital E-Token Management(outdoor)
Hospital E-Token Management(outdoor)
 
86One of the fi rst activities of an analyst is to determi.docx
86One of the fi rst activities of an analyst is to determi.docx86One of the fi rst activities of an analyst is to determi.docx
86One of the fi rst activities of an analyst is to determi.docx
 
IT 510 Final Project Guidelines and Rubric Overview .docx
IT 510 Final Project Guidelines and Rubric  Overview .docxIT 510 Final Project Guidelines and Rubric  Overview .docx
IT 510 Final Project Guidelines and Rubric Overview .docx
 
System Development Life_IntroductionCycle.pdf
System Development Life_IntroductionCycle.pdfSystem Development Life_IntroductionCycle.pdf
System Development Life_IntroductionCycle.pdf
 
Software Engineering
Software EngineeringSoftware Engineering
Software Engineering
 
0.3 aim phases_and_documentations
0.3 aim phases_and_documentations0.3 aim phases_and_documentations
0.3 aim phases_and_documentations
 
System Analysis and Design Project documentation
System Analysis and Design Project documentationSystem Analysis and Design Project documentation
System Analysis and Design Project documentation
 
Report on SOFTWARE DEVELOPMENT LIFE CYCLE SDLC
Report on SOFTWARE DEVELOPMENT LIFE CYCLE SDLC Report on SOFTWARE DEVELOPMENT LIFE CYCLE SDLC
Report on SOFTWARE DEVELOPMENT LIFE CYCLE SDLC
 
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
 
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
 
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
 
IFSM 461 Entire Course NEW
IFSM 461 Entire Course NEWIFSM 461 Entire Course NEW
IFSM 461 Entire Course NEW
 
Data Flow Diagram (DFD) TipsProcesses VerbsDataflows N.docx
Data Flow Diagram (DFD) TipsProcesses VerbsDataflows N.docxData Flow Diagram (DFD) TipsProcesses VerbsDataflows N.docx
Data Flow Diagram (DFD) TipsProcesses VerbsDataflows N.docx
 

More from priestmanmable

9©iStockphotoThinkstockPlanning for Material and Reso.docx
9©iStockphotoThinkstockPlanning for Material and Reso.docx9©iStockphotoThinkstockPlanning for Material and Reso.docx
9©iStockphotoThinkstockPlanning for Material and Reso.docxpriestmanmable
 
a 12 page paper on how individuals of color would be a more dominant.docx
a 12 page paper on how individuals of color would be a more dominant.docxa 12 page paper on how individuals of color would be a more dominant.docx
a 12 page paper on how individuals of color would be a more dominant.docxpriestmanmable
 
978-1-5386-6589-318$31.00 ©2018 IEEE COSO Framework for .docx
978-1-5386-6589-318$31.00 ©2018 IEEE COSO Framework for .docx978-1-5386-6589-318$31.00 ©2018 IEEE COSO Framework for .docx
978-1-5386-6589-318$31.00 ©2018 IEEE COSO Framework for .docxpriestmanmable
 
92 Academic Journal Article Critique  Help with Journal Ar.docx
92 Academic Journal Article Critique  Help with Journal Ar.docx92 Academic Journal Article Critique  Help with Journal Ar.docx
92 Academic Journal Article Critique  Help with Journal Ar.docxpriestmanmable
 
A ) Society perspective90 year old female, Mrs. Ruth, from h.docx
A ) Society perspective90 year old female, Mrs. Ruth, from h.docxA ) Society perspective90 year old female, Mrs. Ruth, from h.docx
A ) Society perspective90 year old female, Mrs. Ruth, from h.docxpriestmanmable
 
9 dissuasion question Bartol, C. R., & Bartol, A. M. (2017)..docx
9 dissuasion question Bartol, C. R., & Bartol, A. M. (2017)..docx9 dissuasion question Bartol, C. R., & Bartol, A. M. (2017)..docx
9 dissuasion question Bartol, C. R., & Bartol, A. M. (2017)..docxpriestmanmable
 
9 AssignmentAssignment Typologies of Sexual AssaultsT.docx
9 AssignmentAssignment Typologies of Sexual AssaultsT.docx9 AssignmentAssignment Typologies of Sexual AssaultsT.docx
9 AssignmentAssignment Typologies of Sexual AssaultsT.docxpriestmanmable
 
9 0 0 0 09 7 8 0 1 3 4 4 7 7 4 0 4ISBN-13 978-0-13-44.docx
9 0 0 0 09 7 8 0 1 3 4 4 7 7 4 0 4ISBN-13 978-0-13-44.docx9 0 0 0 09 7 8 0 1 3 4 4 7 7 4 0 4ISBN-13 978-0-13-44.docx
9 0 0 0 09 7 8 0 1 3 4 4 7 7 4 0 4ISBN-13 978-0-13-44.docxpriestmanmable
 
900 BritishJournalofNursing,2013,Vol22,No15©2.docx
900 BritishJournalofNursing,2013,Vol22,No15©2.docx900 BritishJournalofNursing,2013,Vol22,No15©2.docx
900 BritishJournalofNursing,2013,Vol22,No15©2.docxpriestmanmable
 
9 Augustine Confessions (selections) Augustine of Hi.docx
9 Augustine Confessions (selections) Augustine of Hi.docx9 Augustine Confessions (selections) Augustine of Hi.docx
9 Augustine Confessions (selections) Augustine of Hi.docxpriestmanmable
 
8.3 Intercultural CommunicationLearning Objectives1. Define in.docx
8.3 Intercultural CommunicationLearning Objectives1. Define in.docx8.3 Intercultural CommunicationLearning Objectives1. Define in.docx
8.3 Intercultural CommunicationLearning Objectives1. Define in.docxpriestmanmable
 
8413 906 AMLife in a Toxic Country - NYTimes.comPage 1 .docx
8413 906 AMLife in a Toxic Country - NYTimes.comPage 1 .docx8413 906 AMLife in a Toxic Country - NYTimes.comPage 1 .docx
8413 906 AMLife in a Toxic Country - NYTimes.comPage 1 .docxpriestmanmable
 
8. A 2 x 2 Experimental Design - Quality and Economy (x1 and x2.docx
8. A 2 x 2 Experimental Design - Quality and Economy (x1 and x2.docx8. A 2 x 2 Experimental Design - Quality and Economy (x1 and x2.docx
8. A 2 x 2 Experimental Design - Quality and Economy (x1 and x2.docxpriestmanmable
 
800 Words 42-year-old man presents to ED with 2-day history .docx
800 Words 42-year-old man presents to ED with 2-day history .docx800 Words 42-year-old man presents to ED with 2-day history .docx
800 Words 42-year-old man presents to ED with 2-day history .docxpriestmanmable
 
8.1 What Is Corporate StrategyLO 8-1Define corporate strategy.docx
8.1 What Is Corporate StrategyLO 8-1Define corporate strategy.docx8.1 What Is Corporate StrategyLO 8-1Define corporate strategy.docx
8.1 What Is Corporate StrategyLO 8-1Define corporate strategy.docxpriestmanmable
 
8.0 RESEARCH METHODS These guidelines address postgr.docx
8.0  RESEARCH METHODS  These guidelines address postgr.docx8.0  RESEARCH METHODS  These guidelines address postgr.docx
8.0 RESEARCH METHODS These guidelines address postgr.docxpriestmanmable
 
95People of AppalachianHeritageChapter 5KATHLEEN.docx
95People of AppalachianHeritageChapter 5KATHLEEN.docx95People of AppalachianHeritageChapter 5KATHLEEN.docx
95People of AppalachianHeritageChapter 5KATHLEEN.docxpriestmanmable
 
9 781292 041452ISBN 978-1-29204-145-2Forensic Science.docx
9 781292 041452ISBN 978-1-29204-145-2Forensic Science.docx9 781292 041452ISBN 978-1-29204-145-2Forensic Science.docx
9 781292 041452ISBN 978-1-29204-145-2Forensic Science.docxpriestmanmable
 
8-10 slide Powerpoint The example company is Tesla.Instructions.docx
8-10 slide Powerpoint The example company is Tesla.Instructions.docx8-10 slide Powerpoint The example company is Tesla.Instructions.docx
8-10 slide Powerpoint The example company is Tesla.Instructions.docxpriestmanmable
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docxpriestmanmable
 

More from priestmanmable (20)

9©iStockphotoThinkstockPlanning for Material and Reso.docx
9©iStockphotoThinkstockPlanning for Material and Reso.docx9©iStockphotoThinkstockPlanning for Material and Reso.docx
9©iStockphotoThinkstockPlanning for Material and Reso.docx
 
a 12 page paper on how individuals of color would be a more dominant.docx
a 12 page paper on how individuals of color would be a more dominant.docxa 12 page paper on how individuals of color would be a more dominant.docx
a 12 page paper on how individuals of color would be a more dominant.docx
 
978-1-5386-6589-318$31.00 ©2018 IEEE COSO Framework for .docx
978-1-5386-6589-318$31.00 ©2018 IEEE COSO Framework for .docx978-1-5386-6589-318$31.00 ©2018 IEEE COSO Framework for .docx
978-1-5386-6589-318$31.00 ©2018 IEEE COSO Framework for .docx
 
92 Academic Journal Article Critique  Help with Journal Ar.docx
92 Academic Journal Article Critique  Help with Journal Ar.docx92 Academic Journal Article Critique  Help with Journal Ar.docx
92 Academic Journal Article Critique  Help with Journal Ar.docx
 
A ) Society perspective90 year old female, Mrs. Ruth, from h.docx
A ) Society perspective90 year old female, Mrs. Ruth, from h.docxA ) Society perspective90 year old female, Mrs. Ruth, from h.docx
A ) Society perspective90 year old female, Mrs. Ruth, from h.docx
 
9 dissuasion question Bartol, C. R., & Bartol, A. M. (2017)..docx
9 dissuasion question Bartol, C. R., & Bartol, A. M. (2017)..docx9 dissuasion question Bartol, C. R., & Bartol, A. M. (2017)..docx
9 dissuasion question Bartol, C. R., & Bartol, A. M. (2017)..docx
 
9 AssignmentAssignment Typologies of Sexual AssaultsT.docx
9 AssignmentAssignment Typologies of Sexual AssaultsT.docx9 AssignmentAssignment Typologies of Sexual AssaultsT.docx
9 AssignmentAssignment Typologies of Sexual AssaultsT.docx
 
9 0 0 0 09 7 8 0 1 3 4 4 7 7 4 0 4ISBN-13 978-0-13-44.docx
9 0 0 0 09 7 8 0 1 3 4 4 7 7 4 0 4ISBN-13 978-0-13-44.docx9 0 0 0 09 7 8 0 1 3 4 4 7 7 4 0 4ISBN-13 978-0-13-44.docx
9 0 0 0 09 7 8 0 1 3 4 4 7 7 4 0 4ISBN-13 978-0-13-44.docx
 
900 BritishJournalofNursing,2013,Vol22,No15©2.docx
900 BritishJournalofNursing,2013,Vol22,No15©2.docx900 BritishJournalofNursing,2013,Vol22,No15©2.docx
900 BritishJournalofNursing,2013,Vol22,No15©2.docx
 
9 Augustine Confessions (selections) Augustine of Hi.docx
9 Augustine Confessions (selections) Augustine of Hi.docx9 Augustine Confessions (selections) Augustine of Hi.docx
9 Augustine Confessions (selections) Augustine of Hi.docx
 
8.3 Intercultural CommunicationLearning Objectives1. Define in.docx
8.3 Intercultural CommunicationLearning Objectives1. Define in.docx8.3 Intercultural CommunicationLearning Objectives1. Define in.docx
8.3 Intercultural CommunicationLearning Objectives1. Define in.docx
 
8413 906 AMLife in a Toxic Country - NYTimes.comPage 1 .docx
8413 906 AMLife in a Toxic Country - NYTimes.comPage 1 .docx8413 906 AMLife in a Toxic Country - NYTimes.comPage 1 .docx
8413 906 AMLife in a Toxic Country - NYTimes.comPage 1 .docx
 
8. A 2 x 2 Experimental Design - Quality and Economy (x1 and x2.docx
8. A 2 x 2 Experimental Design - Quality and Economy (x1 and x2.docx8. A 2 x 2 Experimental Design - Quality and Economy (x1 and x2.docx
8. A 2 x 2 Experimental Design - Quality and Economy (x1 and x2.docx
 
800 Words 42-year-old man presents to ED with 2-day history .docx
800 Words 42-year-old man presents to ED with 2-day history .docx800 Words 42-year-old man presents to ED with 2-day history .docx
800 Words 42-year-old man presents to ED with 2-day history .docx
 
8.1 What Is Corporate StrategyLO 8-1Define corporate strategy.docx
8.1 What Is Corporate StrategyLO 8-1Define corporate strategy.docx8.1 What Is Corporate StrategyLO 8-1Define corporate strategy.docx
8.1 What Is Corporate StrategyLO 8-1Define corporate strategy.docx
 
8.0 RESEARCH METHODS These guidelines address postgr.docx
8.0  RESEARCH METHODS  These guidelines address postgr.docx8.0  RESEARCH METHODS  These guidelines address postgr.docx
8.0 RESEARCH METHODS These guidelines address postgr.docx
 
95People of AppalachianHeritageChapter 5KATHLEEN.docx
95People of AppalachianHeritageChapter 5KATHLEEN.docx95People of AppalachianHeritageChapter 5KATHLEEN.docx
95People of AppalachianHeritageChapter 5KATHLEEN.docx
 
9 781292 041452ISBN 978-1-29204-145-2Forensic Science.docx
9 781292 041452ISBN 978-1-29204-145-2Forensic Science.docx9 781292 041452ISBN 978-1-29204-145-2Forensic Science.docx
9 781292 041452ISBN 978-1-29204-145-2Forensic Science.docx
 
8-10 slide Powerpoint The example company is Tesla.Instructions.docx
8-10 slide Powerpoint The example company is Tesla.Instructions.docx8-10 slide Powerpoint The example company is Tesla.Instructions.docx
8-10 slide Powerpoint The example company is Tesla.Instructions.docx
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docx
 

Recently uploaded

Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Recently uploaded (20)

Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

IT 600 Final Project Milestone Two Template Analytical Organi.docx

  • 1. IT 600 Final Project Milestone Two Template: Analytical Organizational Profile Directions: Insert your answers directly in the Student Analysis column below by doing the following: · In each of the “Tech Description” fields, describe the GPOS feature using relevant technical terms and topic-related details. · In each of the “Business Requirement” fields, describe (in business terms) how the absence of this GPOS feature impacts a business such as TSI. Note: Consider the work you did for Milestone One as you populate the table. GPOS Feature Profile Criteria Student Analysis Multiprogramming Tech Description Business Requirement Multiprocessing Tech Description Business Requirement Multithreading Tech Description
  • 2. Business Requirement Virtual Memory Tech Description Business Requirement System Call Interface Tech Description Business Requirement Security Tech Description Business Requirement Device Drivers Tech Description Business Requirement Fault Tolerance Tech Description Business Requirement
  • 3. IT 600 Final Project Guidelines and Rubric Overview IT professionals are often called upon to make decisions, provide recommendations, and perform analyses that require an in-depth understanding of the inner workings of an operating system. This summative assessment will provide students with the knowledge and skills required to achieve and maintain this level of understanding throughout their careers. For the summative assessment, students will perform a technical evaluation of an operating system. Students will be offered a choice of operating systems to analyze. Students will use real-time and log-based tools, empirical observation, and scholarly research to analyze the core subsystems of the operating system. For each subsystem, students will research and describe the technology used in that subsystem and compare it to other available technologies. For the final report, students will assess the results of their analyses and perform an overall evaluation of the operating system, with recommendations for how it might be improved. For the summative assessment you will perform an in-depth technical evaluation of an operating system. The evaluation will be made in terms of the ability of the system and its supporting hardware to meet a set of organizational needs and technical requirements. The organization is a global enterprise that provides premium technical support to other enterprise businesses.
  • 4. Management will use your evaluation as one element among several in their assessment of options for future technology adoption. You will define the technical requirements, based on tasks performed by the organization, the applications used, system loads, security, system management, maintenance, and performance. The scope of the evaluation will include analyses and assessments of the hardware-software interface, the techniques used to implement processes and threads, the file systems supported by the operating system, the input/output subsystem, and the operating system security features. You will use these analyses and assessments to produce a comprehensive evaluation, which will be written in the form of a detailed technology review. SNHU will provide tools to support analysis of some commonly used operating systems, but you may select another operating system if you have the resources to do so. There will also be several milestones throughout the course that will allow you to develop the evaluation incrementally. The project is divided into three milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final submissions. These milestones will be submitted in Modules Two, Three, and Seven. Your final report will be submitted in Module Nine. Prompt Your technical evaluation of an operating system should include analyses and assessments of the hardware-software interface, the techniques used
  • 5. to implement processes and threads, the file systems supported by the operating system, the I/O subsystem, and the operating system security features. You will use these analyses and assessments to produce a comprehensive evaluation, which will be written in the form of a detailed technology review. Specifically, the following critical elements must be addressed: I. Organizational Needs and Requirements A. Develop an organizational profile that analyzes the tasks performed by the organization, the computer applications in use or expected to be in use, and the estimated system loads anticipated for the operating system. B. What are the organizational, security, and performance and reliability requirements related to operating system function, management, and maintenance? II. Computer Architecture A. What hardware is required to host the operating system? This should include an identification of the minimal hardware required and an assessment of what would be needed to support organizational needs and requirements. B. Analyze the architecture in terms of support and
  • 6. functionality of process management, memory management, I/O, and mass storage. C. Analyze the architectural support for multiprocessor systems and assess the organization, connection, and control aspects. What are some architectural issues that might arise regarding technologies used in multiprocessor systems and how would you recommend utilizing multiprocessor systems in light of these issues? III. Process Management A. Assess the operating system process management in terms of its responsiveness to organizational requirements. Use process monitoring tools to gather data for your assessment. B. Assess software tools for thread analysis and deadlock detection that are available for the operating system. What strategies does the operating system provide for handling deadlocks? C. What support does the operating system provide for multiprocessing? Assess the applicability and ability of the operating system to allocate tasks between multiple processors. IV. Memory Management A. Describe how the types of memory supported by the operating system are used. What memory abstraction does the system use?
  • 7. Use an analysis tool to investigate the mapping to physical memory. B. Describe the system support for virtual memory, memory paging, and segmentation. Use a monitoring tool to assess their activity under heavily loaded conditions. C. Assess the techniques used for memory management policy and mechanism separation and their utility in managing complexity. V. I/O and Mass Storage A. Describe the hardware-software interface for I/O management used by the operating system. Various techniques are used for enabling the operating system to communicate with devices. What techniques are supported and what are their advantages and disadvantages? B. Analyze the file systems supported by the operating system. Use file system performance tests to assess the available file systems. C. What is the relationship between scheduled process context switching and I/O interrupt handling? Analyze the use of device interrupts in the operating system and compare them to other possible approaches to input/output. VI. Security A. What formal security model does the system support?
  • 8. Analyze the system to determine what support it provides for implementing security models and assess the relevant tools and services made available to administrators. B. Recommend techniques and best practices to further support security of the operating system. VII. Overall Evaluation: Using the defined requirements, analyses, and assessments, develop a comprehensive detailed technology recommendation. Include an integrated assessment of the operating system’s capability to support organizational needs and technical requirements. Milestones Milestone One: Situation Analysis In Module Two, you will conduct a situational analysis. You will write a short paper that describes the business-related challenges faced by the organization. This milestone will be graded with the Milestone One Rubric. Milestone Two: Analytical Organizational Profile In Module Three, you will conduct an analytical organizational profile. Your work will be completed in the Milestone Two Template document. This milestone will be graded with the Milestone Two Rubric. Milestone Three: Full Organizational Profile In Module Seven, you will complete a full organizational profile. Your work will be completed in the Milestone Three
  • 9. Template document. This milestone will be graded with the Milestone Three Rubric. Final Submission: Technical Evaluation of an Operating System In Module Nine, you will consider the questions below and make revisions to the document you submitted for Milestone Three. With your Milestone Three document in front of you, consider the following and make revisions as necessary: a) Have you incorporated all of the feedback and suggestions you received from your instructor? b) Does your submission address all of the critical elements outlined above? c) Does the operating system you selected match the specific requirements your organization identified? d) Do you have title and references pages? e) Is your submission at least 15 pages of content not including title and reference pages? f) Have you supported each of your positions with a credible source? g) Have you properly cited your sources and made proper attribution for any copyrighted graphics or photos? h) Does your submission make a clearly stated recommendation for an operating system? Your final submission should be a polished artifact containing all of the critical elements of the final project. It should reflect the incorporation of feedback gained throughout the course. This submission will be graded using the Final Project Rubric (below).
  • 10. Deliverables Milestone Deliverable Module Due Grading One Situation Analysis Two Graded separately; Milestone One Rubric Two Analytical Organizational Profile Three Graded separately; Milestone Two Rubric Three Full Organizational Profile Seven Graded separately; Milestone Three Rubric Final Submission: Technical Evaluation of an Operating System Nine Graded separately; Final Project Rubric Final Project Rubric Guidelines for Submission: Your report should be 15 pages double-spaced paper or the completed template provided in Milestone Three, professionally written, with necessary citations in APA format and any accompanying visuals or additional artifacts submitted as part of an appendix section. Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade
  • 11. Center. For more information, review these instructions. Critical Elements Exemplary (100%) Proficient (90%) Needs Improvement (70%) Not Evident (0%) Value Organizational Profile Meets “Proficient” criteria and organizational profile shows keen insight into organizational needs and requirements Develops an accurate and detailed organizational profile that analyzes the tasks performed by the organization, the computer applications in use or expected to be in use, and the estimated system loads Develops an organizational profile that analyzes the tasks performed by the organization, the computer applications in use or expected to be in use, and the estimated system loads, but with gaps in accuracy or details Does not develop an organizational profile that analyzes the tasks performed by the organization, the computer
  • 12. applications in use or expected to be in use, and the estimated system loads 5.75 Function, Management, and Maintenance Meets “Proficient” criteria and draws insightful conclusions or inferences about the implications of the requirements for the operating system Fully describes the organizational, security, performance, and reliability requirements as they relate to operating system function, management, and maintenance Describes the organizational, security, performance, and reliability requirements as they relate to operating system function, management, and maintenance, but with gaps in details Does not describe the organizational, security, performance, and reliability
  • 13. requirements as they relate to operating system function, management, and maintenance 5.75 Hardware Meets “Proficient” criteria and draws insightful conclusions or inferences about the implications of the requirements for the hardware Accurately explains the hardware required to support the operating system, and assesses the hardware needed to support organizational needs and requirements Explains the hardware required to support the operating system, and assesses the hardware needed to support organizational needs and requirements, but with gaps in accuracy or details Does not explain the hardware required to support the operating system 5.75 Support and
  • 14. Functionality Meets “Proficient” criteria and analysis shows keen insight into the significance of the architecture for process management, memory management, I/O, and mass storage Accurately analyzes the architecture in terms of support and functionality of process management, memory management, I/O, and mass storage Analyzes the architecture in terms of support and functionality of process management, memory management, I/O, and mass storage, but analysis is inaccurate or lacking detail Does not analyze the architecture in terms of support and functionality of process management, memory management, I/O, and mass storage 5.75 http://snhu- media.snhu.edu/files/production_documentation/formatting/rubr
  • 15. ic_feedback_instructions_student.pdf Architectural Issues Meets “Proficient” criteria and analysis shows keen insight into the significance of the architecture multiprocessor systems Accurately analyzes the architectural support for multiprocessor systems and assesses the organization, connection, and control aspects of the system Analyzes the architectural support for multiprocessor systems and assesses aspects of the system, but with gaps in accuracy or details Does not analyze the architectural support for multiprocessor systems 5.75 Responsiveness to Organizational Requirements
  • 16. Meets “Proficient” criteria and draws insightful conclusions or inferences about the value of process management in terms of its responsiveness to organizational requirements Assesses operating system process management in terms of its responsiveness to organizational requirements, using process monitoring tools to gather data Assesses operating system process management but the assessment lacks detail or the use of process monitoring tools is not evident Does not assess operating system process management 5.75 Software Tools Meets “Proficient” criteria and shows keen insight into the significance of deadlocks and related problems and the tools and techniques used in detection, recovery, avoidance, and prevention
  • 17. Assesses software tools for thread analysis and deadlock detection available for the operating system and explains associated strategies Assesses software tools for thread analysis and deadlock detection available for the operating system and explains associated strategies, but with gaps in detail or accuracy Does not assess software tools for thread analysis and deadlock detection available for the operating system and explain associated strategies 5.75 Support Meets “Proficient” criteria and evidences keen insight into the technology of multiprocessing and its applicability in organizational needs and requirements Accurately assesses the applicability and ability of the operating system to allocate tasks between multiple processors Assesses the applicability and ability of the operating system to
  • 18. allocate tasks between multiple processors, but with gaps in accuracy, analysis, or detail Does not assess the applicability and ability of the operating system to allocate tasks between multiple processors 5.75 Memory Abstraction Meets “Proficient” criteria and shows keen insight into the significance of the memory abstraction for system utility Accurately describes how the types of memory supported by the operating systems function based on analysis Describes how the types of memory supported by the operating systems function but with gaps in detail or accuracy Does not describe how the types of memory supported by the operating systems function 5.75
  • 19. Assess Activity Meets “Proficient” criteria and shows keen insight into the advantages and disadvantages of memory management technologies Assesses the system support for virtual memory, memory paging, and segmentation Assesses the system support for virtual memory, memory paging, and segmentation, but the assessment lacks accuracy or detail Does not assess the system support for virtual memory, memory paging, and segmentation 5.75 Techniques Meets “Proficient” criteria and shows keen insight into how separation of policy from mechanism can serve as a general principle for reducing complexity Assesses the techniques used for
  • 20. memory management policy and mechanism separation for their utility in managing complexity Assesses the techniques used for memory management policy and mechanism for their utility in managing complexity, but some techniques are omitted or the assessment lacks accuracy Does not assess the techniques used for memory management policy and mechanism separation for their utility in managing complexity 5.75 Hardware-Software Interface Meets “Proficient” criteria and draws insightful conclusions or inferences about I/O techniques across the full range of devices and I/O subsystems Fully describes the hardware- software interface for I/O management used by the
  • 21. operating system Describes the hardware-software interface for I/O management, but lacks detail or accuracy of explanation around the role of the operating system in controlling the computer’s I/O Does not describe the hardware- software interface for I/O management 5.75 File Systems Meets “Proficient” criteria and draws insightful conclusions or inferences about the performance of the file systems supported by the operating system Analyzes the file systems supported by the operating system, including an assessment of file system performance Analyzes the file systems supported by the operating system, but the analysis is incomplete or inaccurate Does not analyze the file systems supported by the operating
  • 22. system 5.75 Context Switching and I/O Interrupt Handling Meets “Proficient” criteria and demonstrates clearly the applicability of context switching and I/O interrupt handling technologies Accurately and comprehensively analyzes the relationship between scheduled process context switching and I/O interrupt handling and compares to other approaches Analyzes the relationship between scheduled process context switching and I/O interrupt handling and compares to other approaches, but the analysis is incomplete or inaccurate Does not analyze the relationship between scheduled process context switching and I/O interrupt handling or compare to other approaches
  • 23. 5.75 Security Model Meets “Proficient” criteria and evidences keen insight into the value of formal security models Concisely analyzes the system to determine the formal security model the system supports Analyzes the system to determine the formal security model the system supports, but with gaps in detail or accuracy Does not analyze the system to determine the formal security model the system supports 5.75 Recommended Techniques Meets “Proficient” criteria and evidences keen insight into the effect recommended techniques and best practices would have on further supporting security of the operating system Recommends techniques and best
  • 24. practices to further support security of the operating system Recommends techniques and best practices, but the recommendations are not applicable to the operating system or would not logically support security Does not recommend techniques and best practices for supporting the operating system 5.75 Overall Evaluation Meets “Proficient” criteria and evidences keen insight into the value of the recommendations and their feasibility Develops a comprehensive, integrated technology recommendation for the case based on the analyses, assessments, and defined requirements Develops a technology recommendation for the case, but is not comprehensive or not based on the analyses, assessments, and defined
  • 25. requirements Does not develop a technology recommendation for the case 5.75 Articulation of Response Submission is free of errors related to citations, grammar, spelling, syntax, and organization and is presented in a professional and easy-to-read format Submission has no major errors related to citations, grammar, spelling, syntax, or organization Submission has major errors related to citations, grammar, spelling, syntax, or organization that negatively impact readability and articulation of main ideas Submission has critical errors related to citations, grammar, spelling, syntax, or organization that prevent understanding of ideas 2.25 Earned Total 100%
  • 26. Running head: TSI OS SUPPORT FOR GPOS FEATURES TSI OS SUPPORT FOR GPOS FEATURES 4 TSI OS Support for GPOS features Tyrone Armstrong Professor Farooq Afzool Southern New Hampshire University Operating Systems 01/03/2015 Looking at the current challenges facing I&M bank you will understand the need for developing a new operating system which will be in a position of addressing them to help the back from being declared insolvent as a result of the fraudulent activities facing them. The organization lacks the capacity to control their issues related to the threats. Several customers have brought their complaints (Fred, 2006). The current operating system the company relies on has simple encryption which makes it easier for the hackers to sneak in and alter the statements and other vital data which affects the financial position of the bank. The system lacks the tracking trail which can help to show which data have been changed. In this case the operating system they are looking for
  • 27. should be in a position of making sure the data stored are temper proof and no one can make any alterations to the data has their must bean authentication allowing the changes with valid reasons and within the consent of the management (Fred, 2006). For example, looking at the report by the financial fraud action UK, they have reported that, firms within British fraud have increased by 59% which translates to £35.9 within a period of six months. According to these reports, vishing fraud has become one of the most common fraud taking places. In this case the operating system they are looking forward to bring into place will have inbuilt features which will help n controlling penetrations of the hackers and to make sure they curve the menace and rescue the bank from being closed down when they are declared insolvent form these malicious activities (Green, 2006). In a banking industry, the best operating system will be required to make sure they have in place what they require for running their activities. As much we have based it on security, multi processing is a very important feature which the TSI OS will be required to poses. The system will be required to make sure they have delivered the right results to the management and make sure there is efficient flow of operations without any interruptions of the overall performance of the banking process. When running, the OS will be required to have good virtual memory to avoid restarts while in use. This will help in making sure any intruders are identified easily and correct actions are taken to make sure they do make any changes (Green, 2006). Referring to the menace of attacks the back has experienced over time, system call interface will be very important as they will help in making sure no one gets access to the data and they are able to communicate while running the program. This OS will be effective in making sure they improve their operations and makes sure they don’t fall prey of these hackers. On the other hand, a good operating system needs to have
  • 28. track map which helps in making trails of what they are searching. In this case, administrator will be looking to know what factors are affecting them and what they need to do so that they can have results of what has been searched most. These trails are used to show the usage of the operating system and what needs to be changed to make sure the efficiency is maintained. As I conclude, this operating system will be used to makes sure attain the intended results and help the firms from the attacks and safe guard the customers data and other important details regarding their benefits of choosing that bank as one of their choice (Fred, 2006). Covering these details in depth will constitute to a well developed research paper which will address all the intended materials. References Fred C. (2006) Frauds, Spies, and Lies – and How to Defeat Them. ISBN 1-878109-36-7 (2006). ASP Press. Green, P. (2006). Lying, Cheating, and Stealing: A Moral Theory of White Collar Crime. Oxford University Press, 2006