SlideShare a Scribd company logo
1 of 37
IT 600 Final Project Guidelines and Rubric
Overview
IT professionals are often called upon to make decisions,
provide recommendations, and perform analyses that require an
in -depth understanding
of the inner workings of an operating system. This summative
assessment will provide students with the knowledge and skills
required to achieve
and maintain this level of understanding throughout their
careers. For the summative assessment, students will perform a
tech nical evaluation of
an operating system. Students will be offered a choice of
operating systems to analyze. Students will use real -time and
log-based tools, empirical
observation, and scholarly research to analyze the core
subsystems of the operating system. For each subsystem,
students will research and
describe the technology used in that subsystem and compare it
to other available technologies. For the final report, students
will assess the results
of their analyses and perform an overall evaluation of the
operating system, with recommendati ons for how it might be
improved.
For the summative assessment you will perform an in-depth
technical evaluation of an operating system. The evaluation will
be made in terms of
the ability of the system and its supporting hardware to meet a
set of organi zational needs and technical requirements. The
organization is a global
enterprise that provides premium technical support to other
enterprise businesses.
Management will use your evaluation as one element among
several in their assessment of options for future technology
adoption. You will define
the technical requirements, based on tasks performed by the
organization, the applications used, system loads, security,
system management,
maintenance, and performance. The scope of the evaluation will
include analyses and assessments of the hardware-software
interface, the
techniques used to implement processes and threads, the file
systems supported by the operating system, the input/output
subsystem, and the
operating system security features. You will use these analyses
and assessments to produce a comprehensive evaluation, which
will be written in
the form of a detailed technology review.
SNHU will provide tools to support analysis of some commonly
used operating systems, but you may select another operati ng
system if you have
the resources to do so. There will also be several milestones
throughout the course that will allow you to develop the evalua
tion incrementally.
The project is divided into three milestones, which will be
submitted at various points throughout the course to scaffold
learning and ensure quality
final submissions. These milestones will be submitted in
Modules Two, Three, and Seven. Your final report will be
submitted in Module Nine.
Prompt
Your technical evaluation of an operating system should include
analyses and assessments of the hardware-software interface,
the techniques used
to implement processes and threads, the file systems supported
by the operating system, the I/O subsystem, and the operating
system security
features. You will use these analyses and assessments to
produce a comprehensive evaluation, which will be written in
the form of a detai led
technology review.
Specifically, the following critical elements must be addressed:
I. Organizational Needs and Requirements
A. Develop an organizational profile that analyzes the tasks
performed by the organization, the computer applications in use
or
expected to be in use, and the estimated system loads
anticipated for the operating system.
B. What are the organizational, security, and performance and
reliability requirements related to operating system function,
management, and maintenance?
II. Computer Architecture
A. What hardware is required to host the operating system? This
should include an identification of the minimal hardware
required
and an assessment of what would be needed to support
organizational needs and requirements.
B. Analyze the architecture in terms of support and
functionality of process management, memory management, I/O,
and mas s
storage.
C. Analyze the architectural support for multiprocessor systems
and assess the organization, connection, and control aspects.
What are
some architectural issues that might arise regarding
technologies used in multiprocessor systems and how would you
recommend
utilizing multiprocessor systems in light of these issues?
III. Process Management
A. Assess the operating system process management in terms of
its responsiveness to organizational requirements. Use process
monitoring tools to gather data for your assessment.
B. Assess software tools for thread analysis and deadlock
detection that are available for the operating system. What
strategies does
the operating system provide for handling deadlocks?
C. What support does the operating system provide for
multiprocessing? Assess the applicability and ability of the
operating system to
allocate tasks between multiple processors.
IV. Memory Management
A. Describe how the types of memory supported by the
operating system are used. What memory abstraction does the
system use?
Use an analysis tool to investigate the mapping to physical
memory.
B. Describe the system support for virtual memory, memory
paging, and segmentation. Use a monitoring tool to assess their
activity
under heavily loaded conditions.
C. Assess the techniques used for memory management policy
and mechanism separation and their utility in managing
complexity.
V. I/O and Mass Storage
A. Describe the hardware-software interface for I/O
management used by the operating system. Various techniques
are used for
enabling the operating system to communicate with devices.
What techniques are supported and what are their advantages
and
disadvantages?
B. Analyze the file systems supported by the operating system.
Use file system performance tests to assess the available file sys
tems.
C. What is the relationship between scheduled process context
switching and I/O interrupt handling? Analyze the use of device
interrupts in the operating system and compare them to other
possible approaches to input/output.
VI. Security
A. What formal security model does the system support?
Analyze the system to determine what support it provides for
implementing
security models and assess the relevant tools and services made
available to administrators.
B. Recommend techniques and best practices to further support
security of the operating system.
VII. Overall Evaluation: Using the defined requirements,
analyses, and assessments, develop a comprehensive detailed
technology
recommendation. Include an integrated assessment of the
operating system’s capability to support organizational needs
and technical
requirements.
Milestones
Milestone One: Situation Analysis
In Module Two, you will conduct a situational analysis. You
will write a short paper that describes the business -related
challenges faced by the
organization. This milestone will be graded with the Milestone
One Rubric.
Milestone Two: Analytical Organizational Profile
In Module Three, you will conduct an analytical organizational
profile. Your work will be completed in the Milestone Two
Template document. This
milestone will be graded with the Milestone Two Rubric.
Milestone Three: Full Organizational Profile
In Module Seven, you will complete a full organizational
profile. Your work will be completed in the Milestone Three
Template document. This
milestone will be graded with the Milestone Three Rubric.
Final Submission: Technical Evaluation of an Operating System
In Module Nine, you will consider the questions below and
make revisions to the document you submitted for Milestone
Three. With your
Milestone Three document in front of you, consider the
following and make revisions as necessary:
a) Have you incorporated all of the feedback and suggestions
you received from your instructor?
b) Does your submission address all of the critical elements
outlined above?
c) Does the operating system you selected match the specific
requirements your organization identified?
d) Do you have title and references pages?
e) Is your submission at least 15 pages of content not including
title and reference pages?
f) Have you supported each of your positions with a credible
source?
g) Have you properly cited your sources and made proper
attribution for any copyrighted graphics or photos?
h) Does your submission make a clearly stated recommendation
for an operating system?
Your final submission should be a polished artifact containing
all of the critical elements of the final project. It should reflect
the incorporation of
feedback gained throughout the course. This submission will be
graded using the Final Project Rubric (below).
Deliverables
Milestone Deliverable Module Due Grading
One Situation Analysis Two Graded separately; Milestone One
Rubric
Two Analytical Organizational Profile Three Graded separately;
Milestone Two Rubric
Three Full Organizational Profile Seven Graded separately;
Milestone Three Rubric
Final Submission: Technical Evaluation
of an Operating System
Nine Graded separately; Final Project Rubric
Final Project Rubric
Guidelines for Submission: Your report should be 15 pages
double-spaced paper or the completed template provided in
Milestone Three,
professionally written, with necessary citations in APA format
and any accompanying visuals or additional artifacts submitted
as part of an
appendix section.
Critical Elements Exemplary (100%) Proficient (90%) Needs
Improvement (70%) Not Evident (0%) Value
Organizational
Profile
[IT-600-06]
Meets “Profi ci ent” cri teri a and
organi zati onal profi le s hows keen
i ns i ght i nto organi zati onal needs
and requi rements
Devel ops an accurate and detai l ed
organi zati onal profi le that
anal yzes the tas ks performed by
the organi zati on, the computer
appl i cations i n us e or expected to
be i n us e, and the es ti mated
s ys tem l oads
Devel ops an organi zati onal profi le
that anal yzes the tas ks performed
by the organi zati on, the computer
appl i cations i n us e or expected to
be i n us e, and the es ti mated
s ys tem l oads , but wi th gaps i n
accuracy or detai l s
Does not devel op an
organi zati onal profi le that
anal yzes the tas ks performed by
the organi zati on, the computer
appl i cations i n us e or expected to
be i n us e, and the es ti mated
s ys tem l oads
5.75
Function,
Management, and
Maintenance
[IT-600-06]
Meets “Profi ci ent” cri teri a and
draws i ns i ghtful conclus ions or
i nferences about the i mpl i cations
of the requi rements for the
operati ng s ys tem
Ful l y des cri bes the organi zati onal,
s ecuri ty, performance, and
rel i abi lity requi rements as they
rel ate to operati ng s ys tem
functi on, management, and
mai ntenance
Des cri bes the organi zati onal ,
s ecuri ty, performance, and
rel i abi lity requi rements as they
rel ate to operati ng s ys tem
functi on, management, and
mai ntenance, but wi th gaps i n
detai l s
Does not des cri be the
organi zati onal, s ecuri ty,
performance, and rel i abi lity
requi rements as they rel ate to
operati ng s ys tem functi on,
management, and mai ntenance
5.75
Hardware
[IT-600-01]
Meets “Profi ci ent” cri teri a and
draws i ns i ghtful conclus ions or
i nferences about the i mpl i cations
of the requi rements for the
hardware
Accuratel y expl ai ns the hardware
requi red to s upport the operati ng
s ys tem, and as s es s es the
hardware needed to s upport
organi zati onal needs and
requi rements
Expl ai ns the hardware requi red to
s upport the operati ng s ys tem, and
as s es s es the hardware needed to
s upport organi zati onal needs and
requi rements , but wi th gaps i n
accuracy or detai l s
Does not expl ai n the hardware
requi red to s upport the operati ng
s ys tem
5.75
Support and
Functionality
[IT-600-01]
Meets “Profi ci ent” cri teri a and
anal ys is s hows keen i ns i ght i nto
the s i gni fi cance of the
archi tecture for proces s
management, memory
management, I/O, and mas s
s torage
Accuratel y anal yzes the
archi tecture i n terms of s upport
and functi onal i ty of proces s
management, memory
management, I/O, and mas s
s torage
Anal yzes the archi tecture i n terms
of s upport and functi onal i ty of
proces s management, memory
management, I/O, and mas s
s torage, but anal ys is i s i naccurate
or l acki ng detai l
Does not anal yze the archi tecture
i n terms of s upport and
functi onal i ty of proces s
management, memory
management, I/O, and mas s
s torage
5.75
Architectural Issues
[IT-600-05]
Meets “Profi ci ent” cri teri a and
anal ys is s hows keen i ns i ght i nto
the s i gni fi cance of the
archi tecture mul ti proces s or
s ys tems
Accuratel y anal yzes the
archi tectural s upport for
mul ti proces s or s ys tems and
as s es s es the organi zati on,
connecti on, and control as pects of
the s ys tem
Anal yzes the archi tectural s upport
for mul ti proces s or s ys tems and
as s es s es aspects of the s ys tem,
but wi th gaps i n accuracy or
detai l s
Does not anal yze the archi tectural
s upport for mul ti proces s or
s ys tems
5.75
Responsiveness to
Organizational
Requirements
[IT-600-02]
Meets “Profi ci ent” cri teri a and
draws i ns i ghtful conclus ions or
i nferences about the val ue of
proces s management i n terms of
i ts res pons i venes s to
organi zati onal requi rements
As s es s es operati ng s ys tem
proces s management i n terms of
i ts res pons i venes s to
organi zati onal requi rements ,
us i ng proces s moni tori ng tool s to
gather data
As s es s es operati ng s ys tem
proces s management but the
as s es s ment l acks detai l or the us e
of proces s moni tori ng tool s i s not
evi dent
Does not as s es s operati ng s ys tem
proces s management
5.75
Software Tools
[IT-600-02]
Meets “Profi ci ent” cri teri a and
s hows keen i ns i ght i nto the
s i gni fi cance of deadl ocks and
rel ated probl ems and the tool s
and techni ques us ed i n detecti on,
recovery, avoi dance, and
preventi on
As s es s es s oftware tool s for thread
anal ys is and deadl ock detecti on
avai l able for the operati ng s ys tem
and expl ai ns as sociated s trategi es
As s es s es s oftware tool s for thread
anal ys is and deadl ock detecti on
avai l able for the operati ng s ys tem
and expl ai ns as sociated s trategi es,
but wi th gaps i n detai l or accuracy
Does not as s es s s oftware tool s for
thread anal ys is and deadl ock
detecti on avai l able for the
operati ng s ys tem and expl ai n
as s oci ated s trategi es
5.75
Support
[IT-600-05]
Meets “Profi ci ent” cri teri a and
evi dences keen i ns i ght i nto the
technol ogy of mul ti proces s i ng and
i ts appl i cabili ty i n organi zati onal
needs and requi rements
Accuratel y as s es s es the
appl i cability and abi lity of the
operati ng s ys tem to al l ocate tas ks
between mul ti pl e proces s ors
As s es s es the appl i cability and
abi l i ty of the operati ng s ys tem to
al l ocate tas ks between mul ti pl e
proces s ors , but wi th gaps i n
accuracy, anal ysis, or detai l
Does not as s es s the appl i cability
and abi l i ty of the operati ng
s ys tem to al l ocate tas ks between
mul ti pl e proces s ors
5.75
Memory
Abstraction
[IT-600-03]
Meets “Profi ci ent” cri teri a and
s hows keen i ns i ght i nto the
s i gni fi cance of the memory
abs tracti on for s ys tem uti l i ty
Accuratel y des cri bes how the
types of memory s upported by
the operati ng s ys tems functi on
bas ed on anal ys i s
Des cri bes how the types of
memory s upported by the
operati ng s ys tems functi on but
wi th gaps i n detai l or a ccuracy
Does not des cri be how the types
of memory s upported by the
operati ng s ys tems functi on
5.75
Assess Activity
[IT-600-03]
Meets “Profi ci ent” cri teri a and
s hows keen i ns i ght i nto the
advantages and di s advantages of
memory management
technol ogi es
As s es s es the s ys tem s upport for
vi rtual memory, memory pagi ng,
and s egmentati on
As s es s es the s ys tem s upport for
vi rtual memory, memory pagi ng,
and s egmentati on, but the
as s es s ment l acks accuracy or
detai l
Does not as s es s the s ys tem
s upport for vi rtual memory,
memory pagi ng, and
s egmentati on
5.75
Techniques
[IT-600-03]
Meets “Profi ci ent” cri teri a and
s hows keen i ns i ght i nto how
s eparati on of pol i cy from
mechani s m can s erve as a general
pri nci pl e for reduci ng compl exi ty
As s es s es the techni ques us ed for
memory management pol i cy and
mechani s m s eparati on for thei r
uti l i ty i n managi ng compl exi ty
As s es s es the techni ques us ed for
memory management pol i cy and
mechani s m for thei r uti l i ty i n
managi ng compl exi ty, but s ome
techni ques are omi tted or the
as s es s ment l acks accuracy
Does not as s es s the techni ques
us ed for memory management
pol i cy and mechani s m s eparati on
for thei r uti l i ty i n managi ng
compl exi ty
5.75
Hardware-Software
Interface
[IT-600-04]
Meets “Profi ci ent” cri teri a and
draws i ns i ghtful conclus ions or
i nferences about I/O techni ques
acros s the ful l range of devi ces
and I/O s ubs ys tems
Ful l y des cri bes the hardware-
s oftware i nterface for I/O
management us ed by the
operati ng s ys tem
Des cri bes the hardware-s oftware
i nterface for I/O management,
but l acks detai l or accuracy of
expl anati on around the rol e of the
operati ng s ys tem i n control l i ng
the computer’s I/O
Does not des cri be the hardware-
s oftware i nterface for I/O
management
5.75
File Systems
[IT-600-04]
Meets “Profi ci ent” cri teri a and
draws i ns i ghtful conclus ions or
i nferences about the performance
of the fi l e s ys tems s upported by
the operati ng s ys tem
Anal yzes the fi l e s ys tems
s upported by the operati ng
s ys tem, i ncl uding an as s es sment
of fi l e s ys tem performance
Anal yzes the fi l e s ys tems
s upported by the operati ng
s ys tem, but the anal ys is i s
i ncompl ete or i naccurate
Does not anal yze the fi l e s ys tems
s upported by the operati ng
s ys tem
5.75
Context Switching
and I/O Interrupt
Handling
[IT-600-04]
Meets “Profi ci ent” cri teri a a nd
demons trates cl earl y the
appl i cability of context s wi tchi ng
and I/O i nterrupt handl i ng
technol ogi es
Accuratel y and comprehens i vel y
anal yzes the rel ati ons hi p between
s chedul ed proces s context
s wi tchi ng and I/O i nterrupt
handl i ng and compares to other
approaches
Anal yzes the rel ati ons hi p between
s chedul ed proces s context
s wi tchi ng and I/O i nterrupt
handl i ng and compares to other
approaches , but the anal ys is i s
i ncompl ete or i naccurate
Does not anal yze the rel ati ons hip
between s chedul ed proces s
context s wi tchi ng and I/O
i nterrupt handl i ng or compare to
other approaches
5.75
Security Model
[IT-600-06]
Meets “Profi ci ent” cri teri a and
evi dences keen i ns i ght i nto the
val ue of formal s ecuri ty model s
Conci s el y anal yzes the s ys tem to
determi ne the formal s ecuri ty
model the s ys tem s upports
Anal yzes the s ys tem to determi ne
the formal s ecuri ty model the
s ys tem s upports , but wi th gaps i n
detai l or accuracy
Does not anal yze the s ys tem to
determi ne the formal s ecuri ty
model the s ys tem s upports
5.75
Recommended
Techniques
[IT-600-06]
Meets “Profi ci ent” cri teri a and
evi dences keen i ns i ght i nto the
effect recommended techni ques
and bes t practi ces woul d have on
further s upporti ng s ecuri ty of the
operati ng s ys tem
Recommends techni ques and bes t
practi ces to further s upport
s ecuri ty of the operati ng s ys tem
Recommends techni ques and bes t
practi ces , but the
recommendati ons are not
appl i cable to the operati ng
s ys tem or woul d not l ogi cal ly
s upport s ecuri ty
Does not recommend techni ques
and bes t practi ces for s upporti ng
the operati ng s ys tem
5.75
Overall Evaluation
[IT-600-06]
Meets “Profi ci ent” cri teri a and
evi dences keen i ns i ght i nto the
val ue of the recommendati ons
and thei r feas i bi l ity
Devel ops a comprehens i ve,
i ntegrated technol ogy
recommendati on for the cas e
bas ed on the anal ys es ,
as s es s ments , and defi ned
requi rements
Devel ops a technol ogy
recommendati on for the cas e, but
i s not comprehens i ve or not
bas ed on the anal ys es ,
as s es s ments , and defi ned
requi rements
Does not devel op a technol ogy
recommendati on for the cas e
5.75
Articulation of
Response
Submi s s i on i s free of errors
rel ated to ci tati ons , grammar,
s pel l i ng, s yntax, and organi zati on
and i s pres ented i n a profes s i onal
and eas y-to-read format
Submi s s i on has no major errors
rel ated to ci tati ons , grammar,
s pel l i ng, s yntax, or organi zati on
Submi s s i on has major errors
rel ated to ci tati ons , grammar,
s pel l i ng, s yntax, or organi zati on
that negati vel y i mpact readabi l ity
and arti cul ati on of mai n i deas
Submi s s i on has criti cal errors
rel ated to ci tati ons , grammar,
s pel l i ng, s yntax, or organi zati on
that prevent unders tandi ng of
i deas
2.25
Earned Total 100%
Page | 2
MILESTONE THREE
24 APRIL 2019
Author Note
This paper was prepared for IT-600 Operating Systems, Module
7 Milestone 3,
Assignment, taught by.
GPOS Feature
Profile Criteria
Student Analysis
Multiprogramming
Tech Description
It is a technological phenomenon of parallel processing in
which many programs or applications run concurrently on a
processor. The processor splits the processing functions without
simultaneous executions.
Business Requirement
The organization must have an appropriate operating system to
facilitate compatibity between running programs and OS. This
allows flawless execution.
Application Benefit
It allows for efficient utilization of organization resources
because one processor can handle multiple tasks that would
otherwise be split. Customer satisfaction is enhanced.
Implementation Tasks
They are handled by schedulers within the processors. They
allow for logical sequential execution of programs without
interruptions.
Multiprocessing
Tech Description
It is a simultaneous coordinated process that allows computer
applications to be handled by more than one processor. It allows
networked computers to process a program
Business Requirement
The organization must have multiple computer systems that can
be synchronized to handle multiple applications within the
organization.
Application Benefit
It enhances faster delivery of services. Multiple computers can
be incorporated to speed up processing of transactions incase
there is a downtime.
Implementation Tasks
Tasks can be implemented either by symmetric multiprocessing
where memory is shared or massive parallel processing where
processors are combined to handle an application.
Multithreading
Tech Description
This is the capacity of the programs or OS to efficiently handle
multiple user requests without duplications of functions or
requests which enhances users experience.
Business Requirement
The business must have a large number of users that require to
use a particular program at the same time.
Application Benefit
It reduces the inconveniences associated with a delay in
processing leading to queues and congestion
Implementation Tasks
Work in a program is executed using threads. They are vital in
tracking multiple user requests into the system and ensuring
their completion.
Virtual Memory
Tech Description
A virtual memory compensates for memory inadequacies of
RAM by temporarly offering storage in the hard disk which
allows for flawless execution of programs.
Business Requirement
The business must have multiple programs that require to run
concurrently. This may drain the available RAM necessitating
the need for a virtual memory
Application Benefit
It facilitates multiprogramming and multiprocessing. Efficiency
operation of these programs requires the processor to have a
faster access to their data in the RAM.
Implementation Tasks
Task execution within the virtual memory emulate the functions
of RAM.
System Call Interface
Tech Description
It establishes a vital link between the operating system and the
available computer applicatons. This relationship allows for
optimum performance.
Business Requirement
The business must provide memory management frame work,
device handling and networking.
Application Benefit
It allows installed programs to access the required resources to
facilitate their operations which enhances customer utility.
Implementation Tasks
Implementation of tasks may be based on process control or file
management. Process allows for creation, termination and
freeing of memory.
Security
Tech Description
It incorporates a set of systems or procedures that ensures
computer systems and the data contained in them is
safeguarded.
Business Requirement
The business must implement physical and data security
measures. Physical measures safeguard computer infrastructure
like servers. For data you require firewalls and antivirus
software.
Application Benefit
It prevents data misuse by restricting access to only the
authorized recepients
Implementation Tasks
Tasks are implemented through continuous scanning of the
applications in the computer. This is crucial in detecting
malware that may compromise computer security.
Device Drivers
Tech Description
This are tiny application imbedded within the operating system
of a computer that control external peripheries like printers and
scanners.
Business Requirement
The business must have peripheries like photocopiers, scanners,
printers and projectors to optimize
Application Benefit
They allow the organization to operationalize its external
peripherals to facilitate operations.
Implementation Tasks
This is majorly determined by the type of peripheral device
attached to the computer
Fault Tolerance
Tech Description
This is the capacity of the program to reasonably continue
functioning despite the occurrence of major glitches that imbede
full optimization.
Business Requirement
The business must integrate multiple redundancy systems to
their applications to provide alternatives incase one fails
Application Benefit
It allows continuity of business operations despite a system
breakdowns
Implementation Tasks
This is basedf on the criticality of the functions. Essential tasks
may continue operating optimally while the non essential ones
may be riddled with inefficiencies.
Insert recommendation below
Device drivers are important tools that would enable an
entity to maximize the benefits of its peripheral components.
The vital aspect of device drivers is that they can be
contionously updated in order to be match the existing
technology. They are thus easily adaptable from the current to
future state. They can not easily slide into obsolescence.
Reference
· Krause, D., & Thörnig, P. (2016). JURECA: general-purpose
supercomputer at Jülich supercomputing centre. Journal of
large-scale research facilities JLSRF, 2, 62.
Page | 2
ANALYTICAL ORGANIZATIONAL PROFILE
26 MARCH 2019
Author Note
This paper was prepared for IT-600 Operating Systems, Module
3 Milestone 2,
Assignment, taught by.
Creation of an Analytical Organizational Profile
Overview: For this milestone, you will create an analytical
organizational profile. The goal is to map each of the general-
purpose operating system features identified to your analysis of
what the feature is, why it is important, and what business-
related problem such a general-purpose operating system feature
would create if not present in a typical small-to-medium-sized
business back office.
Directions: Insert your answers directly in the Student Analysis
column below by doing the following:
· In each of the “Tech Description” fields, describe the GPOS
feature using relevant technical terms and topic-related details.
· In each of the “Business Requirement” fields, describe (in
business terms) how the absence of this GPOS feature impacts a
business such as TSI.
GPOS Feature
Profile Criteria
Student Analysis
Multiprogramming
Tech Description
An act of parallel processing on the platform of single
processer. Programs are put in sechedule and they are not
running simultaneously.
Business Requirement
There is use of single processers to process one particular
program at a time such that one big has the capability of
blocking small ones until it goes to completion.
Multiprocessing
Tech Description
It has multiple processors that can even work on more than one
processes simultaneously.
Business Requirement
It upgrades the lifetime for TSI since it doubles the output
unlike the single processor system.
Multithreading
Tech Description
It is shared in cache for quicker accessing either through
register or cache. Although threads are smaller, they create
process together.
Business Requirement
Currently, TSI is removing functionaility of threading by open
source software since it lacks system call interface which is
beyond read and write. Besides, TSI is not to create multiple
threads.
Virtual Memory
Tech Description
A temporary data transfer from RAM to disk if RAM is
overloaded.
Business Requirement
TSI has inadequate memory and its system crashes frequently
compelling the adminstrators to constantly reboot their
systems. Indeed, they should have virtual memory model which
utilizes paging for avoidace of crashing of the system in future.
System Call Interface
Tech Description
It exists between user’s application and kernel. In fact, it
translates user’s command into kernel language for command
execution. Kernel language should be developed to all
customers.
Business Requirement
TSI is known for creation of custom system calls sicne they an
interfae that is not compatible to other software. Developers
should create special system calls to be used.
Security
Tech Description
Protects software from intruders or unauthorized access to the
system.
Business Requirement
It enhances protection of the system’s information whereas TSI
has low amount of security.
Device Drivers
Tech Description
Controls the connection of devices to programs.
Business Requirement
It allows installation of TSI software disk to aid operation of a
printer.
Fault Tolerance
Tech Description
Creates program that brings changes to prevent systems from
crashing.
Business Requirement
TSI needs to have fault tolerance to avoid having troubles in
programming while developing their devices drivers
Reference
· Krause, D., & Thörnig, P. (2016). JURECA: general-purpose
supercomputer at Jülich supercomputing centre. Journal of
large-scale research facilities JLSRF, 2, 62.
Page | 2
WEB COMMUNICATIONS
18 MARCH 2019
Author Note
This paper was prepared for IT-600 Operating Systems, Module
2 Milestone 1,
Assignment, taught by
The TSI OS has several constraints that are a huge
burden to the day to day operations of the company. The
deficiencies in its operating system have a huge toll in the
operations and day to day activities of the company. Not only
do these constraints affect a company, they also affect its
customers, and how they access services from TSI. Customers
have to face a lot of problems when accessing these services,
especially during peak hours when the load on the system is
enormous. This stretches the burden even more, not only on the
operations in the company, but also creates business related
challenges to the company in areas such as customer
recruitment and retention.
TSI experiences several business related challenges due to the
state of its TSI Operating System. The first and one of the most
visible challenges is the challenge in customer service. Due to
the constraints in the TSI OS, the system provides its users with
poor services, especially during peak periods. During these
times, the system is overloaded, and experiences deadlocks,
which cause the users to experience system crashes as they use
the site. This greatly affects customer satisfaction, which may
be a great barrier to the company in being able to retain its
customers and keep them interested.
The company also has to cater for the high cost of maintaining
the system. Due to the fragile nature of the system, the constant
crashes and reboots often require programmers and technical
experts to be on site in the backroom all the time, so that they
can resolve any running errors that occur. This becomes
expensive for the company, as the skills needed to maintain
such a fragile and rigid system are very high. Also, the company
pays programmers to modify their open source software, which
is a very expensive venture because they require highly
experienced software programmers for the job.
In a recent example, British Airways, a leading airline company
worldwide faced for the sixth time in a year, global IT failures.
In 2017, the company experienced six major software failures
that affected flights, their worldwide call centres, their website
as well as their mobile app. This resulted in a full blown
lockdown in May of 2017, where the airlines cancelled all their
flights from Heathrow and Gatwick airports, which are major
hubs in their airline network. Further studies showed that the
error was indeed avoidable, but the airline had made hundreds
of the staff in its IT department redundant in the previous year,
2016 (Hatton, 2017).
As a customer of TSI, the TSI Operating System would cause a
lot on inconvenience in my productivity at work. Because it is
unable to perform multi-processing, it would require me to dig
deeper into my pocket, as well as spend time and effort in
finding old hardware that has single core software, so as to be
compatible with the TSI system. The system would also cause a
lot of inconvenience for me in the case where it crashed while I
was in the middle of an important activity, process or
transaction on the system. This would result in many troubles,
such as loss of data and waste of time and resources. I would be
forced to repeat the same activity several times during peak
hours if the system crashed in the middle of a transaction.
Reference
Hatton, L. (2017). Software failures-follies and fallacies. IEE
Review, 43(2), 49-52.

More Related Content

Similar to IT 600 Final Project Guidelines and Rubric Overview.docx

IT 510 Milestone Four Guidelines and Rubric You will su
IT 510 Milestone Four Guidelines and Rubric  You will suIT 510 Milestone Four Guidelines and Rubric  You will su
IT 510 Milestone Four Guidelines and Rubric You will suTatianaMajor22
 
IT 510 Final Project Guidelines and Rubric Overview .docx
IT 510 Final Project Guidelines and Rubric  Overview .docxIT 510 Final Project Guidelines and Rubric  Overview .docx
IT 510 Final Project Guidelines and Rubric Overview .docxvrickens
 
Ifsm 461 Education Specialist -snaptutorial.com
Ifsm 461 Education Specialist -snaptutorial.comIfsm 461 Education Specialist -snaptutorial.com
Ifsm 461 Education Specialist -snaptutorial.comDavisMurphyC58
 
IFSM 461 Education Organization - snaptutorial.com
IFSM 461  Education Organization - snaptutorial.comIFSM 461  Education Organization - snaptutorial.com
IFSM 461 Education Organization - snaptutorial.comdonaldzs207
 
IFSM 461 EXceptional Education/snaptutorial.COM
IFSM 461 EXceptional Education/snaptutorial.COMIFSM 461 EXceptional Education/snaptutorial.COM
IFSM 461 EXceptional Education/snaptutorial.COMMcdonaldRyan17
 
IFSM 461 Enhance teaching - snaptutorial.com
IFSM 461  Enhance teaching - snaptutorial.comIFSM 461  Enhance teaching - snaptutorial.com
IFSM 461 Enhance teaching - snaptutorial.comDavisMurphyA52
 
Software testing and introduction to quality
Software testing and introduction to qualitySoftware testing and introduction to quality
Software testing and introduction to qualityDhanashriAmbre
 
IT 500 Final Project Guidelines and Rubric Overview .docx
IT 500 Final Project Guidelines and Rubric  Overview .docxIT 500 Final Project Guidelines and Rubric  Overview .docx
IT 500 Final Project Guidelines and Rubric Overview .docxpriestmanmable
 
System Development Life_IntroductionCycle.pdf
System Development Life_IntroductionCycle.pdfSystem Development Life_IntroductionCycle.pdf
System Development Life_IntroductionCycle.pdfpncitechnologies
 
CST 630 RANK Redefined Education--cst630rank.com
CST 630 RANK Redefined Education--cst630rank.comCST 630 RANK Redefined Education--cst630rank.com
CST 630 RANK Redefined Education--cst630rank.comclaric241
 
Report on SOFTWARE DEVELOPMENT LIFE CYCLE SDLC
Report on SOFTWARE DEVELOPMENT LIFE CYCLE SDLC Report on SOFTWARE DEVELOPMENT LIFE CYCLE SDLC
Report on SOFTWARE DEVELOPMENT LIFE CYCLE SDLC Neetu Marwah
 
CST 630 RANK Remember Education--cst630rank.com
CST 630 RANK Remember Education--cst630rank.comCST 630 RANK Remember Education--cst630rank.com
CST 630 RANK Remember Education--cst630rank.comchrysanthemu49
 
Cst 630 Enhance teaching / snaptutorial.com
Cst 630 Enhance teaching / snaptutorial.comCst 630 Enhance teaching / snaptutorial.com
Cst 630 Enhance teaching / snaptutorial.comBaileyabw
 
CST 630 RANK Introduction Education--cst630rank.com
CST 630 RANK Introduction Education--cst630rank.comCST 630 RANK Introduction Education--cst630rank.com
CST 630 RANK Introduction Education--cst630rank.comagathachristie266
 
CST 630 RANK Educational Specialist--cst630rank.com
CST 630 RANK Educational Specialist--cst630rank.comCST 630 RANK Educational Specialist--cst630rank.com
CST 630 RANK Educational Specialist--cst630rank.comVSNaipaul15
 
CST 630 RANK Inspiring Innovation--cst630rank.com
CST 630 RANK Inspiring Innovation--cst630rank.comCST 630 RANK Inspiring Innovation--cst630rank.com
CST 630 RANK Inspiring Innovation--cst630rank.comKeatonJennings104
 
CST 630 RANK Become Exceptional--cst630rank.com
CST 630 RANK Become Exceptional--cst630rank.comCST 630 RANK Become Exceptional--cst630rank.com
CST 630 RANK Become Exceptional--cst630rank.comagathachristie113
 
CST 630 RANK Achievement Education--cst630rank.com
CST 630 RANK Achievement Education--cst630rank.comCST 630 RANK Achievement Education--cst630rank.com
CST 630 RANK Achievement Education--cst630rank.comkopiko147
 
System Analysis and Design Project documentation
System Analysis and Design Project documentationSystem Analysis and Design Project documentation
System Analysis and Design Project documentationMAHERMOHAMED27
 

Similar to IT 600 Final Project Guidelines and Rubric Overview.docx (20)

IT 510 Milestone Four Guidelines and Rubric You will su
IT 510 Milestone Four Guidelines and Rubric  You will suIT 510 Milestone Four Guidelines and Rubric  You will su
IT 510 Milestone Four Guidelines and Rubric You will su
 
IT 510 Final Project Guidelines and Rubric Overview .docx
IT 510 Final Project Guidelines and Rubric  Overview .docxIT 510 Final Project Guidelines and Rubric  Overview .docx
IT 510 Final Project Guidelines and Rubric Overview .docx
 
Ifsm 461 Education Specialist -snaptutorial.com
Ifsm 461 Education Specialist -snaptutorial.comIfsm 461 Education Specialist -snaptutorial.com
Ifsm 461 Education Specialist -snaptutorial.com
 
IFSM 461 Education Organization - snaptutorial.com
IFSM 461  Education Organization - snaptutorial.comIFSM 461  Education Organization - snaptutorial.com
IFSM 461 Education Organization - snaptutorial.com
 
IFSM 461 EXceptional Education/snaptutorial.COM
IFSM 461 EXceptional Education/snaptutorial.COMIFSM 461 EXceptional Education/snaptutorial.COM
IFSM 461 EXceptional Education/snaptutorial.COM
 
IFSM 461 Enhance teaching - snaptutorial.com
IFSM 461  Enhance teaching - snaptutorial.comIFSM 461  Enhance teaching - snaptutorial.com
IFSM 461 Enhance teaching - snaptutorial.com
 
Software testing and introduction to quality
Software testing and introduction to qualitySoftware testing and introduction to quality
Software testing and introduction to quality
 
IT 500 Final Project Guidelines and Rubric Overview .docx
IT 500 Final Project Guidelines and Rubric  Overview .docxIT 500 Final Project Guidelines and Rubric  Overview .docx
IT 500 Final Project Guidelines and Rubric Overview .docx
 
System Development Life_IntroductionCycle.pdf
System Development Life_IntroductionCycle.pdfSystem Development Life_IntroductionCycle.pdf
System Development Life_IntroductionCycle.pdf
 
Feasibility_Study
Feasibility_StudyFeasibility_Study
Feasibility_Study
 
CST 630 RANK Redefined Education--cst630rank.com
CST 630 RANK Redefined Education--cst630rank.comCST 630 RANK Redefined Education--cst630rank.com
CST 630 RANK Redefined Education--cst630rank.com
 
Report on SOFTWARE DEVELOPMENT LIFE CYCLE SDLC
Report on SOFTWARE DEVELOPMENT LIFE CYCLE SDLC Report on SOFTWARE DEVELOPMENT LIFE CYCLE SDLC
Report on SOFTWARE DEVELOPMENT LIFE CYCLE SDLC
 
CST 630 RANK Remember Education--cst630rank.com
CST 630 RANK Remember Education--cst630rank.comCST 630 RANK Remember Education--cst630rank.com
CST 630 RANK Remember Education--cst630rank.com
 
Cst 630 Enhance teaching / snaptutorial.com
Cst 630 Enhance teaching / snaptutorial.comCst 630 Enhance teaching / snaptutorial.com
Cst 630 Enhance teaching / snaptutorial.com
 
CST 630 RANK Introduction Education--cst630rank.com
CST 630 RANK Introduction Education--cst630rank.comCST 630 RANK Introduction Education--cst630rank.com
CST 630 RANK Introduction Education--cst630rank.com
 
CST 630 RANK Educational Specialist--cst630rank.com
CST 630 RANK Educational Specialist--cst630rank.comCST 630 RANK Educational Specialist--cst630rank.com
CST 630 RANK Educational Specialist--cst630rank.com
 
CST 630 RANK Inspiring Innovation--cst630rank.com
CST 630 RANK Inspiring Innovation--cst630rank.comCST 630 RANK Inspiring Innovation--cst630rank.com
CST 630 RANK Inspiring Innovation--cst630rank.com
 
CST 630 RANK Become Exceptional--cst630rank.com
CST 630 RANK Become Exceptional--cst630rank.comCST 630 RANK Become Exceptional--cst630rank.com
CST 630 RANK Become Exceptional--cst630rank.com
 
CST 630 RANK Achievement Education--cst630rank.com
CST 630 RANK Achievement Education--cst630rank.comCST 630 RANK Achievement Education--cst630rank.com
CST 630 RANK Achievement Education--cst630rank.com
 
System Analysis and Design Project documentation
System Analysis and Design Project documentationSystem Analysis and Design Project documentation
System Analysis and Design Project documentation
 

More from AASTHA76

(APA 6th Edition Formatting and St.docx
(APA 6th Edition Formatting and St.docx(APA 6th Edition Formatting and St.docx
(APA 6th Edition Formatting and St.docxAASTHA76
 
(a) Thrasymachus’ (the sophist’s) definition of Justice or Right o.docx
(a) Thrasymachus’ (the sophist’s) definition of Justice or Right o.docx(a) Thrasymachus’ (the sophist’s) definition of Justice or Right o.docx
(a) Thrasymachus’ (the sophist’s) definition of Justice or Right o.docxAASTHA76
 
(Glossary of Telemedicine and eHealth)· Teleconsultation Cons.docx
(Glossary of Telemedicine and eHealth)· Teleconsultation Cons.docx(Glossary of Telemedicine and eHealth)· Teleconsultation Cons.docx
(Glossary of Telemedicine and eHealth)· Teleconsultation Cons.docxAASTHA76
 
(Assmt 1; Week 3 paper) Using ecree Doing the paper and s.docx
(Assmt 1; Week 3 paper)  Using ecree        Doing the paper and s.docx(Assmt 1; Week 3 paper)  Using ecree        Doing the paper and s.docx
(Assmt 1; Week 3 paper) Using ecree Doing the paper and s.docxAASTHA76
 
(Image retrieved at httpswww.google.comsearchhl=en&biw=122.docx
(Image retrieved at  httpswww.google.comsearchhl=en&biw=122.docx(Image retrieved at  httpswww.google.comsearchhl=en&biw=122.docx
(Image retrieved at httpswww.google.comsearchhl=en&biw=122.docxAASTHA76
 
(Dis) Placing Culture and Cultural Space Chapter 4.docx
(Dis) Placing Culture and Cultural Space Chapter 4.docx(Dis) Placing Culture and Cultural Space Chapter 4.docx
(Dis) Placing Culture and Cultural Space Chapter 4.docxAASTHA76
 
(1) Define the time value of money.  Do you believe that the ave.docx
(1) Define the time value of money.  Do you believe that the ave.docx(1) Define the time value of money.  Do you believe that the ave.docx
(1) Define the time value of money.  Do you believe that the ave.docxAASTHA76
 
(chapter taken from Learning Power)From Social Class and t.docx
(chapter taken from Learning Power)From Social Class and t.docx(chapter taken from Learning Power)From Social Class and t.docx
(chapter taken from Learning Power)From Social Class and t.docxAASTHA76
 
(Accessible at httpswww.hatchforgood.orgexplore102nonpro.docx
(Accessible at httpswww.hatchforgood.orgexplore102nonpro.docx(Accessible at httpswww.hatchforgood.orgexplore102nonpro.docx
(Accessible at httpswww.hatchforgood.orgexplore102nonpro.docxAASTHA76
 
(a) The current ratio of a company is 61 and its acid-test ratio .docx
(a) The current ratio of a company is 61 and its acid-test ratio .docx(a) The current ratio of a company is 61 and its acid-test ratio .docx
(a) The current ratio of a company is 61 and its acid-test ratio .docxAASTHA76
 
(1) How does quantum cryptography eliminate the problem of eaves.docx
(1) How does quantum cryptography eliminate the problem of eaves.docx(1) How does quantum cryptography eliminate the problem of eaves.docx
(1) How does quantum cryptography eliminate the problem of eaves.docxAASTHA76
 
#transformation10EventTrendsfor 201910 Event.docx
#transformation10EventTrendsfor 201910 Event.docx#transformation10EventTrendsfor 201910 Event.docx
#transformation10EventTrendsfor 201910 Event.docxAASTHA76
 
$10 now and $10 when complete Use resources from the required .docx
$10 now and $10 when complete Use resources from the required .docx$10 now and $10 when complete Use resources from the required .docx
$10 now and $10 when complete Use resources from the required .docxAASTHA76
 
#MicroXplorer Configuration settings - do not modifyFile.Versio.docx
#MicroXplorer Configuration settings - do not modifyFile.Versio.docx#MicroXplorer Configuration settings - do not modifyFile.Versio.docx
#MicroXplorer Configuration settings - do not modifyFile.Versio.docxAASTHA76
 
#include string.h#include stdlib.h#include systypes.h.docx
#include string.h#include stdlib.h#include systypes.h.docx#include string.h#include stdlib.h#include systypes.h.docx
#include string.h#include stdlib.h#include systypes.h.docxAASTHA76
 
$ stated in thousands)Net Assets, Controlling Interest.docx
$ stated in thousands)Net Assets, Controlling Interest.docx$ stated in thousands)Net Assets, Controlling Interest.docx
$ stated in thousands)Net Assets, Controlling Interest.docxAASTHA76
 
#include stdio.h#include stdlib.h#include pthread.h#in.docx
#include stdio.h#include stdlib.h#include pthread.h#in.docx#include stdio.h#include stdlib.h#include pthread.h#in.docx
#include stdio.h#include stdlib.h#include pthread.h#in.docxAASTHA76
 
#include customer.h#include heap.h#include iostream.docx
#include customer.h#include heap.h#include iostream.docx#include customer.h#include heap.h#include iostream.docx
#include customer.h#include heap.h#include iostream.docxAASTHA76
 
#Assessment BriefDiploma of Business Eco.docx
#Assessment BriefDiploma of Business Eco.docx#Assessment BriefDiploma of Business Eco.docx
#Assessment BriefDiploma of Business Eco.docxAASTHA76
 
#include stdio.h#include stdint.h#include stdbool.h.docx
#include stdio.h#include stdint.h#include stdbool.h.docx#include stdio.h#include stdint.h#include stdbool.h.docx
#include stdio.h#include stdint.h#include stdbool.h.docxAASTHA76
 

More from AASTHA76 (20)

(APA 6th Edition Formatting and St.docx
(APA 6th Edition Formatting and St.docx(APA 6th Edition Formatting and St.docx
(APA 6th Edition Formatting and St.docx
 
(a) Thrasymachus’ (the sophist’s) definition of Justice or Right o.docx
(a) Thrasymachus’ (the sophist’s) definition of Justice or Right o.docx(a) Thrasymachus’ (the sophist’s) definition of Justice or Right o.docx
(a) Thrasymachus’ (the sophist’s) definition of Justice or Right o.docx
 
(Glossary of Telemedicine and eHealth)· Teleconsultation Cons.docx
(Glossary of Telemedicine and eHealth)· Teleconsultation Cons.docx(Glossary of Telemedicine and eHealth)· Teleconsultation Cons.docx
(Glossary of Telemedicine and eHealth)· Teleconsultation Cons.docx
 
(Assmt 1; Week 3 paper) Using ecree Doing the paper and s.docx
(Assmt 1; Week 3 paper)  Using ecree        Doing the paper and s.docx(Assmt 1; Week 3 paper)  Using ecree        Doing the paper and s.docx
(Assmt 1; Week 3 paper) Using ecree Doing the paper and s.docx
 
(Image retrieved at httpswww.google.comsearchhl=en&biw=122.docx
(Image retrieved at  httpswww.google.comsearchhl=en&biw=122.docx(Image retrieved at  httpswww.google.comsearchhl=en&biw=122.docx
(Image retrieved at httpswww.google.comsearchhl=en&biw=122.docx
 
(Dis) Placing Culture and Cultural Space Chapter 4.docx
(Dis) Placing Culture and Cultural Space Chapter 4.docx(Dis) Placing Culture and Cultural Space Chapter 4.docx
(Dis) Placing Culture and Cultural Space Chapter 4.docx
 
(1) Define the time value of money.  Do you believe that the ave.docx
(1) Define the time value of money.  Do you believe that the ave.docx(1) Define the time value of money.  Do you believe that the ave.docx
(1) Define the time value of money.  Do you believe that the ave.docx
 
(chapter taken from Learning Power)From Social Class and t.docx
(chapter taken from Learning Power)From Social Class and t.docx(chapter taken from Learning Power)From Social Class and t.docx
(chapter taken from Learning Power)From Social Class and t.docx
 
(Accessible at httpswww.hatchforgood.orgexplore102nonpro.docx
(Accessible at httpswww.hatchforgood.orgexplore102nonpro.docx(Accessible at httpswww.hatchforgood.orgexplore102nonpro.docx
(Accessible at httpswww.hatchforgood.orgexplore102nonpro.docx
 
(a) The current ratio of a company is 61 and its acid-test ratio .docx
(a) The current ratio of a company is 61 and its acid-test ratio .docx(a) The current ratio of a company is 61 and its acid-test ratio .docx
(a) The current ratio of a company is 61 and its acid-test ratio .docx
 
(1) How does quantum cryptography eliminate the problem of eaves.docx
(1) How does quantum cryptography eliminate the problem of eaves.docx(1) How does quantum cryptography eliminate the problem of eaves.docx
(1) How does quantum cryptography eliminate the problem of eaves.docx
 
#transformation10EventTrendsfor 201910 Event.docx
#transformation10EventTrendsfor 201910 Event.docx#transformation10EventTrendsfor 201910 Event.docx
#transformation10EventTrendsfor 201910 Event.docx
 
$10 now and $10 when complete Use resources from the required .docx
$10 now and $10 when complete Use resources from the required .docx$10 now and $10 when complete Use resources from the required .docx
$10 now and $10 when complete Use resources from the required .docx
 
#MicroXplorer Configuration settings - do not modifyFile.Versio.docx
#MicroXplorer Configuration settings - do not modifyFile.Versio.docx#MicroXplorer Configuration settings - do not modifyFile.Versio.docx
#MicroXplorer Configuration settings - do not modifyFile.Versio.docx
 
#include string.h#include stdlib.h#include systypes.h.docx
#include string.h#include stdlib.h#include systypes.h.docx#include string.h#include stdlib.h#include systypes.h.docx
#include string.h#include stdlib.h#include systypes.h.docx
 
$ stated in thousands)Net Assets, Controlling Interest.docx
$ stated in thousands)Net Assets, Controlling Interest.docx$ stated in thousands)Net Assets, Controlling Interest.docx
$ stated in thousands)Net Assets, Controlling Interest.docx
 
#include stdio.h#include stdlib.h#include pthread.h#in.docx
#include stdio.h#include stdlib.h#include pthread.h#in.docx#include stdio.h#include stdlib.h#include pthread.h#in.docx
#include stdio.h#include stdlib.h#include pthread.h#in.docx
 
#include customer.h#include heap.h#include iostream.docx
#include customer.h#include heap.h#include iostream.docx#include customer.h#include heap.h#include iostream.docx
#include customer.h#include heap.h#include iostream.docx
 
#Assessment BriefDiploma of Business Eco.docx
#Assessment BriefDiploma of Business Eco.docx#Assessment BriefDiploma of Business Eco.docx
#Assessment BriefDiploma of Business Eco.docx
 
#include stdio.h#include stdint.h#include stdbool.h.docx
#include stdio.h#include stdint.h#include stdbool.h.docx#include stdio.h#include stdint.h#include stdbool.h.docx
#include stdio.h#include stdint.h#include stdbool.h.docx
 

Recently uploaded

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 

Recently uploaded (20)

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 

IT 600 Final Project Guidelines and Rubric Overview.docx

  • 1. IT 600 Final Project Guidelines and Rubric Overview IT professionals are often called upon to make decisions, provide recommendations, and perform analyses that require an in -depth understanding of the inner workings of an operating system. This summative assessment will provide students with the knowledge and skills required to achieve and maintain this level of understanding throughout their careers. For the summative assessment, students will perform a tech nical evaluation of an operating system. Students will be offered a choice of operating systems to analyze. Students will use real -time and log-based tools, empirical observation, and scholarly research to analyze the core subsystems of the operating system. For each subsystem, students will research and describe the technology used in that subsystem and compare it to other available technologies. For the final report, students will assess the results of their analyses and perform an overall evaluation of the operating system, with recommendati ons for how it might be improved. For the summative assessment you will perform an in-depth technical evaluation of an operating system. The evaluation will be made in terms of the ability of the system and its supporting hardware to meet a set of organi zational needs and technical requirements. The
  • 2. organization is a global enterprise that provides premium technical support to other enterprise businesses. Management will use your evaluation as one element among several in their assessment of options for future technology adoption. You will define the technical requirements, based on tasks performed by the organization, the applications used, system loads, security, system management, maintenance, and performance. The scope of the evaluation will include analyses and assessments of the hardware-software interface, the techniques used to implement processes and threads, the file systems supported by the operating system, the input/output subsystem, and the operating system security features. You will use these analyses and assessments to produce a comprehensive evaluation, which will be written in the form of a detailed technology review. SNHU will provide tools to support analysis of some commonly used operating systems, but you may select another operati ng system if you have the resources to do so. There will also be several milestones throughout the course that will allow you to develop the evalua tion incrementally. The project is divided into three milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final submissions. These milestones will be submitted in Modules Two, Three, and Seven. Your final report will be submitted in Module Nine.
  • 3. Prompt Your technical evaluation of an operating system should include analyses and assessments of the hardware-software interface, the techniques used to implement processes and threads, the file systems supported by the operating system, the I/O subsystem, and the operating system security features. You will use these analyses and assessments to produce a comprehensive evaluation, which will be written in the form of a detai led technology review. Specifically, the following critical elements must be addressed: I. Organizational Needs and Requirements A. Develop an organizational profile that analyzes the tasks performed by the organization, the computer applications in use or expected to be in use, and the estimated system loads anticipated for the operating system. B. What are the organizational, security, and performance and reliability requirements related to operating system function, management, and maintenance? II. Computer Architecture A. What hardware is required to host the operating system? This should include an identification of the minimal hardware required
  • 4. and an assessment of what would be needed to support organizational needs and requirements. B. Analyze the architecture in terms of support and functionality of process management, memory management, I/O, and mas s storage. C. Analyze the architectural support for multiprocessor systems and assess the organization, connection, and control aspects. What are some architectural issues that might arise regarding technologies used in multiprocessor systems and how would you recommend utilizing multiprocessor systems in light of these issues? III. Process Management A. Assess the operating system process management in terms of its responsiveness to organizational requirements. Use process monitoring tools to gather data for your assessment. B. Assess software tools for thread analysis and deadlock detection that are available for the operating system. What strategies does the operating system provide for handling deadlocks? C. What support does the operating system provide for multiprocessing? Assess the applicability and ability of the operating system to allocate tasks between multiple processors. IV. Memory Management
  • 5. A. Describe how the types of memory supported by the operating system are used. What memory abstraction does the system use? Use an analysis tool to investigate the mapping to physical memory. B. Describe the system support for virtual memory, memory paging, and segmentation. Use a monitoring tool to assess their activity under heavily loaded conditions. C. Assess the techniques used for memory management policy and mechanism separation and their utility in managing complexity. V. I/O and Mass Storage A. Describe the hardware-software interface for I/O management used by the operating system. Various techniques are used for enabling the operating system to communicate with devices. What techniques are supported and what are their advantages and disadvantages? B. Analyze the file systems supported by the operating system. Use file system performance tests to assess the available file sys tems. C. What is the relationship between scheduled process context switching and I/O interrupt handling? Analyze the use of device interrupts in the operating system and compare them to other possible approaches to input/output.
  • 6. VI. Security A. What formal security model does the system support? Analyze the system to determine what support it provides for implementing security models and assess the relevant tools and services made available to administrators. B. Recommend techniques and best practices to further support security of the operating system. VII. Overall Evaluation: Using the defined requirements, analyses, and assessments, develop a comprehensive detailed technology recommendation. Include an integrated assessment of the operating system’s capability to support organizational needs and technical requirements. Milestones Milestone One: Situation Analysis In Module Two, you will conduct a situational analysis. You will write a short paper that describes the business -related challenges faced by the organization. This milestone will be graded with the Milestone One Rubric. Milestone Two: Analytical Organizational Profile In Module Three, you will conduct an analytical organizational profile. Your work will be completed in the Milestone Two Template document. This milestone will be graded with the Milestone Two Rubric.
  • 7. Milestone Three: Full Organizational Profile In Module Seven, you will complete a full organizational profile. Your work will be completed in the Milestone Three Template document. This milestone will be graded with the Milestone Three Rubric. Final Submission: Technical Evaluation of an Operating System In Module Nine, you will consider the questions below and make revisions to the document you submitted for Milestone Three. With your Milestone Three document in front of you, consider the following and make revisions as necessary: a) Have you incorporated all of the feedback and suggestions you received from your instructor? b) Does your submission address all of the critical elements outlined above? c) Does the operating system you selected match the specific requirements your organization identified? d) Do you have title and references pages? e) Is your submission at least 15 pages of content not including title and reference pages? f) Have you supported each of your positions with a credible source? g) Have you properly cited your sources and made proper attribution for any copyrighted graphics or photos? h) Does your submission make a clearly stated recommendation for an operating system? Your final submission should be a polished artifact containing
  • 8. all of the critical elements of the final project. It should reflect the incorporation of feedback gained throughout the course. This submission will be graded using the Final Project Rubric (below). Deliverables Milestone Deliverable Module Due Grading One Situation Analysis Two Graded separately; Milestone One Rubric Two Analytical Organizational Profile Three Graded separately; Milestone Two Rubric Three Full Organizational Profile Seven Graded separately; Milestone Three Rubric Final Submission: Technical Evaluation of an Operating System Nine Graded separately; Final Project Rubric Final Project Rubric Guidelines for Submission: Your report should be 15 pages double-spaced paper or the completed template provided in Milestone Three, professionally written, with necessary citations in APA format and any accompanying visuals or additional artifacts submitted
  • 9. as part of an appendix section. Critical Elements Exemplary (100%) Proficient (90%) Needs Improvement (70%) Not Evident (0%) Value Organizational Profile [IT-600-06] Meets “Profi ci ent” cri teri a and organi zati onal profi le s hows keen i ns i ght i nto organi zati onal needs and requi rements Devel ops an accurate and detai l ed organi zati onal profi le that anal yzes the tas ks performed by the organi zati on, the computer appl i cations i n us e or expected to be i n us e, and the es ti mated s ys tem l oads Devel ops an organi zati onal profi le that anal yzes the tas ks performed by the organi zati on, the computer appl i cations i n us e or expected to be i n us e, and the es ti mated s ys tem l oads , but wi th gaps i n accuracy or detai l s
  • 10. Does not devel op an organi zati onal profi le that anal yzes the tas ks performed by the organi zati on, the computer appl i cations i n us e or expected to be i n us e, and the es ti mated s ys tem l oads 5.75 Function, Management, and Maintenance [IT-600-06] Meets “Profi ci ent” cri teri a and draws i ns i ghtful conclus ions or i nferences about the i mpl i cations of the requi rements for the operati ng s ys tem Ful l y des cri bes the organi zati onal, s ecuri ty, performance, and rel i abi lity requi rements as they rel ate to operati ng s ys tem functi on, management, and mai ntenance Des cri bes the organi zati onal , s ecuri ty, performance, and
  • 11. rel i abi lity requi rements as they rel ate to operati ng s ys tem functi on, management, and mai ntenance, but wi th gaps i n detai l s Does not des cri be the organi zati onal, s ecuri ty, performance, and rel i abi lity requi rements as they rel ate to operati ng s ys tem functi on, management, and mai ntenance 5.75 Hardware [IT-600-01] Meets “Profi ci ent” cri teri a and draws i ns i ghtful conclus ions or i nferences about the i mpl i cations of the requi rements for the hardware Accuratel y expl ai ns the hardware requi red to s upport the operati ng s ys tem, and as s es s es the hardware needed to s upport organi zati onal needs and requi rements
  • 12. Expl ai ns the hardware requi red to s upport the operati ng s ys tem, and as s es s es the hardware needed to s upport organi zati onal needs and requi rements , but wi th gaps i n accuracy or detai l s Does not expl ai n the hardware requi red to s upport the operati ng s ys tem 5.75 Support and Functionality [IT-600-01] Meets “Profi ci ent” cri teri a and anal ys is s hows keen i ns i ght i nto the s i gni fi cance of the archi tecture for proces s management, memory management, I/O, and mas s s torage Accuratel y anal yzes the archi tecture i n terms of s upport and functi onal i ty of proces s management, memory management, I/O, and mas s
  • 13. s torage Anal yzes the archi tecture i n terms of s upport and functi onal i ty of proces s management, memory management, I/O, and mas s s torage, but anal ys is i s i naccurate or l acki ng detai l Does not anal yze the archi tecture i n terms of s upport and functi onal i ty of proces s management, memory management, I/O, and mas s s torage 5.75 Architectural Issues [IT-600-05] Meets “Profi ci ent” cri teri a and anal ys is s hows keen i ns i ght i nto the s i gni fi cance of the archi tecture mul ti proces s or s ys tems Accuratel y anal yzes the archi tectural s upport for mul ti proces s or s ys tems and
  • 14. as s es s es the organi zati on, connecti on, and control as pects of the s ys tem Anal yzes the archi tectural s upport for mul ti proces s or s ys tems and as s es s es aspects of the s ys tem, but wi th gaps i n accuracy or detai l s Does not anal yze the archi tectural s upport for mul ti proces s or s ys tems 5.75 Responsiveness to Organizational Requirements [IT-600-02] Meets “Profi ci ent” cri teri a and draws i ns i ghtful conclus ions or i nferences about the val ue of proces s management i n terms of i ts res pons i venes s to organi zati onal requi rements
  • 15. As s es s es operati ng s ys tem proces s management i n terms of i ts res pons i venes s to organi zati onal requi rements , us i ng proces s moni tori ng tool s to gather data As s es s es operati ng s ys tem proces s management but the as s es s ment l acks detai l or the us e of proces s moni tori ng tool s i s not evi dent Does not as s es s operati ng s ys tem proces s management 5.75 Software Tools [IT-600-02] Meets “Profi ci ent” cri teri a and s hows keen i ns i ght i nto the s i gni fi cance of deadl ocks and rel ated probl ems and the tool s and techni ques us ed i n detecti on, recovery, avoi dance, and preventi on As s es s es s oftware tool s for thread anal ys is and deadl ock detecti on
  • 16. avai l able for the operati ng s ys tem and expl ai ns as sociated s trategi es As s es s es s oftware tool s for thread anal ys is and deadl ock detecti on avai l able for the operati ng s ys tem and expl ai ns as sociated s trategi es, but wi th gaps i n detai l or accuracy Does not as s es s s oftware tool s for thread anal ys is and deadl ock detecti on avai l able for the operati ng s ys tem and expl ai n as s oci ated s trategi es 5.75 Support [IT-600-05] Meets “Profi ci ent” cri teri a and evi dences keen i ns i ght i nto the technol ogy of mul ti proces s i ng and i ts appl i cabili ty i n organi zati onal needs and requi rements Accuratel y as s es s es the appl i cability and abi lity of the operati ng s ys tem to al l ocate tas ks between mul ti pl e proces s ors As s es s es the appl i cability and abi l i ty of the operati ng s ys tem to
  • 17. al l ocate tas ks between mul ti pl e proces s ors , but wi th gaps i n accuracy, anal ysis, or detai l Does not as s es s the appl i cability and abi l i ty of the operati ng s ys tem to al l ocate tas ks between mul ti pl e proces s ors 5.75 Memory Abstraction [IT-600-03] Meets “Profi ci ent” cri teri a and s hows keen i ns i ght i nto the s i gni fi cance of the memory abs tracti on for s ys tem uti l i ty Accuratel y des cri bes how the types of memory s upported by the operati ng s ys tems functi on bas ed on anal ys i s Des cri bes how the types of memory s upported by the operati ng s ys tems functi on but wi th gaps i n detai l or a ccuracy Does not des cri be how the types of memory s upported by the operati ng s ys tems functi on 5.75
  • 18. Assess Activity [IT-600-03] Meets “Profi ci ent” cri teri a and s hows keen i ns i ght i nto the advantages and di s advantages of memory management technol ogi es As s es s es the s ys tem s upport for vi rtual memory, memory pagi ng, and s egmentati on As s es s es the s ys tem s upport for vi rtual memory, memory pagi ng, and s egmentati on, but the as s es s ment l acks accuracy or detai l Does not as s es s the s ys tem s upport for vi rtual memory, memory pagi ng, and s egmentati on 5.75 Techniques
  • 19. [IT-600-03] Meets “Profi ci ent” cri teri a and s hows keen i ns i ght i nto how s eparati on of pol i cy from mechani s m can s erve as a general pri nci pl e for reduci ng compl exi ty As s es s es the techni ques us ed for memory management pol i cy and mechani s m s eparati on for thei r uti l i ty i n managi ng compl exi ty As s es s es the techni ques us ed for memory management pol i cy and mechani s m for thei r uti l i ty i n managi ng compl exi ty, but s ome techni ques are omi tted or the as s es s ment l acks accuracy Does not as s es s the techni ques us ed for memory management pol i cy and mechani s m s eparati on for thei r uti l i ty i n managi ng compl exi ty 5.75 Hardware-Software
  • 20. Interface [IT-600-04] Meets “Profi ci ent” cri teri a and draws i ns i ghtful conclus ions or i nferences about I/O techni ques acros s the ful l range of devi ces and I/O s ubs ys tems Ful l y des cri bes the hardware- s oftware i nterface for I/O management us ed by the operati ng s ys tem Des cri bes the hardware-s oftware i nterface for I/O management, but l acks detai l or accuracy of expl anati on around the rol e of the operati ng s ys tem i n control l i ng the computer’s I/O Does not des cri be the hardware- s oftware i nterface for I/O management 5.75 File Systems [IT-600-04]
  • 21. Meets “Profi ci ent” cri teri a and draws i ns i ghtful conclus ions or i nferences about the performance of the fi l e s ys tems s upported by the operati ng s ys tem Anal yzes the fi l e s ys tems s upported by the operati ng s ys tem, i ncl uding an as s es sment of fi l e s ys tem performance Anal yzes the fi l e s ys tems s upported by the operati ng s ys tem, but the anal ys is i s i ncompl ete or i naccurate Does not anal yze the fi l e s ys tems s upported by the operati ng s ys tem 5.75 Context Switching and I/O Interrupt Handling [IT-600-04] Meets “Profi ci ent” cri teri a a nd demons trates cl earl y the appl i cability of context s wi tchi ng and I/O i nterrupt handl i ng
  • 22. technol ogi es Accuratel y and comprehens i vel y anal yzes the rel ati ons hi p between s chedul ed proces s context s wi tchi ng and I/O i nterrupt handl i ng and compares to other approaches Anal yzes the rel ati ons hi p between s chedul ed proces s context s wi tchi ng and I/O i nterrupt handl i ng and compares to other approaches , but the anal ys is i s i ncompl ete or i naccurate Does not anal yze the rel ati ons hip between s chedul ed proces s context s wi tchi ng and I/O i nterrupt handl i ng or compare to other approaches 5.75 Security Model [IT-600-06] Meets “Profi ci ent” cri teri a and evi dences keen i ns i ght i nto the val ue of formal s ecuri ty model s Conci s el y anal yzes the s ys tem to
  • 23. determi ne the formal s ecuri ty model the s ys tem s upports Anal yzes the s ys tem to determi ne the formal s ecuri ty model the s ys tem s upports , but wi th gaps i n detai l or accuracy Does not anal yze the s ys tem to determi ne the formal s ecuri ty model the s ys tem s upports 5.75 Recommended Techniques [IT-600-06] Meets “Profi ci ent” cri teri a and evi dences keen i ns i ght i nto the effect recommended techni ques and bes t practi ces woul d have on further s upporti ng s ecuri ty of the operati ng s ys tem Recommends techni ques and bes t practi ces to further s upport s ecuri ty of the operati ng s ys tem Recommends techni ques and bes t practi ces , but the recommendati ons are not
  • 24. appl i cable to the operati ng s ys tem or woul d not l ogi cal ly s upport s ecuri ty Does not recommend techni ques and bes t practi ces for s upporti ng the operati ng s ys tem 5.75 Overall Evaluation [IT-600-06] Meets “Profi ci ent” cri teri a and evi dences keen i ns i ght i nto the val ue of the recommendati ons and thei r feas i bi l ity Devel ops a comprehens i ve, i ntegrated technol ogy recommendati on for the cas e bas ed on the anal ys es , as s es s ments , and defi ned requi rements Devel ops a technol ogy recommendati on for the cas e, but i s not comprehens i ve or not bas ed on the anal ys es , as s es s ments , and defi ned
  • 25. requi rements Does not devel op a technol ogy recommendati on for the cas e 5.75 Articulation of Response Submi s s i on i s free of errors rel ated to ci tati ons , grammar, s pel l i ng, s yntax, and organi zati on and i s pres ented i n a profes s i onal and eas y-to-read format Submi s s i on has no major errors rel ated to ci tati ons , grammar, s pel l i ng, s yntax, or organi zati on Submi s s i on has major errors rel ated to ci tati ons , grammar, s pel l i ng, s yntax, or organi zati on that negati vel y i mpact readabi l ity and arti cul ati on of mai n i deas Submi s s i on has criti cal errors rel ated to ci tati ons , grammar,
  • 26. s pel l i ng, s yntax, or organi zati on that prevent unders tandi ng of i deas 2.25 Earned Total 100% Page | 2 MILESTONE THREE 24 APRIL 2019 Author Note This paper was prepared for IT-600 Operating Systems, Module 7 Milestone 3, Assignment, taught by. GPOS Feature Profile Criteria Student Analysis Multiprogramming
  • 27. Tech Description It is a technological phenomenon of parallel processing in which many programs or applications run concurrently on a processor. The processor splits the processing functions without simultaneous executions. Business Requirement The organization must have an appropriate operating system to facilitate compatibity between running programs and OS. This allows flawless execution. Application Benefit It allows for efficient utilization of organization resources because one processor can handle multiple tasks that would otherwise be split. Customer satisfaction is enhanced. Implementation Tasks They are handled by schedulers within the processors. They allow for logical sequential execution of programs without interruptions. Multiprocessing Tech Description It is a simultaneous coordinated process that allows computer applications to be handled by more than one processor. It allows networked computers to process a program Business Requirement The organization must have multiple computer systems that can be synchronized to handle multiple applications within the organization. Application Benefit It enhances faster delivery of services. Multiple computers can be incorporated to speed up processing of transactions incase there is a downtime.
  • 28. Implementation Tasks Tasks can be implemented either by symmetric multiprocessing where memory is shared or massive parallel processing where processors are combined to handle an application. Multithreading Tech Description This is the capacity of the programs or OS to efficiently handle multiple user requests without duplications of functions or requests which enhances users experience. Business Requirement The business must have a large number of users that require to use a particular program at the same time. Application Benefit It reduces the inconveniences associated with a delay in processing leading to queues and congestion Implementation Tasks Work in a program is executed using threads. They are vital in tracking multiple user requests into the system and ensuring their completion. Virtual Memory Tech Description A virtual memory compensates for memory inadequacies of RAM by temporarly offering storage in the hard disk which allows for flawless execution of programs. Business Requirement The business must have multiple programs that require to run concurrently. This may drain the available RAM necessitating the need for a virtual memory Application Benefit It facilitates multiprogramming and multiprocessing. Efficiency operation of these programs requires the processor to have a
  • 29. faster access to their data in the RAM. Implementation Tasks Task execution within the virtual memory emulate the functions of RAM. System Call Interface Tech Description It establishes a vital link between the operating system and the available computer applicatons. This relationship allows for optimum performance. Business Requirement The business must provide memory management frame work, device handling and networking. Application Benefit It allows installed programs to access the required resources to facilitate their operations which enhances customer utility. Implementation Tasks Implementation of tasks may be based on process control or file management. Process allows for creation, termination and freeing of memory. Security Tech Description It incorporates a set of systems or procedures that ensures computer systems and the data contained in them is safeguarded. Business Requirement The business must implement physical and data security measures. Physical measures safeguard computer infrastructure like servers. For data you require firewalls and antivirus software. Application Benefit
  • 30. It prevents data misuse by restricting access to only the authorized recepients Implementation Tasks Tasks are implemented through continuous scanning of the applications in the computer. This is crucial in detecting malware that may compromise computer security. Device Drivers Tech Description This are tiny application imbedded within the operating system of a computer that control external peripheries like printers and scanners. Business Requirement The business must have peripheries like photocopiers, scanners, printers and projectors to optimize Application Benefit They allow the organization to operationalize its external peripherals to facilitate operations. Implementation Tasks This is majorly determined by the type of peripheral device attached to the computer Fault Tolerance Tech Description This is the capacity of the program to reasonably continue functioning despite the occurrence of major glitches that imbede full optimization. Business Requirement The business must integrate multiple redundancy systems to their applications to provide alternatives incase one fails Application Benefit It allows continuity of business operations despite a system
  • 31. breakdowns Implementation Tasks This is basedf on the criticality of the functions. Essential tasks may continue operating optimally while the non essential ones may be riddled with inefficiencies. Insert recommendation below Device drivers are important tools that would enable an entity to maximize the benefits of its peripheral components. The vital aspect of device drivers is that they can be contionously updated in order to be match the existing technology. They are thus easily adaptable from the current to future state. They can not easily slide into obsolescence. Reference · Krause, D., & Thörnig, P. (2016). JURECA: general-purpose supercomputer at Jülich supercomputing centre. Journal of large-scale research facilities JLSRF, 2, 62. Page | 2 ANALYTICAL ORGANIZATIONAL PROFILE 26 MARCH 2019
  • 32. Author Note This paper was prepared for IT-600 Operating Systems, Module 3 Milestone 2, Assignment, taught by. Creation of an Analytical Organizational Profile Overview: For this milestone, you will create an analytical organizational profile. The goal is to map each of the general- purpose operating system features identified to your analysis of what the feature is, why it is important, and what business- related problem such a general-purpose operating system feature would create if not present in a typical small-to-medium-sized business back office. Directions: Insert your answers directly in the Student Analysis column below by doing the following: · In each of the “Tech Description” fields, describe the GPOS feature using relevant technical terms and topic-related details. · In each of the “Business Requirement” fields, describe (in business terms) how the absence of this GPOS feature impacts a business such as TSI. GPOS Feature Profile Criteria Student Analysis Multiprogramming Tech Description An act of parallel processing on the platform of single processer. Programs are put in sechedule and they are not running simultaneously. Business Requirement There is use of single processers to process one particular
  • 33. program at a time such that one big has the capability of blocking small ones until it goes to completion. Multiprocessing Tech Description It has multiple processors that can even work on more than one processes simultaneously. Business Requirement It upgrades the lifetime for TSI since it doubles the output unlike the single processor system. Multithreading Tech Description It is shared in cache for quicker accessing either through register or cache. Although threads are smaller, they create process together. Business Requirement Currently, TSI is removing functionaility of threading by open source software since it lacks system call interface which is beyond read and write. Besides, TSI is not to create multiple threads. Virtual Memory Tech Description A temporary data transfer from RAM to disk if RAM is overloaded. Business Requirement TSI has inadequate memory and its system crashes frequently compelling the adminstrators to constantly reboot their systems. Indeed, they should have virtual memory model which utilizes paging for avoidace of crashing of the system in future. System Call Interface Tech Description It exists between user’s application and kernel. In fact, it translates user’s command into kernel language for command execution. Kernel language should be developed to all
  • 34. customers. Business Requirement TSI is known for creation of custom system calls sicne they an interfae that is not compatible to other software. Developers should create special system calls to be used. Security Tech Description Protects software from intruders or unauthorized access to the system. Business Requirement It enhances protection of the system’s information whereas TSI has low amount of security. Device Drivers Tech Description Controls the connection of devices to programs. Business Requirement It allows installation of TSI software disk to aid operation of a printer. Fault Tolerance Tech Description Creates program that brings changes to prevent systems from crashing. Business Requirement TSI needs to have fault tolerance to avoid having troubles in programming while developing their devices drivers
  • 35. Reference · Krause, D., & Thörnig, P. (2016). JURECA: general-purpose supercomputer at Jülich supercomputing centre. Journal of large-scale research facilities JLSRF, 2, 62. Page | 2 WEB COMMUNICATIONS 18 MARCH 2019 Author Note This paper was prepared for IT-600 Operating Systems, Module 2 Milestone 1, Assignment, taught by The TSI OS has several constraints that are a huge burden to the day to day operations of the company. The deficiencies in its operating system have a huge toll in the operations and day to day activities of the company. Not only
  • 36. do these constraints affect a company, they also affect its customers, and how they access services from TSI. Customers have to face a lot of problems when accessing these services, especially during peak hours when the load on the system is enormous. This stretches the burden even more, not only on the operations in the company, but also creates business related challenges to the company in areas such as customer recruitment and retention. TSI experiences several business related challenges due to the state of its TSI Operating System. The first and one of the most visible challenges is the challenge in customer service. Due to the constraints in the TSI OS, the system provides its users with poor services, especially during peak periods. During these times, the system is overloaded, and experiences deadlocks, which cause the users to experience system crashes as they use the site. This greatly affects customer satisfaction, which may be a great barrier to the company in being able to retain its customers and keep them interested. The company also has to cater for the high cost of maintaining the system. Due to the fragile nature of the system, the constant crashes and reboots often require programmers and technical experts to be on site in the backroom all the time, so that they can resolve any running errors that occur. This becomes expensive for the company, as the skills needed to maintain such a fragile and rigid system are very high. Also, the company pays programmers to modify their open source software, which is a very expensive venture because they require highly experienced software programmers for the job. In a recent example, British Airways, a leading airline company worldwide faced for the sixth time in a year, global IT failures. In 2017, the company experienced six major software failures that affected flights, their worldwide call centres, their website as well as their mobile app. This resulted in a full blown lockdown in May of 2017, where the airlines cancelled all their flights from Heathrow and Gatwick airports, which are major hubs in their airline network. Further studies showed that the
  • 37. error was indeed avoidable, but the airline had made hundreds of the staff in its IT department redundant in the previous year, 2016 (Hatton, 2017). As a customer of TSI, the TSI Operating System would cause a lot on inconvenience in my productivity at work. Because it is unable to perform multi-processing, it would require me to dig deeper into my pocket, as well as spend time and effort in finding old hardware that has single core software, so as to be compatible with the TSI system. The system would also cause a lot of inconvenience for me in the case where it crashed while I was in the middle of an important activity, process or transaction on the system. This would result in many troubles, such as loss of data and waste of time and resources. I would be forced to repeat the same activity several times during peak hours if the system crashed in the middle of a transaction. Reference Hatton, L. (2017). Software failures-follies and fallacies. IEE Review, 43(2), 49-52.