5 Writing Assignment Business Finance Assignment Help

5 Writing Assignment Business Finance Assignment Help. 5 Writing Assignment Business Finance Assignment Help.


(/0x4*br />

  • Related Reading:
  • Prompt: Complete a reference list (bibliography) consisting of a minimum of 10 scholarly sources on the topic of leadership that will be used as references in your final paper. List the sources alphabetically by author. Only one internet source can be used and the remaining sources should consist of either journal articles or scholarly books.
  • Requirements: Ten scholarly sources, APA format

5 Writing Assignment Business Finance Assignment Help[supanova_question]

Entry levle information technology resume Writing Assignment Help

Unit Secretary/Customer Service Representative 2017 to May 2019

Sanford Health Hospital | Fargo, ND

  • Scheduled appointments in a call center environment
  • Handled front office duties and greeted patients
  • Entered/updated patient demographic information into the EMR system
  • Handled admissions and discharges
  • Answered busy multi-line phone system (100+ calls daily)
  • Verified medical insurance information
  • Collected co-payments
  • Obtained authorizations for procedures
  • Answered inquiries about billing, procedures, etc.
  • Scheduled appointments in a call center environment
  • Handled front office duties and greeted patients
  • Entered/updated patient demographic information into the EMR system
  • Handled admissions and discharges
  • Answered busy multi-line phone system (100+ calls daily)
  • Verified medical insurance information
  • Collected co-payments
  • Obtained authorizations for procedures
  • Answered inquiries about billing, procedures, etc.

Washington Hospital Center Washington, D.C.

Help Desk 2015 – 2017

  • Provided organizational leadership in using MailChimp, which was instrumental in sharing emails with customers as well as advertising – creating effective and fantastic campaigns through MailChimp.
  • Installed hardware and software – maintaining hardware peripherals through configuring of software.
  • Monitored help desk system for incoming requests and resolve or escalate accordingly
  • Troubleshoot desktop, laptop, printer, hardware, software and other peripheral device issues
  • Fully documented all steps and communication for each issue
  • Document processes and procedures Diagnose hardware, software and network problems remotely.
  • Install, configure and support PC workstations, thin client workstations, printers, scanners and multi-function devices
  • Educate users related to hardware, software, systems and processes.
  • Track prioritize and document requests using a Support Desk ticket system.
  • Perform on site hardware, software and infrastructure assessments and support.
  • Keep front desk clean, tidy and supplied with all the necessary supplies
  • Greet, communicate with and welcome guests
  • Answer all the customers’ questions and address their complaints
  • Answer all incoming calls, redirect them when needed
  • Receive letters, packages and send them to appropriate destination
  • Prepare and manage outgoing mail
  • Check, sort and forward emails
  • Monitor office supplies
  • Make supply orders when needed
  • Monitor and update records and files
  • Monitor and log office expenses and costs

Washington Hospital Center Washington, D.C. 2010-2014

EDUCATION

2017-2019

BSC. Cyber Security, American Public University

2004-2007

Teachers Certificate, Northern Polytechnic – Makeni Teacher’s College, Freetown, Sierra Leone

AFFILIATIONS

National Cyber League, Order of the Sword, and Shield National Honor Society

[supanova_question]

what is windshield survey? Writing Assignment Help

Windshield Survey

  • Assessment Tabs

  • Toggle Drawer

    Overview

    Conduct a windshield survey to identify a population and its primary health concern. Develop a 3–5-page report that explains demographic changes for a population and describes the health disparities and social determinants of health that can affect the population.Note: The assessments in this course build upon each other. You are strongly encouraged to complete them in sequence.Show MoreBy successfully completing this assessment, you will demonstrate your proficiency in the following course competencies and assessment criteria:

    • Competency 1: Explain the principles and concepts of disease prevention and health promotion for diverse and vulnerable populations.
      • Describe a vulnerable or diverse population living within a neighborhood or community.
      • Describe disease prevention and health promotion for a vulnerable or diverse population.
    • Competency 4: Examine the ethical, legal, and economic factors related to health disparities in diverse and vulnerable populations.
      • Identify health disparities and social determinants of health that can affect a vulnerable or diverse population.
    • Competency 5: Communicate in a manner that is scholarly, professional, and consistent with expectations for members of the health care professions.
      • Describe the overall condition of a neighborhood or community.
      • Write content clearly and logically, with correct use of grammar, punctuation, APA formatting, and mechanics.
    Competency Map

    Check Your ProgressUse this online tool to track your performance and progress through your course.

  • Toggle Drawer

    Context

    As the population of the United States grows more diverse, the health care workforce must increase awareness of cultural differences and the overall shift in the demographics of the entire population. To provide high-quality health care to a community or population, health workers and educators must be competent in their understanding of the relevant characteristics of its ethnic or cultural groups. The ability of nurses to deliver high-quality care to a diverse population will influence health prevention and the treatment of illness.Show More

    Windshield Surveys

    A windshield survey helps you create a portrait of the people who live within a specific neighborhood or community. This is an inexpensive, time-efficient way to assess and better understand a community and the people who live within that community. Understanding the demographics of a community will help you determine the kinds of health-related issues that are likely to exist, so you can plan the most appropriate types of wellness programs, health education, and disease prevention.

  • Toggle Drawer

    Questions to Consider

    To deepen your understanding, you are encouraged to consider the questions below and discuss them with a fellow learner, a work associate, an interested friend, or a member of the business community.

    • What are the most important things to know about a population in order to address health care needs?
    • What vulnerable and diverse populations are present in your community?
  • Toggle Drawer

    Resources

    Required Resources

    The following resources are required to complete the assessment.

    Capella Resources

    Click the link provided to view the following resource:

    Show More

    Suggested Resources

    The following optional resources are provided to support you in completing the assessment or to provide a helpful context. For additional resources, refer to the Research Resources and Supplemental Resources in the left navigation menu of your courseroom.

    Capella Multimedia

    Click the links provided below to view the following multimedia pieces:

    Library Resources

    The following e-books or articles from the Capella University Library are linked directly in this course:

    Course Library Guide

    A Capella University library guide has been created specifically for your use in this course. You are encouraged to refer to the resources in the BSN-FP4010 – Health Promotion and Disease Prevention in Vulnerable and Diverse Populations Library Guide to help direct your research.

    Bookstore Resources

    The resource listed below is relevant to the topics and assessments in this course and is not required. Unless noted otherwise, this resource is available from the Capella University Bookstore. When searching the bookstore, be sure to look for the Course ID with the specific –FP (FlexPath) course designation.

    • Pérez, M. A., & Luquis, R. R. (Eds.). (2014). Cultural competence in health education and health promotion (2nd ed.). San Francisco, CA: Jossey-Bass.
      • Chapters 1, 2, 3, 7, and 9.
  • Assessment Instructions

    Preparation

    Over the past few years, leadership for the health care organization for which you work has noticed a distinct change in the population served by the organization. Leadership wants to make sure they are addressing the needs of this population. You have been asked to participate on an interdisciplinary team that is charged with learning how the population has changed and what needs to be done within the organization to develop a wellness education program that will target the needs and concerns of the population. Your first step in this process is to conduct a windshield survey and report your findings back to your team.A windshield survey is an inexpensive, time-efficient way to assess and better understand a community and the people who live within that community. Understanding the demographics of a community will help you determine the health-related issues that are likely to exist so you can plan the most appropriate types of wellness programs, health education, and disease prevention programs. Windshield surveys are done by making visual observations of a neighborhood or community while driving; hence the name. This type of survey lets you observe the housing conditions, use of open spaces, shopping, schools, types of transportation, human services, protective services, and other aspects of the overall daily life of a community.Before you start, you need to identify the boundaries of the neighborhood or community you plan to observe. For the purposes of this course, you should keep the size of the area to no more than 2–3 square miles. The area should be large enough for you to gather relevant information, but small enough that your observation does not take you more than 1–2 hours. With this size, it is not necessary to use a car to complete the survey; you can also walk or bike. Whichever method you use, be mindful of your personal safety. It may be helpful to map out the route you will take ahead of time. It can also be helpful (and safer) to have another person do the driving while you observe and make notes.Once you are on the route, start making observations right away. Stop frequently to write down notes. A template is provided in the Required Resources to help you document your observations.The timing of your observation can be important in helping you focus on specific items. If possible, consider conducting your survey more than once at different times of the day. For example, if you make your observations too early in the morning, you may miss things that take place later in the day that provide a different perspective of the neighborhood. It is also important to be as objective as possible when making your observations.

    Requirements

    • Conduct the windshield survey, using the template located in the Required Resources for this assessment.
    • Use the template as a guide to write a report for your team. If possible, look at other written documents used within your organization. How are they formatted? Follow that format as closely as possible, making sure you still use APA guidelines for your in-text references, citations, and reference page.

    Based on your observations and notes from your survey experience, write a report that includes the following:

    • Describe, briefly, the neighborhood or community you observed (overall condition, types of spaces and businesses, evidence of services, and so forth).
    • Describe a vulnerable or diverse population you observed living within the neighborhood or community.

    Now you will need to do some research on the population you described:

    • Explain how the demographics for the population have changed over the past 5–10 years. Note: This information should be readily available through the United States Census Bureau, similar state Web sites, the Bureau of Labor Statistics, or other professional sites. Be sure your information is current.
    • Describe the most prevalent health risks for the population. For example, if your population is senior citizens, then the health risks might be diabetes and loss of mobility. Include statistics on the health risks, such as frequency of occurrence in the population and number of deaths per year in the population.
    • Identify the health disparities and social determinants of health that can affect the population. In other words, what will you need to overcome to develop a successful health promotion and disease prevention program for the population?

    Your completed assessment should be 3–5 pages in length, not including the title page and reference page. Support your information with references to at least three professional, scholarly, or government resources, and follow current APA guidelines for your in-text citations and references.

    Additional Requirements

    • Include a title page and reference page. The completed assessment should be 3–5 pages in length, not including the title page and reference page.
    • Reference at least three current scholarly, professional, or government resources.
    • Use current APA format for citations and references.
    • Use Times New Roman font, 12 point.
    • Double space.
  • [supanova_question]

    18-26 (Objectives 18-3, 18-4) Assignment Help

    18-26 (Objectives 18-3, 18-4) In testing cash disbursements for the Jay Klein Company, you obtained an understanding of internal control. The controls are reasonably good, and no unusual audit problems arose in previous years.

    Although there are not many individuals in the accounting department, there is a reasonable separation of duties in the organization. There is a separate purchasing agent who is responsible for ordering goods and a separate receiving department that counts the goods when they are received and prepares receiving reports. There is a separation of duties between recording acquisitions and cash disbursements, and all information is recorded in the two journals independently. The controller reviews all supporting documents before signing the checks, and he immediately mails the checks to the vendors. Check copies are used for subsequent recording.

    All aspects of internal control seem satisfactory to you, and you perform minimum tests of 25 transactions as a means of assessing control risk. In your tests, you discover the following exceptions:

    • 1. One invoice was paid twice. The second payment was supported by a duplicate copy of the invoice. Both copies of the invoice were marked “paid.”
    • 2. Two items in the acquisitions journal were misclassified.
    • 3. Three invoices were not initialed by the controller, but there were no dollar misstatements evident in the transactions.
    • 4. Five receiving reports were recorded in the acquisitions journal at least 2 weeks later than their date on the receiving report.
    • 5. Two receiving reports for vendors’ invoices were missing from the transaction packets. One vendor’s invoice had an extension error, and the invoice was initialed that the amount had been checked.
    • 6. One check amount in the cash disbursements journal was for $100 less than the amount stated on the vendor’s invoice.
    • 7. One voided check was missing.

    Required

    a.

    Identify whether each of 1 through 7 is a control test deviation, a monetary misstatement, or both.

    b.

    For each exception, identify which transaction-related audit objective was not met.

    c.

    What is the audit importance of each of these exceptions?

    d.

    What follow-up procedures would you use to determine more about the nature of each exception?

    e.

    How would each of these exceptions affect rest of the your audit? Be specific.

    f.

    Identify internal controls that should have prevented each misstatement.

    Discussion

    Respond to the following in a minimum of 175 words:

    An audit program relates to the
    acquisition, fixed assets, notes payable and equity cycles and accounts.

    Discuss audit tests of notes payable and related accounts and transactions. How does this apply to your chosen organization?

    Current Issue Summary

    Top of Form

    Write a 525-word summary.

    Research a recent article on auditing acquisitions, payments, property plant and equipment (fixed assets), notes payable, or owner’s equity.

    Apply what you learn to your future or current job.

    [supanova_question]

    Application of a decision making framework to an IT-related ethical issue Writing Assignment Help

    For this paper, the following five elements must be addressed:

    • Describe a current IT-related ethical issue: Since this is a paper exercise, not a real-time situation, you may want to construct a brief scenario where this issue comes into play, and thus causes an ethical dilemma. The dilemma may affect you, your family, your job, or your company; or it may be a matter of public policy or law that affects the general populace. See the list below for a list of suggested issues, which may be a source of ethical dilemmas.
    • Define a concise problem statement that is extracted from the above description or scenario. It is best if you define a specific problem caused by the dilemma, that needs a specific ethical decision to be made, that will solve the dilemma. Be aware that if it is a matter of public policy or law, that it may require a regulatory body or congressional approval to take action to implement a solution.
    • Analyze your problem using one of the structured decision-making frameworks chosen from Module 2. Make sure that you identify the decision-making framework utilized. In addition, the steps in the decision-making framework selected must be used as major headings in the Analysis section.
    • Consider and state the impact of the decision that you made on an individual, an organization, stakeholders, customers suppliers, and the environment, as applicable!
    • State and discuss the applicable ethical theory from Module 1 that supports your decision.

    Concerning your paper:

    • Prepare a minimum 3- 5 page, double-spaced paper
    • Provide appropriate American Psychological Association (APA) source citations for all sources you use. In addition to critical thinking and analysis skills, your paper should reflect appropriate grammar and spelling, good organization, and proper business-writing style.

    For example, Kidder’s approach has nine steps, which are:

    • Recognize that there is a moral issue.
    • Determine the actor (whose moral issue is it?).
    • Gather the relevant facts.
    • Test for right-versus-wrong issues.
    • Test for right-versus-right paradigms (what sort of dilemma is this?).
    • Apply the resolution principles (ends-based, rule-based, or care-based).
    • Investigate the “trilemma” options (look for common ground or compromise).
    • Make the decision.
    • Revisit and reflect on the decision. (Kidder, 1995, p. 183-187)

    Reminder: Each of the steps for whatever framework that you select must be a major headingin the Analysis section of your paper.

    Here are some suggested issues for you to consider, the additional text is designed to help you flesh out the issue:

    1. Privacy on the Web: What is happening now in terms of privacy on the Web? Think about recent abuses and improvements. Describe and evaluate Web site policies, technical and privacy policy protections, and current proposals for government regulations.
    2. Personal Data Privacy Regulations in Other Countries: Report on personal data privacy regulations, Web site privacy policies, and governmental/law enforcement about access to personal data in one or more countries; e.g., the European Union. This is especially relevant as our global economic community expands and we are more dependent on non-US clients for e-business over the Internet.
    3. Computer-Based Crimes: Discuss the most prevalent types of computer crimes, such as Phishing. Analyze why and how these can occur. Describe protective measures that might assist in preventing or mitigating these types of crimes.
    4. Government Surveillance of the Internet: The 9/11 attacks on the US in 2001 brought many new laws and permits more government surveillance of the Internet. Is this a good idea?
    5. The Digital Divide: Does it exist; what does it look like; and, what are the ethical considerations and impact?
    6. Privacy in the Workplace – Monitoring Employee Web and E-Mail Use: What are current opinions concerning the monitoring of employee computer use. What policies are employers using? Should this practice of monitoring, be authorized or not?
    7. Medical Privacy: Who owns your medical history? What is the state of current legislation to protect your health information? Is it sufficient? There are new incentives with federal stimulus financing for health care organizations to develop and implement digital health records.
    8. Software Piracy: How many of you have ever made an unauthorized copy of software, downloaded software or music (free or for a fee), or used copyrighted information without giving proper credit or asking permission? Was this illegal or just wrong? How is this being addressed?
    9. 9. Consumer Profiling: With every purchase you make, every Web site you visit, your preferences are being profiled. What is your opinion regarding the legal authority of these organizations to collect and aggregate this data?
    10. Biometrics & Ethics: Your fingerprint, retinal-vessel image, and DNA map can exist entirely as a digital image in a computer, on a network, or in the infosphere. What new and old ethical problems must we address?
    11. Social Networking: What are some of the ethical issues surrounding using new social networks? How are these now considered for business use? What are business social communities? Are new/different protections and security needed for these networks?
    12. Gambling in Cyberspace: Is it legal? Are there national regulations and/or licensing? What are the oversight and enforcement requirements? Are there international implications? What are the social and public health issues?
    13. Pornography in Cyberspace: For example, the U.S. Supreme Court ruling protecting as free speech computer-generated child pornography
    14. Medicine and Psychiatry in Cyberspace: Some considerations include: privacy issues; security; third-party record-keeping; electronic medical records; access to information, even by the patient (patient rights); access to information by outsiders without patient knowledge; authority to transfer and/or share information. Are there any policies proposed by professional organizations?
    15. Counterterrorism and Information Systems: Your protection versus your rights
    16. Open-source Software versus Closed-source Software: Ethical ramifications and impact on intellectual property law
    17. Creative Commons Licenses: How do they work and what are the legal and ethical impacts and concerns?
    18. Universal ID card: What is the general position of the U.S. government about issuing each individual a unique ID card? Which individual U.S. government agencies have already provided a unique ID card? What steps have been taken to include individual ID information electronically in passports? How is privacy and security provided?
    19. Video Games: Does playing video games distract from everyday responsibilities? Do video games correlate with real world violence? Why do game creators continually increase the violence of video games? What is video game addiction?
    20. Cyberbullying: What is cyberbullying and what can be done to stop it?
    21. Net Neutrality: What is the current position of the federal government and is it fair to all?

    [supanova_question]

    [supanova_question]

    250 words minimum Writing Assignment Help

    A new muscle relaxant is available. Researchers from the firm developing the relaxant have done studies that indicate that the time lapse between administration of the drug and beginning effects of the drug is normally distributed, with mean LaTeX: mu=38μ=38 minutes and standard deviation LaTeX: sigma = 5σ=5 minutes.

    • The drug is administered to one patient selected at random. What is the probability that the time it takes to go into effect is 35 minutes or less?
    • The drug is administered to a random sample of 10 patients. What is the probability that the average time before it is effective for all 10 patients is 35 minutes or less?
    • Explain the differences in the results that you found.
    • What types of studies, and information do you think drug companies need to do as they are developing new treatments?

    250 words minimum Writing Assignment Help[supanova_question]

    Report survey on any topic from library database. Humanities Assignment Help

    Need to write a report of about 800 words on any topic from the library database.

    INSTRUCTION / SAMPLE FROM THE PROFESSOR:

    The following surveys of fact (T/F) and opinion (Y/N) are models to use for your own surveys of fact and opinion in personal research on your chosen SIRS topic. As below, you will construct paragraphs to describe and analyze the responses to your statements of knowledge and opinion. The paper does not need to show the survey questions in their original format, so long as it faithfully records the statements, responses by your ten respondents, and your analysis—as shown after the survey below.

    Mark each statement below as true or false to show knowledge of facts.

    T/F 1. From the early 1980s to 2005, the number of families filing for bankruptcy in the US

    grew to five times its earlier level.

    T/F 2. Economic mobility is now higher in Scandinavia than America.

    T/F 3. Only 3% of eighth graders from poor families scoring in the bottom fourth of their class finished college, although 30% of eighth graders from rich families scoring in the

    bottom fourth of their class finished college.

    T/F 4. Oddly, though economic inequality has risen in China, the poverty rate has fallen.

    T/F 5. On average, higher education and non-cognitive skills (study habits, timeliness, and

    a work ethic) do not raise income.

    Mark each statement below as yes or no to show opinions.

    Y/N 1. Reaching a higher social class is as possible as ever in the USA.

    Y/N 2. The American Middle Class is shrinking.

    Y/N 3. All people graduating from college are especially smart.

    Y/N 4. All college entrants can graduate with a bachelor’s degree.

    Y/N 5. Everyone in the United States needs a bachelor’s degree to survive.

    Sample Reporting on the Survey within a Paper on Economic Inequality

    The knowledge of economic mobility and inequality was uneven among respondents to a

    survey of fact and opinion. Ten people were surveyed. Fifty percent* of those surveyed did not

    realize that bankruptcies became five times more common from the early 1980s to 2005. Most

    people (80%) disbelieved the fact that economic mobility is now greater in Scandinavia than in

    America. And most people (70%) did not believe that with growing economic inequality came

    less poverty in China. But most people (90%) did realize that higher education does create a

    higher wage potential over a lifetime.

    As to opinions, some people matched the facts they knew to corresponding opinions, and

    some did not. Eighty percent agreed that the Ameriican Middle Class is shrinking. And most

    people (70%) correctly guessed or knew that 30% (nearly one third) of the rich that score low in

    the eighth grade still finish college. But, despite this, 90% of the same survey group opined that

    “All people graduating from college are especially smart.” Likewise, although half of those

    surveyed knew that the percentage of bankruptcies has grown to five times its pre-80s rate, only

    20% registered a belief that the American Middle Class is shrinking.

    *Facts reported here would have been previously established and cited by source in an earlier section of the paper. Otherwise they must be cited here. Also note that numbers that start a sentence must be spelled out, although the numbers beyond ten incorporated later in the sentence can be typed as Arabic numbers.

    From this data, it appears that people’s sense of facts does not always match with or sway their opinions. So those responding to the survey portray a cognitive dissonance between what they know to be facts and what they feel to be their opinions. The ideas of ever-increasing social mobility and richness as a reward for intelligence may be mythical, but these people still seemed to hold these views despite some knowledge of the facts. And many seemed confused by the fact that rising economic inequality in China could not cancel any gains for the poorest. The belief that a more capitalist system can benefit both rich and poor does not apparently register, as if all

    income fits a zero-sum model where any gain to one hurts another. In fact, the reports back a belief that all boats rise in a tide of economic prosperity.

    LINK TO LIBRARY DATABASE:

    http://sks.sirs.com.dcccd.idm.oclc.org/webapp/issu…

    [supanova_question]

    Finanicial management Business Finance Assignment Help

    You will be required to submit a final paper which will synthesize all that you have learned in the
    module.
    This goal of this project is to capture the various strategic elements that you have learned about.
    The project should provide an executive summary and then an in-depth description of the
    strategic components that have resonated with you.
    Select a topic that interests you. Identify the various issues that should be addressed when
    working on this topic.
    If you cannot utilize a “real-life” example, you could create a fictional one.
    The paper should be 12-15 pages in length and fully cover the assigned topic. More information
    about the paper will be in the Final Paper/Presentation section of Blackboard.
    You will also be required to prepare a presentation that will be uploaded to Blackboard. The
    presentation is an executive overview of your paper and should be 8-10 minutes in length. Your
    presentation will include speaker notes for each slide.

    [supanova_question]

    ENC1102 Miami Dade College Death Penalty Research Proposal Writing Assignment Help

    What is a research proposal?

    Your initial research proposal will a brief, single-paragraph summary of what your Persuasive Argument research paper will be about, including the position you are taking on your topic. The thesis statement will be included in your proposal.

    What’s included?

    As much as possible at this point in your writing, include your paper’s purpose, main points, method, findings, and conclusions. If you have not yet reached a conclusion, nor researched thoroughly, include what you expect will be your conclusion. After your paper is completed, you can always go back and change it or add to it as long as it stays within the word limit.

    How long should it be?

    The proposal’s length should be a minimum of 150 words and a maximum of 300 words; it should be confined to a single paragraph. Unlike in other paragraphs in the paper, the first line of the proposal should not be indented.

    [supanova_question]

    Operating system quiz for college Computer Science Assignment Help


    QUESTION 1

    • Process A and Process B are properly inaccessible from one another, when one fails without affecting the other the strategy is known as ——————-

    A. The principle of isolation

    B. The principle of starvation

    C. The principle of inclusion

    D. The principle of time share

    2 points

    QUESTION 2

    • When User A and User B allocated their set of tickets among their own jobs in whatever currency they would like, the system then routinely alters the said currency into the correct —————

    A. Currency value

    B. Global value

    C. Lottery value

    D. Ticket value

    2 points

    QUESTION 3

    • What type of segmentation is focused on few segments of the systems like code, base, and bounds?

    A. fine-grained

    B. dirty bits

    C. Coarse-grained

    D. page table

    2 points

    QUESTION 4

    • User B is running 5 jobs UB1, UB2, UB3, UB4, and UB5 and gives them 1 ticket each(out of 10 total). User A is running four jobs, UA1, UA2.

    UA3 and UA4, and gives them each 250 tickets (out of 1000 total) in User A s own currency.

    What is the conversion rate for each of the jobs for User B?

    A. 50

    B. 25

    C. 20

    D. 15

    2 points

    QUESTION 5

    • Process A performed a load, a store, or an instruction fetch, another process B is not able to access information from process A or any

    other processes to affect their memory contents. What goal of the virtual machine does not allow any process to access anything outside its own

    address space

    A. Control

    B. Efficiency

    C. Transparency

    D. Protection

    2 points

    QUESTION 6

    • User A holds tickets 0-74 and User B holds tickets 75-99 in a lottery scheduling, What does it mean for a winning ticket?

    A. Simply calculates the time whether ticket A or B runs and it is then loaded by the scheduler

    B. Simply underestimates whether ticket A or B runs and it is then loaded by the scheduler

    C. Simply calculates the time whether ticket A or B runs and it is then unloaded by the scheduler

    D. Simply determines whether ticket A or B runs and it is then loaded by the scheduler

    2 points

    QUESTION 7

    • What type of priority will MLFQ use to keep the priority of Job A High if Job A repeatedly gave out its time slice before it expires?

    A. Gaming behavior

    B. Observed behavior

    C. Starvation behavior

    D. Current Behavior

    2 points

    QUESTION 8

    • When the relocation of the address happens at runtime, and because we can be moved even after the process has started running, the technique

    is often referred to as:

    dynamic location

    static location

    static relocation

    dynamic relocation

    2 points

    QUESTION 9

    • What are the two programs that grow and shrink in the physical memory?

    A. Heap

    B. Base

    C. Stack

    D. Bounds

    2 points

    QUESTION 10

    • Suppose Process B is referenced to virtual address 50 (which is in the code segment). What will be the desired physical address:

    A. 32868

    B. 32818

    C. 82KB

    D. 50KB

    2 points

    QUESTION 11

    • In order to optimize turnaround what algorithm will best be used?

    A. First Come First Serve

    B. Shorter Time to Completion First

    C. Round Robin

    D. Shorter Job First

    2 points

    QUESTION 12

    • What are the characteristics of physical address in paging?

    A. Address translation

    B. Virtual Page Number

    C. Physical Frame Number

    D. Offset

    2 points

    QUESTION 13

    • When the OS transforms a virtual address into a physical address, the technique is referred to as

    A. Address space

    B. Address Translation

    C. Memory space

    D. Memory Translation

    2 points

    QUESTION 14

    • In a 64KB physical memory space, where in the address space will the code of an Operating System occupies?

    A. 0KB

    B. 1KB

    C. 16KB

    D. 32KB

    2 points

    QUESTION 15

    • Which of the segment in the address space contains malloc d data and dynamic data structures?

    A. Heap

    B. Stack

    C. Address space

    D. Physical memory

    2 points

    QUESTION 16

    • In a situation, Process A trusts Process B and vice versa. What type of ticket uses this situation?

    A. Transfer

    B. Global

    C. Currency

    D. Inflation

    2 points

    QUESTION 17

    • Goals of virtualization of memory include the following

    A. Efficiency

    B. Transparency

    C. Protection

    D. All of the above

    2 points

    QUESTION 18

    • When a load is made at a certain address 120 instead of 0, What are the keys to virtual memory?

    A. Some future computers

    B. Some libraries and other software support

    C. Some past computers

    D. Some hardware support and the operating system

    2 points

    QUESTION 19

    • What basic rule will allow both the highest topmost job and the lowest job priorities to have the same top priority and what type of

    scheduling is used among them?

    A. rule 1

    B. rule 2

    C. Rule 5

    D. Round robin

    2 points

    QUESTION 20

    • In what numbering format is User A able to identify the value of the virtual address of a process on a screen?

    A. Hexadecimal

    B. Binary

    C. Octal

    D. Decimal

    2 points

    QUESTION 21

    • What is the biggest issue when multiple programs are allowed to reside concurrently in memory?

    A. Control

    B. Efficiency

    C. Transparency

    D. Protection

    2 points

    QUESTION 22

    • What certain elements do we assume to be good of lottery scheduling?

    A. Simplicity of its implementation

    B. Complexity of its implementation

    C. Complex random number

    D. Simple random number

    2 points

    QUESTION 23

    • Base and bounds (or dynamic relocation has some strengths and weaknesses as a mechanism for implementing vitual memory.

    A. Provides protection and little space overhead

    B. Not Flexible and does not support sparse address space

    C. Simple and fast

    D. All of the above

    2 points

    QUESTION 24

    • User AOU was able to have an optimized interactive response to the system after Process A was able to maximized turnaround time. What type of

    scheduler allows this scenario?

    A. First-In First-Out

    B. The Multi-level Feedback Queue

    C. Shortest-Job -to Completion First

    D. Lottery Scheduling

    2 points

    QUESTION 25

    • What idea was used to guarantee User A (CPU-bound job) to move to the top of the queue?

    A. Periodically boost the priority

    B. Round robin

    C. Avoid starvation

    D. First in first out

    2 points

    QUESTION 26

    • Instead of optimizing for turnaround or response time, lottery scheduling is based on the concept that Jobs must be insured of and be:

    A. Insecure of cpu usage time

    B. Assured of cpu usage time

    C. Given i/o usage time

    D. Insecure of i/o usage time

    2 points

    QUESTION 27

    • A base and bounds pair register is used In a system to virtualize a 1KB address space in the following address reference : Trace the Virtual Address

    VA 0: 0x00000308 (decimal: 776) –> VALID: 0x00003913 (decimal: 14611)

    VA 1: 0x00000308 (decimal: 597) –> VALID: 0x00003860 (decimal: 14432)

    VA 2: 0x000003A1 (decimal: 929) –> SEGMENTATION VIOLATION

    What is the value of the base register for VA 0?

    A. 15387

    B. 13611

    C. 15611

    D. 13835

    2 points

    QUESTION 28

    • Where in physical memory will a process 108 be fetched when the hardware needs this instruction?

    A. at physical address of 32640

    B. at physical address of 32886

    C. at physical address of 32876

    D. at physical address of 32660

    2 points

    QUESTION 29

    • What is one advantage of paging over segmentation?

    A. uses code, base and bound

    B. does not lead to external fragmentation

    C. the stack uses a negative offset

    D. uses the bounds to check the legality of a running process

    2 points

    QUESTION 30

    • Lottery scheduling uses ticket to represent a share of the CPU. If process A has 150 and another process B has 300, process A should roughly

    run 1/3 of the time. Does lottery scheduling prevent starvation?

    A. Probalistically no if ticket allocation is wildly imbalanced

    B. Probalistically yes if ticket allocation is wildly imbalanced

    C. No for lottery scheduling has been around for a long time

    D. None of the above

    2 points

    QUESTION 31

    • What will User A and User B need to apply lottery scheduling effectively?

    A. A good random number generator

    B. A data pointer to track the list

    C. Total number of vaiables

    D. All of the above

    2 points

    QUESTION 32

    • What objective will User B achieve when bounds are used?

    A. All addresses generated by the base are legal and within the bounds of the process

    B. All addresses asserted by the process are illegal and within the bounds of the process

    C. All addresses generated by the process are legal and within the bounds of the process

    D. All disk addresses generated by the process are legal and within the bounds of the process

    2 points

    QUESTION 33

    • What are the two key goals of any modern day operating system?

    A. Control

    B. Transparency and Efficiency

    C. Efficiency

    D. Protection and Base

    2 points

    QUESTION 34

    • A Process was demoted after using its time allotment at a given level to the next priority queue. What rule is used to effect the demotion?

    A. Rule 3

    B. Rule 4

    C. Rule 5

    D. Rule 4a

    2 points

    QUESTION 35

    • How does the processor translates memory when the reference is generated by the process?

    a. physical address = virtual address + bounds

    B. physical address = virtual address + base

    C. Bounds = heap + stack

    D. Bounds =Base + code

    2 points

    QUESTION 36

    • What scheduler will use observation to prioritize instead of priori knowledge?

    A. FIFO

    B. SJF

    C. SJCF

    D. MLFQ

    2 points

    QUESTION 37

    • User A is running five jobs, UA1, UA2. UA3. UA4 and UA5, and gives each 200 tickets (out of 1000 total) in User A’s own currency. User B is running 10 jobs and gives out 1 ticket each(out of the 10 total). What is the conversion rate for each of the jobs for User A?

    A. 50

    B. 25

    C. 20

    D. 30

    2 points

    QUESTION 38

    • The birth of ————– was due to the limitations of batch computing

    A. Time sharing

    B. Crude sharing

    C. Time programs

    D. Time slicing

    2 points

    QUESTION 39

    • What type of scheduling allows Job B not to use an optimized turnaround but rather uses a certain percentage of CPU time?

    A. Observed scheduling

    B. Address translation

    C. Proportional share scheduling

    D. All of the above

    2 points

    QUESTION 40

    • User B is running 5 jobs UB1, UB2, UB3, UB4, and UB5 and gives them 1 ticket each(out of 10 total). User A is running four jobs, UA1, UA2.

    UA3 and UA4, and gives them each 250 tickets (out of 1000 total) in User A s own currency. What is the global currency for User A?

    A. 50

    B. 100

    C. 150

    D. 200

    2 points

    QUESTION 41

    • What type of segmentation is focussed on many segments of the systems?

    dirty bits

    page table

    coarse-grained

    fine-grained

    2 points

    QUESTION 42

    • When the OS places a process anywhere in the address space it is ………………………………….

    A. attempting to put the process in a queue

    B. sharing memory

    C. virtualizing CPU

    D. virtualizing memory

    2 points

    QUESTION 43

    • Interactive jobs keep running in the system whereas long running cpu jobs are kept waiting in the system. What is the name given to the job that keeps giving up the resources?

    Gaming

    Starvation

    Relinquish

    Guaranteed

    2 points

    QUESTION 44

    • The priority level of Job A was reduced since it used all of its time slice. What will MLFQ use to guess the history of the job?

    A. Future behavior

    B. Current behavior

    C. Past behavior

    D. None of the above

    2 points

    QUESTION 45

    • What is the set back of lottery scheduling mechanism which allocates a number of tickets to be randomly picked?

    A. Calculation-assignment difficulty

    B. Currency-assignment delinquenty

    C. Inflation-assignment difficulty

    D. Ticket-assignment difficulty

    2 points

    QUESTION 46

    • What type of ticket uses a situation where Process A trusts Process B and vice versa?

    A. Inflation

    B. Global

    C. Currency

    D. Transfer

    2 points

    QUESTION 47

    • Lottery scheduling is based on the concept that: instead of optimizing for turnaround or response time, a scheduler might instead try to

    insure jobs are not assured of memory usage time

    insure jobs are assured of memory usage time

    insure jobs are assured of cpu usage time

    insure jobs are not assured of cpu usage time

    2 points

    QUESTION 48

    • A process performs a load, a store, or an instruction fetch, the process is not able to get information from the other processes to affect their memory contents. What goal of the virtual machine does not allow the process to access anything outside its address space

    Control

    Protection

    Efficiency

    Transparency

    2 points

    QUESTION 49

    • User B is running 5 jobs UB1, UB2, UB3, UB4, and UB5 and gives them 1 ticket each(out of 10 total). User A is running four jobs, UA1, UA2. UA3 and UA4, and gives them each 250 tickets (out of 1000 total) in User A s own currency. What is the conversion rate for each of the jobs for User A?

    A. 50

    B. 25

    C. 20

    D. 15

    2 points

    QUESTION 50

    • What kind of sharing support does the process needs from the hardward in segmentation?

    Valuable bits

    protective bits

    sharing bits

    bounds

    2 points

    QUESTION 51

    • What is the name of the content of a page table that indicates whether the page has been modified since it was brought into memory.

    Dirty bit

    Protective Bit

    Present bit

    user bit

    2 points

    QUESTION 52

    • To change the priority level of a job in its lifetime, what elements can User A use to help with the decision?

    A. Queue level

    B. Time slice

    C. Feedback level

    D. Workload

    2 points

    QUESTION 53

    • Segmentation is a generalization of base and bounds. What are its strengths and weaknesses?

    A. Supports sparse address space

    B. More internal fragmentation

    C. External fragmentation is not a problem

    D. All of the above

    2 points

    QUESTION 54

    • How many pairs of the base and bounds chip are in every Memory?

    One pair

    Two pairs

    Three pairs

    None pairs

    2 points

    QUESTION 55

    • What do we call a space that the OS creates as an easy to use concept of physical memory

    A. Heap

    B. Stack

    C. Address space

    D. Physical memory

    2 points

    QUESTION 56

    • What decision will be used by MLFQ to allow user B to be chosen ahead of User A who was ready to run?

    A. User B was on a multiple queue levels

    B. User A was on a multiple queue levels

    C. Higher priority since User B was on a higher queue

    D. Higher Priority since User A was on a higher queue

    2 points

    QUESTION 57

    • User A runs one process for a short time stopped and saved all of its state to disk, then load some other processes and continued repeatedly. What type of technology is this?

    A. Gaming

    B. Crude sharing

    C. Time sharing

    D. Starvation

    2 points

    QUESTION 58

    • What will happen if a process generates a virtual address that is greater than the bounds, or one that is negative?

    A. the CPU will lower an alarm, and the process will not be terminated.

    B. the CPU will raise an alarm, and the process will not be terminated.

    C. the CPU will raise an exception, and the process will likely be terminated.

    D. the CPU will lower an exception, and the process will likely be terminated.

    2 points

    QUESTION 59

    • An operating system in the early days of computing was considered to be

    A. A set of heap

    B. A set of stack

    C. A set of library

    D. A set of code

    2 points

    QUESTION 60

    • What is the name of the technique where the OS transforms a virtual address into a physical address?

    A. Address Translation

    B. Address space

    C. Memory space

    D. Memory Translation

    2 points

    QUESTION 61

    • What is the name given to the part of the processor that helps with address translation?

    A. Address management unit (AMU)

    B. CPU management unit (CMU

    C. Space management unit (SMU)

    D. Memory management unit (MMU)

    2 points

    QUESTION 62

    • What is the name of the segment that contains local variables arguments to routines, return values, etc.

    A. Heap

    B. Stack

    C. Code

    D. Transparency

    2 points

    QUESTION 63

    • Process 2 arrives and it is deemed as a low priority job and process 1 is deemed as a top priority job. With the rule that if A is greater

    than B then A will run and B will not have the chance to run. What are the two issues faced with MLFQ?

    A. Starvation and Monopolize

    B. Gaming and Monopolize

    C. Starvation

    D. Gaming

    2 points

    QUESTION 64

    • Which of the following allow a user to place the address space anywhere we d like in physical memory, and at the same time ensures that the

    process can only access its own address space.

    A. Base

    B. Heap

    C. stack

    D. Bounds

    2 points

    QUESTION 65

    • In a page table, a physical frame number can also be called?

    A. physical page number

    B. physical address number

    C. virtual page number

    D. virtual address number

    2 points

    QUESTION 66

    • What is the main issue with lottery scheduling?

    Ticket currency

    Ticket Assignment

    Ticket Transfer

    Ticket inflation

    2 points

    QUESTION 67

    • Which schedule uses a distinctive queues of different priority levels?

    A. Feedback on different priority levels

    B. Multi Level Feedback Queue

    C. Queues on the same priority levels

    D. Feedback on same priority levels

    2 points

    QUESTION 68

    • What is the Key to the efficiency of address translation technique?

    A. hardware support which performs the translation

    B. Software support which performs the translation

    C. The heap and bounds

    D. The Control and Transparency

    2 points

    QUESTION 69

    • Where does instructions live in virtual memory?

    A. Heap

    B. Stack

    C. Code

    D. Transparency

    2 points

    QUESTION 70

    • What element enables User B to prefer lottery scheduling than MLFQ?

    A. Algorithm

    B. Workload

    C. Randomness

    D. All of the above

    2 points

    Click Save and Submit to save and submit. Click Save All Answers to save all answers.


    QUESTION 1

    • Process A and Process B are properly inaccessible from one another, when one fails without affecting the other the strategy is known as ——————-

    A. The principle of isolation

    B. The principle of starvation

    C. The principle of inclusion

    D. The principle of time share

    2 points

    QUESTION 2

    • When User A and User B allocated their set of tickets among their own jobs in whatever currency they would like, the system then routinely alters the said currency into the correct —————

    A. Currency value

    B. Global value

    C. Lottery value

    D. Ticket value

    2 points

    QUESTION 3

    • What type of segmentation is focused on few segments of the systems like code, base, and bounds?

    A. fine-grained

    B. dirty bits

    C. Coarse-grained

    D. page table

    2 points

    QUESTION 4

    • User B is running 5 jobs UB1, UB2, UB3, UB4, and UB5 and gives them 1 ticket each(out of 10 total). User A is running four jobs, UA1, UA2.

    UA3 and UA4, and gives them each 250 tickets (out of 1000 total) in User A s own currency.

    What is the conversion rate for each of the jobs for User B?

    A. 50

    B. 25

    C. 20

    D. 15

    2 points

    QUESTION 5

    • Process A performed a load, a store, or an instruction fetch, another process B is not able to access information from process A or any

    other processes to affect their memory contents. What goal of the virtual machine does not allow any process to access anything outside its own

    address space

    A. Control

    B. Efficiency

    C. Transparency

    D. Protection

    2 points

    QUESTION 6

    • User A holds tickets 0-74 and User B holds tickets 75-99 in a lottery scheduling, What does it mean for a winning ticket?

    A. Simply calculates the time whether ticket A or B runs and it is then loaded by the scheduler

    B. Simply underestimates whether ticket A or B runs and it is then loaded by the scheduler

    C. Simply calculates the time whether ticket A or B runs and it is then unloaded by the scheduler

    D. Simply determines whether ticket A or B runs and it is then loaded by the scheduler

    2 points

    QUESTION 7

    • What type of priority will MLFQ use to keep the priority of Job A High if Job A repeatedly gave out its time slice before it expires?

    A. Gaming behavior

    B. Observed behavior

    C. Starvation behavior

    D. Current Behavior

    2 points

    QUESTION 8

    • When the relocation of the address happens at runtime, and because we can be moved even after the process has started running, the technique

    is often referred to as:

    dynamic location

    static location

    static relocation

    dynamic relocation

    2 points

    QUESTION 9

    • What are the two programs that grow and shrink in the physical memory?

    A. Heap

    B. Base

    C. Stack

    D. Bounds

    2 points

    QUESTION 10

    • Suppose Process B is referenced to virtual address 50 (which is in the code segment). What will be the desired physical address:

    A. 32868

    B. 32818

    C. 82KB

    D. 50KB

    2 points

    QUESTION 11

    • In order to optimize turnaround what algorithm will best be used?

    A. First Come First Serve

    B. Shorter Time to Completion First

    C. Round Robin

    D. Shorter Job First

    2 points

    QUESTION 12

    • What are the characteristics of physical address in paging?

    A. Address translation

    B. Virtual Page Number

    C. Physical Frame Number

    D. Offset

    2 points

    QUESTION 13

    • When the OS transforms a virtual address into a physical address, the technique is referred to as

    A. Address space

    B. Address Translation

    C. Memory space

    D. Memory Translation

    2 points

    QUESTION 14

    • In a 64KB physical memory space, where in the address space will the code of an Operating System occupies?

    A. 0KB

    B. 1KB

    C. 16KB

    D. 32KB

    2 points

    QUESTION 15

    • Which of the segment in the address space contains malloc d data and dynamic data structures?

    A. Heap

    B. Stack

    C. Address space

    D. Physical memory

    2 points

    QUESTION 16

    • In a situation, Process A trusts Process B and vice versa. What type of ticket uses this situation?

    A. Transfer

    B. Global

    C. Currency

    D. Inflation

    2 points

    QUESTION 17

    • Goals of virtualization of memory include the following

    A. Efficiency

    B. Transparency

    C. Protection

    D. All of the above

    2 points

    QUESTION 18

    • When a load is made at a certain address 120 instead of 0, What are the keys to virtual memory?

    A. Some future computers

    B. Some libraries and other software support

    C. Some past computers

    D. Some hardware support and the operating system

    2 points

    QUESTION 19

    • What basic rule will allow both the highest topmost job and the lowest job priorities to have the same top priority and what type of

    scheduling is used among them?

    A. rule 1

    B. rule 2

    C. Rule 5

    D. Round robin

    2 points

    QUESTION 20

    • In what numbering format is User A able to identify the value of the virtual address of a process on a screen?

    A. Hexadecimal

    B. Binary

    C. Octal

    D. Decimal

    2 points

    QUESTION 21

    • What is the biggest issue when multiple programs are allowed to reside concurrently in memory?

    A. Control

    B. Efficiency

    C. Transparency

    D. Protection

    2 points

    QUESTION 22

    • What certain elements do we assume to be good of lottery scheduling?

    A. Simplicity of its implementation

    B. Complexity of its implementation

    C. Complex random number

    D. Simple random number

    2 points

    QUESTION 23

    • Base and bounds (or dynamic relocation has some strengths and weaknesses as a mechanism for implementing vitual memory.

    A. Provides protection and little space overhead

    B. Not Flexible and does not support sparse address space

    C. Simple and fast

    D. All of the above

    2 points

    QUESTION 24

    • User AOU was able to have an optimized interactive response to the system after Process A was able to maximized turnaround time. What type of

    scheduler allows this scenario?

    A. First-In First-Out

    B. The Multi-level Feedback Queue

    C. Shortest-Job -to Completion First

    D. Lottery Scheduling

    2 points

    QUESTION 25

    • What idea was used to guarantee User A (CPU-bound job) to move to the top of the queue?

    A. Periodically boost the priority

    B. Round robin

    C. Avoid starvation

    D. First in first out

    2 points

    [supanova_question]

    5 Writing Assignment Business Finance Assignment Help

    5 Writing Assignment Business Finance Assignment Help

    × How can I help you?