Registry Keys Forensic Analysis

For Windows OS, Registry keys are extensively used for forensic analysis; do we have similar information in UNIX or Macintosh OSes?

Self esteem across cultures

One of the important personality factors is self-esteem. Everyone values themselves in one way or another and makes positive or negative conclusions based on their own feelings of self-esteem. These conclusions affect a person's further decisions and behaviour, including aspirations for promotion. ...

Personality and Profession

Imagine an action movie where the hero faces a bomb quickly counting down—there is one decision to be made: Do you cut the blue wire or the red one? The lives of the hero and countless civilians hang in the balance. The decision must be made swiftly—but the wrong choice would be disastrous. Now...

Organisational culture and learning

One of the ways to assess organisational culture is to map where a given organisation falls on a set of different spectra. Typical features of organisational culture include: - Innovation and risk taking - Attention to detail - Outcome orientation - People orientation - Team orientation - Aggr...

Entering a new organization

Part of successful organisational change is an organisation's ability to quickly bring new employees into alignment with the desired organisational culture. Recall your first day(s) in a new organisation, as a new student in a new school or in a new position with a new employer. Consider the importa...

Virtual versus in-person offices

Some forward-thinking entrepreneurs believe the virtual organization has 'arrived' and that employees of an organization no longer need a physical office, nor even to be located in the same city. More than ever before, work has transcended the traditional workday and the traditional workplace, due t...

The Impact of IT on Managers

The nature of work has changed dramatically with the advent of the Information Age. Undoubtedly, the number of files and emails that people create and share has increased significantly each year. Few industries are immune to this proliferation of information. Now, imagine yourself in a managerial ro...

Build versus buy a PC

Identify the top three (3) factors that have the largest influence on whether you would purchase a pre-built personal computer (PC) or whether you would build a PC. Justify your response. Suppose you are assisting a company who is shopping for new PC's for its workers. They are having a difficult...

Managing IT

What are the concepts, principles and critical thinking skills to apply in IT Management?

Computing the Last Byte Number

Two stations running TCP/IP are engaged in transferring a file. This file is 10KB long, and the payload size is 100 bytes, and the negotiated window size is 2000 bytes. The sender receives an ACK 900 from the receiver. a). Which bytes will be sent next? b). what is the last byte number that ...

TCP/IP Total Data Size Transfer

A station running TCP/IP needs to transfer a file to a host. The file contains 2048 bytes, How many bytes, including all of the TCP/IP overhead, would be sent, assuming a payload size of 512 bytes and that both systems are running IPv4? (Also assuming that the three-way handshake and window size ne...

Microsoft PowerPoint Presentations - Animation, Transitions, Handouts

What is the difference between animation and transition as it relates to a PowerPoint presentation? Review the different handout page formats. If you were giving a presentation to your coworkers about a new company product or service, which handout views would you provide and why?

IT in the public sector

How do IT applications help employees work more effectively and efficiently as individuals and groups? Provide examples. How would you contrast the perspectives of public sector stakeholders, including employees, elected officials, vendors and citizens, with respect to the use of information te...

Computer Architecture (Cache mapping)

Consider a column associative cache with 32 lines. This question assumes that all references are to memory lines; that is, a block of bytes from memory rather than a single memory word. a. What lines do 5, 21, 34, and 50 map to directly? (Consider the references to be memory line references.) ...

Data Transmission Speeds Over Modern Channels and Ethernet

     An image is 1024x768 pixels with 3 bytes/pixels. Assume the image is uncompressed. How long does it take to transmit it over a 56-kbps modem channel? Over a 1-Mbps cable modem? Over a 10-Mbps Ethernet? Over 100-Mbps Ethernet?

Drawing the Waveforms using Different Encoding Schemes

Draw the waveform for the ASCII code for the character Z (upper-case) using a) non-return-to-zero (NRZ, also called NRZ-L) line coding; b) non-return-to-zero, invert-on-one (NRZI) line coding; and c) 4B/5B-NRZI block coding. Assume 7-bit ASCII plus an odd parity bit. Whenever needed, assume th...

Network multilayer protocol

The president of company A decides that company A should work with company B to develop a new product. The president tells her legal department to look into the idea, and they in turn ask the engineering department for help. As a result, the chief engineer calls his counterpart at the other company ...

DISCUSSION: Selecting an Appropriate WSDL

This Discussion focuses on a situation that you could face as a member of an architecture team. Some proposed protocols become standards. Usually, standards evolve over a period of time, with new versions being introduced every so often. However, new versions are usually not adopted immediately and ...

Termination Planning and Future Projects

There is often a wealth of information that can be mined from a project, successful or unsuccessful, that can be used in future projects, for example for planning activities such as schedule and cost estimation. What aspects of termination planning can be used to facilitate this process?

Scheduling and Resourcing Issues: Using Two Tiers of Developers

Suggestion: It would be feasible to enhance productivity, and ease scheduling conflicts, by having two tiers of developers working on I.T. project teams. The idea is that elite or upper tier developers would be scheduled to work on new projects, creating new applications quickly and efficiently, whi...

Mix Integers and Single Expressions

You can mix integers and non-integers in a single expression. For example: 123."A" = "123A" "4A"+123 = 127, "5.5" + 5 = 10 Non-integers are converted to integers as required by the operators. The non-integer converts to an integer starting with the left-most character and continuing until encounteri...

Exception Class with Two Constructors

Define an exception class called tornadoException. The class should have two constructors, including the default constructor. If the exception is thrown with the default constructor, the method what should return "Tornado: Take cover immediately!". The other constructor has a single parameter...

Accepted standards in the computer industry

This solution provides the learner with an understanding of why a computer manufacturer would decide to abide by acceptable standards. The solution provides discusses when it is appropriate for a manufacturer to deviate from accepted standards.

Disposing of Old Computer Equipment

What are the important considerations for an organization to dispose of old computer equipment? What methods would work best for the organization in which you are working or have worked?