0% found this document useful (0 votes)
5 views

IS Assignment

Uploaded by

mnmengwai
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

IS Assignment

Uploaded by

mnmengwai
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

RICHFIELD GRADUATE INSTITUTE OF TECHNOLOGY (PTY)

LTD

FACULTY OF INFORMATION TECHNOLOGY

INFORMATION SYSTEMS 511


1ST SEMESTER ASSIGNMENT

Name & Surname: Mengwai Mphela Neo_________________________________ ICAS No:


129090_________________

Qualification: DIT 3 years______________________ Semester: 1_____ Module Name: Information


Systems 511__________________________

Date Submitted:22 MARCH 2018 ___________

ASSESSMENT CRITERIA MARK EXAMINER MODERATOR


ALLOCATION MARKS MARKS

MARKS FOR CONTENT

QUESTION ONE 30

QUESTION TWO 20

QUESTION THREE 40

TOTAL MARKS 90
MARKS FOR TECHNICAL ASPECTS

1. TABLE OF CONTENTS
Accurate numbering according to the numbering in text 2
and page numbers.

2. LAYOUT AND SPELLING


Font – Calibri 12
3
Line Spacing – 1.0
Margin should be justified.

1
3. REFERENCE
5
According to the Harvard Method

TOTAL MARKS 10
TOTAL MARKS FOR ASSIGNMENT 100
Examiner’s Comments:

Moderator’s Comments:

Signature of Examiner: Signature of Moderator:

2
TABLE OF CONTENTS
PAGE#
Question1………………………………………………………………………………………………………4-5
Question 2
What is a deadlock?............................................................................................5
What is starvation?.............................................................................................5-6
How do they differ?.............................................................................................6
4 general strategies of dealing with deadlocks……………………………………………….6-7
4 conditions required for deadlocks to occur?.....................................................7-8
Question 3
#1…………………………………………………………………………………………………………………….8-9
#2…………………………………………………………………………………………………………………….9-10
#3…………………………………………………………………………………………………………………….10-11

3
Questions
Question1
-Title: The AUP that I think would be fair as a RGI student
-Terms of reference:
 PC training & Business Collage Wireless Internet Access Policy as provided by
Mr Mpho Malebye for this research assignment.
 Telkom Internet Acceptance Use Policy acquired from the internet as they were
best suited to portray my opinions on AUP’s
-Procedure:
 I want the internet to provide the access to a vast collection of networks
around the world via the world wide web etc. So, any laws that include some
sort of access to this environment is picked first.
 I want it to allow people to access the internet, with minimal or no
interference. Thus, access will be limited to registered proxy networks.
 A law that personalises our IP address such that access to pirate sites can be
avoided will be considered in the final AUP.
 You are responsible to keep your passwords safe. Anyone who attempts to
access an account they don’t own will be terminated.
 You must know that accessing the internet is at the users own risk. Although
the internet provider must try to provide privacy to the user’s information.
-Findings:
 Students are requested to use the internet for school purposes during lectures
and to revise notes through the internet on their leisure time.
 Anyone who uses the school’s internet must be a registered student of the
school.
 Smartphones are prohibited to be used, so students must us instead use
tablets provided by the school to do research etc.
 Smartphones are very distractive and could be used to try and access
unauthorized sites for entertainment so are not allowed to use the school’s
internet.

4
 The school’s internet is only for school related topics.

-Conclusion:
 It will ensure that the students focus on the work assigned to them and of
course increase the pass rate of the institution.
 Helps the students to have a good learning experience provided by the
institution.
-Recommendation:
 Assign security that checks that the students abide with the rules of the policy.

QUESTION 2
1
What is deadlock?
In concurrent computing, a deadlock is a state in which each member of a group is
waiting for some other member to act, such as sending a message or more commonly
releasing a lock. Deadlock is a common problem in multiprocessing systems, parallel
computing, and distributed systems, where software and hardware locks are used to
handle shared resources and implement process synchronization.

In an operating system, a deadlock occurs when a process or thread enters a waiting


state because a requested system resource is held by another waiting process, which
in turn is waiting for another resource held by another waiting process. If a process is
unable to change its state indefinitely because the resources requested by it are being
used by another waiting process, then the system is said to be in a deadlock.

In a communications system, deadlocks occur mainly due to lost or corrupt signals


rather than resource contention.

What is starvation?
In computer science, starvation is a problem encountered in concurrent computing
where a process is perpetually denied necessary resources to process its work.

5
Starvation may be caused by errors in a scheduling or mutual exclusion algorithm, but
can also be caused by resource leaks, and can be intentionally caused via a denial-of-
service attack such as a fork bomb.

The impossibility of starvation in a concurrent algorithm is called starvation-freedom,


lockout-freedom or finite bypass, is an instance of liveness, and is one of the two
requirements for any mutual exclusion algorithm (the other being correctness). The
name "finite bypass" means that any process (concurrent part) of the algorithm is
bypassed at most a finite number times before being allowed access to the shared
resource.

How do they differ from each other?


The main difference between deadlock and starvation is the cause and effect
relationship between them; it is deadlock that causes starvation. Another interesting
difference between deadlock and starvation is that deadlock is a problem while
starvation can, sometimes, help to get out from a deadlock. In the computer world,
when writing a computer program there will be more than one process/thread that
will concurrently run one after the other to fulfil the required service to the program.
Therefore, to have a fair system, the programmer should have to ensure that all the
processes/threads will receive or get enough access to resources that they need. If
not, there will be a deadlock, and it will lead to a starvation later. Generally, a fair
system does not contain any deadlocks or starvations. Deadlocks and starvations will
occur mainly when many threads are competing for limited resources.
Deadlock and starvations are some of the problems that occur due to data races and
race conditions that occur during programming as well as implementing hardware. In a
deadlock, two threads will infinitely wait for each other without executing while, in a
starvation, one thread will roll back and let the other thread to use the resources. A
deadlock will cause starvation whereas starvation will help a thread to get out from a
deadlock.

Four strategies for dealing with deadlocks

6
1.Ignorance – If deadlocks are not liable to happen, the effort required to deal with
them outweighs the problem of deadlocks occurring.

2. Detection and Recovery – Keep log of resource ownership and requests. If no


progress is made, recover from said deadlock by pre-emption (steal a resource from
another process), rollback (make checkpoints – but operating systems aren't Halo or
Call of Duty, this is difficult), or crudely killing processes in the deadlock cycle.

3. Deadlock Avoidance – The most difficult option. We disallow deadlock by setting


“safe states”, in which process completion is always guaranteed.

4. Deadlock Prevention – Negate one of the four deadlock conditions. Most commonly
we deal with the circular wait condition. Attacking mutex is infeasible, attacking hold
and wait is prone to starvation, and attacking no pre-emption is downright idiotic.

2
Four conditions required for deadlocks to occur

1.Mutual exclusion

The resources involved must be unshareable; otherwise, the processes would not be
prevented from using the resource when necessary.

2.Hold and wait or partial allocation

The processes must hold the resources they have already been allocated while waiting for
other (requested) resources. If the process had to release its resources when a new resource
or resources were requested, deadlock could not occur because the process would not
prevent others from using resources that it controlled.

3.No pre-emption

7
The processes must not have resources taken away while that resource is being used.
Otherwise, deadlock could not occur since the operating system could simply take
enough resources from running processes to enable any process to finish.

4.Resource waiting or circular wait

A circular chain of processes, with each process holding resources which are currently
being requested by the next process in the chain, cannot exist. If it does, the cycle
theorem (which states that "a cycle in the resource graph is necessary for deadlock to
occur") indicated that deadlock could occur.

QUESTION 3
1
Green Computing

Green computing is the environmentally responsible and eco-friendly use of computers


and their resources. In broader terms, it is also defined as the study of designing,
engineering, manufacturing, using and disposing of computing devices in a way that
reduces their environmental impact.
Green computing aims to attain economic viability and improve the way computing
devices are used. Green IT practices include the development of environmentally
sustainable production practices, energy-efficient computers and improved disposal and
recycling procedures.

Steps you can take to contribute to green computing

 Green use: Minimizing the electricity consumption of computers and their peripheral
devices and using them in an eco-friendly manner

8
 Green disposal: Repurposing existing equipment or appropriately disposing of, or
recycling, unwanted electronic equipment

 Green design: Designing energy-efficient computers, servers, printers, projectors and


digital devices

 Green manufacturing: Minimizing waste during the manufacturing of computers and


other subsystems to reduce the environmental impact of these activities

Is video conferencing really viable green alternate to travel for most companies

Reduce travel cost

The ability to be in several places at once without leaving your office is the next frontier and
driving business productivity. Though face-to-face interactions with your customers,
partners and colleagues will never be replaced, the huge leaps in quality, availability, and
ease-of-use make videoconferencing the closest thing to being there. When you calculate
the number of trips taken annually and determine the associated costs (transportation to
and from the airport, the cost of plane tickets, meals, time lost in travel, etc.) it is clear why
videoconferencing is such an attractive alternative. Businesses often see that the cost of
travel for just one employee can far outweigh the expense of a video conference system
that can be used by the entire company.

Increased Productivity Among your Customers and Teams

In today’s market, it’s not unusual to have satellite offices across the country, or even the
globe. Most of these offices will communicate with phone calls, email, or instant messages.
The lack of face-to-face communication can cause misunderstandings within your teams,
and worse, can result in lost or non-existent communication. When a video is implemented,
participants are most likely to stay alert and focused on what is being discussed. As a result,

9
projects are completed faster, productivity increases, and participants feel more in synch
with each other and the message you want to convey.

Improves Communication & Reinforce Relationships

During a videoconference you can see the facial expressions and body language of
conference participants, leading to faster and more effective collaboration. These are both
important aspects of communication that are lost with a basic telephone call. Allowing a
CEO to hold a company-wide meeting in real time with offices across the globe makes
employees feel closer to the home office. Imagine being able to speak with a manufacturer
in China, displaying the prototype you want them to duplicate in crystal clear HD quality.
What would have required an expensive and time-consuming trip, can now be down in
minutes from the comfort of your own desktop computer.

Competitive Advantage Over Your Competition

There is no benefit for being second in bringing new products or ideas to market, and video
communication creates and maintains competitive advantage for your business. Teams that
communicate through video, will share knowledge faster and will be more informed, which
reduces the time required to bring a new product or service to your customers. Support
departments using videoconferencing can establish more personal relationships with their
customers, which encourages a much deeper loyalty than just speaking on a phone with a
call centre. If you need to manufacture a product, you can verify the quality, make changes,
and ensure accuracy through your product’s life cycle. You can accomplish in less than an
hour, what it takes your competition to do in a week via shipping the product for review.

3 The role of green issues

Green continues to play a significant role in the value proposition we are pitching. The data
centre energy crisis is continuing to cause concern for our customers around the world. All
indications are the problem will continue to escalate over the next five years. If you consider
that the energy usage in a data centre is approximately 30 times that of a regular office
space, you start to quickly realize the magnitude of the problem.

10
IBM’s roadmap was designed to help customers save money while focusing on doing what’s
right for our planet. Internally we will eat our own cooking and will double the square
footage of our internal data centres without spending one additional kilowatt of energy.

END OF ASSIGNMENT: REFERENCES


1.Transtutors/2007-2018/trans web/USA
2.Shelly cash/discovering computers/Cengage/USA

11

You might also like