Convey the rationale behind your choice

Assignment Help Computer Engineering
Reference no: EM133239967

Case Scenario: You work as a developer in XYZ company. You have been tasked by your manager to work on a project for one of your company's clients based on their requirements.

Client Details and Requirements

Firm Name: U235 Nuclear Power Plant

Client Requirement:

We at U235 Nuclear Power Plant are very concerned about our employees well being. Considering the nature of work, we plan to give a wearable device that can keep a track of our employees' health and relay that information to a smartphone through an app.

Project Details

The device is ready and the mobile app will be created by the app development team. You are working in a team that is responsible for creating an OS (you are free to assume an OS) for the wearable device.

You have been assigned to do the following:

Choose the method of which your company's device's CPU will choose process precedence, using the methods mentioned in the reading assignments.

1. Convey the rationale behind your choice by explaining in detail why you would use this particular method to the development team. You will pitch to convince the team that your idea is the best method for the device to utilize.

I2. mportant Note: Keep in mind that there is not a lot of information being processed other than relaying a lot of I/O to the smartphone and a display to the user.

You may refer to the following resource for an example of what Linux uses for scheduling as a best practice:

Reference:

Linux scheduler - The linux kernel documentation. (n.d.). The Linux Kernel.

You will be assessed based on:

1. Your choice(s) of the method(s) of which the device's CPU will choose process precedence.
2. Your explanation behind the rationale for your choice(s) of method(s)

Reference no: EM133239967

Questions Cloud

How do you think technology has overcome vulnerabilities : How often do you access it? How do you think technology has overcome your vulnerabilities?
Define job enrichment and job enlargement : Define job enrichment and job enlargement by providing examples. Job enlargement sounds like a good thing. Explore what to possible disadvantages
Do you think the 3rd goal of the university of technology : SCIT 4009 University of Technology, Do you think the 3rd Goal of the university of Technology Jamaica should be the first Goal in the list of Goals
Identify a policy or practice related to recruitment : Human Resource Policy Discussion - Identify a policy or practice related to recruitment in your organization(Restaurants)
Convey the rationale behind your choice : CS 2301 University of the People - Choose the method of which your companys device's CPU will choose process precedence, using the methods mentioned
The repayment of home loan in future : Mrs Smith has residual income of $48,000 pa which she can put towards the repayment of a home loan in the future.
Describe contributions as source of income to united states : Tourism forms an important source of income. Describe these contributions as a source of income to the United States.
How to model databases using entity relationship diagrams : ART-UE 22 New York University how to model databases using Entity Relationship diagrams - Products are sourced from one or many vendors
Why mature firm with history of stable earnings : Explain two reasons why a mature firm with a history of stable earnings, few investment opportunities and a diverse clientele of investors

Reviews

Write a Review

Computer Engineering Questions & Answers

  Prepare a 3 to 5-page report to jan and kim that comprises

jan and kim are considering installing a radius server. prepare a 3-5-page report to jan and kim that includes the

  Why is it so difficult to prosecute cybercriminals

Internet-related crime occurs every minute. Cybercriminals steal millions of dollars with near impunity. For everyone that is captured nearly 10,000.

  Describe a method for maintaining a favorites list l

Describe a method for maintaining a favorites list L such that every element in L has been accessed at least once in the last n accesses, where n is the size of

  Imagine that v is an array-based tree

imagine that v is an array-based tree.

  Display on the console the ulam sequence

Write a program with a loop to ask the user for an integer greater than 2 and then pass the integer to a function which will produce.

  Explain the purpose of information systems

Explain the purpose of information systems to support organizations and enhance productivity. Cite a current event relating to the way in which information.

  Why might a user or administrator disable dep

Investigate buffer overflows and DEP. How does DEP prevent malicious attacks via buffer overflows? Is it always effective? Why might a user or administrator disable DEP?

  Why do you think many decision analysts do not like

Why do you think many decision analysts don't like to participate in the implementation process? What could be done to change this attitude?

  Discuss various models used to help measure the value added

In 175 words or more discuss the various models that are commonly used to help measure the value added to a business by information systems.

  Describe the variety of enumeration tools

Research the variety of enumeration tools available. Select one tool and explain what it does, how it works and what type of information it extracts.

  Questionsteve smith is a restaurant owner who wants to

questionsteve smith is a restaurant owner who wants to expend his 10000 to modernize his restaurant by adapting it more

  Write a short python program to generate a random point

Write a short Python program to generate a random point (x, y) uniformly distributed over an area of a circle with radius 1.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd