Engineering Homework Help

Engineering Homework Help. Please 1&2 in different docs please follow APA Format and add references and citations-sspk

 

1)2-3 page

  1. Activity I: Give an example of an organization with an ineffective or cumbersome structure. Explain the problems with the current structure and how these problems could be solved.Activity II: Prepare a risk management plan for the project of finding a job after graduation.The assignment is to answer the question provided above in essay form. This is to be in narrative form and should be as thorough as possible. Bullet points should not to be used. The paper should be at least 1.5 – 2 pages in length, Times New Roman 12-pt font, double-spaced, 1 inch margins and utilizing at least one outside scholarly or professional source related to project management. The textbook should also be utilized. Do not insert excess line spacing. APA formatting and citation should be used.

2)2-3 page

  1. Question I – The year is 2012 and the light bulb has not yet been invented. Thomas Edison and Nikola Tesla are in a bitter feud to see who can bring electricity to the masses first. In this alternative history, it is indisputable that Tesla invented the lightbulb first. However, Edison filed his lightbulb patent prior to Tesla. According to the law in 2012, who holds the patent to the lightbulb?Question II – In May of 2013, Jesse plans to open a law office named “Peace Law” and uses the peace symbol as part of the logo for the business. That same month Jesse registers the trademark with the Patent and Trademark Office. Jesse opens the law office for practice in July 2015. Assuming no one contested registration of the trademark within 5 years, is the trademark valid?

Engineering Homework Help

Engineering Homework Help

Engineering Homework Help. Matlab- Write a MATLAB program to Plot the curves ( x(t) versus t ) and ( y(t)

 

Consider the mechanical system shown in the figure below:

3rd week  A.jpg

Assume that: m=1 kg, M=2 kg , k1=10 N/m and k2=40 N/m

Write a MATLAB program to Plot the curves ( x(t) versus t ) and ( y(t) versus t ) for each of the three sets of initial and plot the curves and obtain a computer solution for x(t) and y(t).

Initial conditions:

1) x(0)= 0.1 m ẋ(0) = 0 m/s y(0)= -0.1 m ẏ(0) = 0 m/s

2) x(0)= 0.017 m ẋ(0) = 0 m/s y(0)= -0.1 m ẏ(0) = 0 m/s

3) x(0)= 0.028 m ẋ(0) = 0 m/s y(0)= 0.1 m ẏ(0) = 0 m/s

Additionally determine the natural frequencies and modes of vibration

Engineering Homework Help

Engineering Homework Help

Engineering Homework Help. SNHU Securing the Internet Facing Side of An IT System Discussion

 

The convenience and ease of online shopping can be difficult to resist. Being able to access massive retailers, such as Amazon, on any mobile device or computer makes it simple to browse and purchase products. Some retailers allow for 1-click purchases, which enables a user to click a single button to complete a purchase. When users purchase with this option, the retail site has all of the user’s personal information stored in its system: name, address, retailer-based subscriptions, credit card information, etc. Many of us are willing to potentially sacrifice the security of our private and sensitive information for ease of use, convenience, and expedited processes.

For this week’s discussion, consider internet-facing security, as well as the risks and vulnerabilities that are associated with internet-facing IT systems. Should you reference any internal or external resource, remember to cite your sources appropriately.

In your initial post, address the following:

  • Why is it important to secure the internet-facing side of an IT system?
  • Name an internet-facing security component that an e-commerce site could implement to protect and secure its internet-facing IT system.

In response to two of your peers, answer the following:

  • What about your peers’ proposed security components makes them viable?
  • Recommend an additional security component to further the dialogue.

    R1: Steve Gyurik posted Jun 14, 2021 1:06

Hello class,

It is important to secure the internet-facing side of an IT system to protect against many types of attacks. These attacks consist of, a Drive-By Download, where software and malware are downloaded and installed without the user knowing about it. Typosquatting/URL Hijacking, where an attacker will register a domain name that have similar typing errors that a user would punch in while trying to access a particular web site. Buffer Overflow is when boundaries are not enforced on what type of data can be inputted. Integer Overflow is when the maximum size of a numeric value is exceeded and used to store it in memory. A Zero-Day attack is an attack that exploits computer application vulnerabilities before they are known and patched by the application’s developer. (8.4.7 Web Application Attack Facts)

Some internet-facing security components that an e-commerce site could implement to protect and secure its internet-facing IT system consists of, using the latest browser with the latest patch level, installing antivirus, anti-spyware, pop-up blocking, and firewall software. Using HTTPS to encrypt the HTTP over Transport Layer Security (TLS) or over Secure Socket Layer (SSL), protecting your browser against threats. Users should be trained to log out of websites when they are finished online. Users should never allow applications to remember their authentication information. (8.4.7 Web Application Attack Facts)

References

8.4.7 Web Application Attack Facts, https://labsimapp.testout.com/v6_0_452/index.html/productviewer/225/8.4.7/f521c877- 4b08-4d5f-acea-5ec0c1f7f238

R2: Mae Nkanang posted Jun 15, 2021 8:48 AM

Hello Class

It is important to secure the internet-facing side of an IT system because it is the most attacked part of the IT system. Our internet-facing servers are constantly being probed by hackers looking for ways to damage our resources or steal them. It is very important that no holes are left unplugged which would allow hackers easy access. Securing the internet-facing side of an IT system will helps in identifying any misconfigurations or viruses that might allow the servers to be used as launchpad for hackers. A well secured internet framework can help businesses reduce the risk of damage and data theft. It will ensure the safety of information that are shared by dividing the data into several bits and encrypting them, then delivering them through separate path. It will also make sure that workstations are shield from malicious spyware.

One of the internet-facing security components that an e-commerce site could implement to protect and secure its internet-facing IT system is an SSL (Secure Server Layer) Certificate. The SSL certificate authenticates the identity of users and then encrypts data both on the store and in transit. SSL is very important in creating secure connectivity between the end-user systems and the e-commerce website. When it comes to tech-savvy buyers, it is important that there is a padlock icon and HTTPS in the address bar because this will allow them to be confident in providing their personal details and credit card information. It also proves to the customers that their data is properly encrypted and protected.

Dsons, J. (2020, September 17). E-commerce Website Security: 5 Best Practices to Protect Your Online Store. Business.Com. https://www.business.com/articles/e-commerce-website-security-5-best-practices-to-protect-your-online-store/#:%7E:text=SSL%20is%20the%20de%20facto,and%20your%20e%2Dcommerce%20website.

Sciberras, N. (2019b, May 16). The Importance of Scanning Your Internet-Facing Assets. Acunetix. https://www.acunetix.com/blog/articles/importance-scanning-internet-facing-assets/#:%7E:text=If%20your%20network%20is%20in,would%20allow%20hackers%20easy

Engineering Homework Help

Engineering Homework Help

Engineering Homework Help. MATLAB Mathematical Modeling of Thermal Systems Question

 

Mathematical Modeling of Thermal Systems

The schematic (below) indicates a room heated with an electric heater. The inside of the room is at temperature and the walls are assumed to be at temperature .

Week 2 - Individual Assignment.jpg

If the outside temperature is , develop a model of the system to show the relationship between the supplied heat and the room temperature

Write the statespace model of the system in a matrix form and solve this equation using MATLAB. Plot the figures showing temperature variation for this thermal system in terms of vs. and vs. ( ). (Assume that =0.5, =1.8, =8, =4, =3, and =10)

Produce this assignment in a report format, with additional explanations on :

– Why do we linearized the behavior of a Fluid Systems normal operating points ? ( on your own words )

– Explain the assumptions needed to be consider for linearization.

Engineering Homework Help

Engineering Homework Help

Engineering Homework Help. Please 1&2 in different docs please follow APA Format and add references and citations-ss

 

1)Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.

Also, provide a graduate-level response to each of the following questions:

  1. Find a recent news article on an ongoing project, evaluate the management’s performance, and explain how the project could be better organized and managed.
  2. Discuss the pros and cons of the spiral project life-cycle model and the waterfall project life-cycle model. How are the processes in the PMBOK related to each other? Give a specific example.

2)Find an article describing a national project in detail. On the basis of the article and on your understanding of the project, answer the questions below. State any assumptions that you feel are necessary to provide answers.

  1. Who were the stakeholders?
  2. Was it an internal or external project?
  3. What were the most important resources used in the project? Explain.
  4. What were the needs and expectations of each stakeholder?
  5. What are the alternative approaches for this project?
  6. Was the approach selected for the project the best, in your opinion? Explain.
  7. What were the risks in the project?
  8. Rank the risks according to severity.
  9. What was done or could have been done to mitigate those risks?
  10. Was the project a success? Why?
  11. Was there enough outsourcing in the project? Explain.
  12. What lessons can be learned from this project?

The assignment is to answer the question provided above in essay form. This is to be in narrative form and should be as thorough as possible. Bullet points should not to be used. The paper should be at least 1.5 – 2 pages in length, Times New Roman 12-pt font, double-spaced, 1 inch margins and utilizing at least one outside scholarly or professional source related to project management. The textbook should also be utilized. Do not insert excess line spacing. APA formatting and citation should be used.

Engineering Homework Help

Engineering Homework Help

Engineering Homework Help. Please 1&2 in different docs please follow APA Format and add references and citations-dd

 

1)350 words

Discuss the correspondences between the ER model constructs and the relational model constructs. Show how each ER model construct can be mapped to the relational model, and discuss any alternative mappings?

2)350 words

List the three main approaches to database programming. What are the advantages and disadvantages of each approach?

Engineering Homework Help