Engineering Homework Help

Engineering Homework Help. Mississippi State University Orthographic Views Questionnaire

 

Problem is on page 272 named the Index Feed. This is still an English scale problem so your limits will be 0,0 and 11,8.5. Use the formula to space out views equally on page just like safety key. You will of course have different numbers that you plug into formula. You will be drawing a Multiview meaning you will draw a front, top and right side.

Engineering Homework Help

Engineering Homework Help

Engineering Homework Help. IT 337 SNHU Consistency and Standards Heuristic Challenge Discussion

 

A true heuristic review requires multiple reviewers. For this discussion, you are going to act as one of those reviewers.

You will select an interactive website, evaluate it using the 10 Usability Heuristics for User Interface Design, and record your results within this Module Five Discussion Heuristic Review Template.

In your initial post, you will:

  • Share your completed template.
  • Post a screenshot showing one example of a heuristic that was either effectively implemented or obviously violated on the website you selected.
  • Clearly describe your reasons for choosing the example.

In your responses to your peers, you will:

  • Provide a suggestion that could either improve the design or remedy the violated heuristic.
  • Suggest an evaluation method, other than a heuristic review, that could be used to evaluate the usability of the website and explain how this method differs from the heuristic review.

Engineering Homework Help

Engineering Homework Help

Engineering Homework Help. ITS 420 CSU W8 Local Linux in a Global Setting Questions

 

Option #1: Local Linux in a Global Setting

You are hired to plan and implement setting up a local Linux environment for a global organization. Your project is to setup a Linux environment for an organization that has offices globally with many computers and devices connected to the main office (headquarters), and with an access to a cloud-based environment. The organization also uses cloud-based environment, and your local Linux environment is connected to the cloud environment of the organization.

Write a paper that contains the process of setting up Linux environment, detail explanation of the build and implementation, and how the environment will operate. Some of the topics and requirements may require research to properly address.

Submission Requirements:

  • Write an eight- to 10-page paper, not counting required title and reference pages. Include additional pages as needed to accommodate graphics.
  • Format your paper according to the CSU Global Writing Center (Links to an external site.).
  • Incorporate four to six scholarly sources to support your paper. The CSU Global Library is a good place to find these sources.

You must address the following in your proposal and may make any assumptions which are not specified:

  • Which Linux distribution(s) will be required? This should include information about both client and server operating systems.
  • Describe the hardware to be used and the installation options.
  • Describe how users will log onto the systems.
  • Explain how systems will receive IP addresses.
  • Explain how DNS will be accessed by the systems.
  • Explain how users will securely share files within their group and other selected groups/users in the company.
  • How will printing be implemented and managed?
  • What kind of data encryption will be required?
  • Explain the local host and network security requirements.

Engineering Homework Help

Engineering Homework Help

Engineering Homework Help. SNHU Cybersecurity Incidents Shutting Down Wifi System Discussion

 

Different types of adversaries pose different types of threats depending on their capabilities, intentions, and the assets they are targeting. For example, organized crime might target a financial institution for financial gain while a hacktivist might target organizations with differing ideologies. In addition, companies react to the loss of assets differently. There is a difference in the mitigation tactics that would be used depending on whether there is a loss of one asset or of an entire category of assets.

For your initial post, identify a recent cybersecurity incident (within the last two years). Briefly summarize the incident, and post a link to an article on the incident if possible. Ensure your summary identifies the threat actor(s) involved, at least one characteristic of the threat actor (capability, intent, target), and why the threat actor may have attacked what they did. If your article does not identify the “why,” hypothesize what you think may be the “why” based on the known information.

Note: Try not to post the same example as your peers.

In responding to your peers, identify a potential mitigation tactic (other than those identified in the article) for the threat actors they have identified. Also identify potential legal and ethical considerations that influence your choice of tactic given the information.

Reply:

Brett Levasseur posted Sep 27, 2021 8:13 AM

Subscribe

Previous Next 

This page automatically marks posts as read as you scroll.Adjust automatic marking as read setting

A very recent case involves the Colonial Pipeline, a pipeline that supplies gasoline to about fifty million Americans. This pipeline supplies 45% of the fuel used by the 50 million Americans that use the fuel from the pipeline.

In May 2021, the pipeline was subjected to “a ransomware attack that forced a shutdown of all pipeline operations” (1). This attack was noted as “one of the most serious ransomware incidents to date, impacting tens of millions of people. It is a major national security incident, and it highlights the vulnerability of the nation’s infrastructure to these sorts of attacks.” (1).

In the article, there is no discussion as to why this was a target. It is said to be the work of a group called DarkSide, “a so-called “ransomware-as-a-service” group that develops ransomware used by other cybercriminals and receives a share of the proceeds” (2). There were rumors it was initiated by a foreign government but there are no details to corroborate this claim.

If this was done on behalf of a foreign government, this would have given them an advantage for oil/fuel sales with the United States and created a dependency for their product.

REFERENCES:

  1. https://www.forbes.com/sites/rrapier/2021/05/09/th…

2. https://www.cnn.com/2021/05/22/politics/colonial-d…

Repy:

Ryan Taylor posted Sep 28, 2021 9:56 AM

Subscribe

Previous Next 

This page automatically marks posts as read as you scroll.Adjust automatic marking as read setting

Howdy,

A recent cybersecurity incident that I would like to explore would be the Canva data breach that happen in May 2019. Canva is a graphic design website company that had an attack that exposed email addresses, names, city of residence, passwords, and usernames of 139 million users. Hackers were also able to view files, but not steal, that included partial payments and credit card data. The hacker group know as Gnostic Players, claimed to have obtained the users open authorizations (OAuth) login tokens which are used for login via Google to the website. Canva confirmed the attack and notified its users and told them to update their passwords and reset their OAuth tokens.

The article didn’t say what the intent was with Gnostic Players, however they did say that they later released the information on the dark web. So if I had to venture a guess I would say personal financial gain and bragging rights. I based this on the other attacks known by Gnostic Players and their intent of malicious attacks for personal financial gain.

Cheers,

Ryan

Works cited:

Barth, B. (2019, May 28). Hacker has designs on Canva data, steals info belonging to 139M users. SC Media. https://www.scmagazine.com/news/security-news/data-breach/hacker-has-designs-on-canva-data-steals-info-belonging-to-139m-users

Engineering Homework Help

Engineering Homework Help

Engineering Homework Help. ENGR 101 ASU Fuel Economy for The Various Model Years Worksheet

 

The attached files are to be used to create an analysis based on fuel economy of modern automobiles. The Word document provides the description of what is to be completed and the Excel spreadsheet has the data for automobiles built since 2000. You are being asked to create, and interpret pivot charts around the provided data. You are asked to create 3 separate charts that provide different insights into the data, 2 of these are defined and the last one is for you to determine the visual you want.

Engineering Homework Help

Engineering Homework Help

Engineering Homework Help. ENGR 101 Arizona State Engineering Problem Solving Excel Analysis Problem Question

 

A step by step listing of tasks that is to be completed is provided for your success on this assignment.

  • Open the data file “EXCEL Data Analysis Assignment 1.XLSX”
  • Save the file as “EXCEL Data Analysis Assignment ENGR101_#$%_Lastname_Firstname.xlsx” where #$% is the three character section number of your ENGR 101 course.
  • Create a new sheet in the file and name it “Summary”
  • In the Summary Sheet Create
    • Type in the name of the first data sheet in Cell A1
    • Table 1 starting in Cell A2
    • Merge the first row of the sheet such that it is the width of the entire table
    • Fill in the values in the table with the corresponding functions and columns of data from the names sheet
    • In Cell A10 type in the name “Force Comparison”
    • Create a table with all 6 sensor locations indicated as rows and columns as shown in Table 1 above
    • Fill in the respective data for forces from each of the respective data sheets
    • Starting in Cell A20 repeat steps f and g for the resultant accelerations from the different sensor locations
    • In Cell A30 Answer the following question: In looking at the data that you have just summarized, is there any relationship between the sensor locations in regard to the forces and/or resultant acceleration? If so, please describe that potential relationship as well.

Engineering Homework Help

Engineering Homework Help

Engineering Homework Help. New Mexico State University Nuclear Engineering on Nuclear Reactors Questions

 

I am stuck on questions 4, 5, and 6 only being able to complete around half of each part. I need help solving these questions. The questions are at the end of the chapter for Ch9 that I am attaching. I am attaching Ch8 as well because it may be useful for calculations.

Engineering Homework Help

Engineering Homework Help

Engineering Homework Help. University of North Dakota Airworthiness of Aircraft Part IV Book Report

 

I’m working on a report book page.

  1. Read your Annex from front to back. The Annex is the 2 chapters that I attached before. Part IV and IVB as well.
    1. Give me a 1-page book report. What is a book report? Use the same criteria given to you in Middle School.

Engineering Homework Help

Engineering Homework Help

Engineering Homework Help. EE 530 San Diego University Circuit Design Questions

 

1. Design a circuit that implements the function, F(W,X,Y,Z) = ∑m(2,6,8,11,14) as a NOR-OR, 2-level gate array. Submit the schematic and a screenshot of a simulation verifying the output for the input 1001.

2. Design a circuit that uses multiplexors to perform 1’s complement on a 3-bit binary number. Assume overflow bits are lost. Submit your schematic and a screenshot of a simulation verifying the output for an input of 110.

3. Given four inputs, A,B,C,D, implement the following functions in a programmable array logic (PAL) circuit. Write the programming table and draw the circuit.

F1(A,B,C,D) = AB’ + A’C’D + CD

F2(A,B,C,D) = BCD + AD’

F3(A,B,C,D) = B’D + AD’ + AB’C’D + BCD

F4(A,B,C,D) = C+ AC’D’

4. A circuit that accepts two 1-bit binary inputs, A and B, adds A and B together and produces the outputs Sum and Carry is sometimes referred to as a “Half Adder”. Design a circuit that accepts inputs A, B and Opp and uses a multiplexor to select between a half-adder circuit (A+B) and a multiplier (A*B). Your outputs should be Sum and Carry. Submit two simulations of your Multisim schematic, one verifying the conditions A = 1, B = 1, Opp = 0 and the second verifying the conditions A = 0, B = 1, Opp = 1.

Engineering Homework Help