Engineering Homework Help

Alabama A & M University Fluid Flow Experiment Lab Report

 

Hi, I have a lab that is about fluid flow. I need help with the report. I need help with 3 things. First, Anticipated results and sample analysis. Second, Safety section. Last, I need an excel sheet that can do all the calculations. Please make the excel sheet clear by writing the equation and explain it. The objective is to calculate the friction factor and equivalent length.

Engineering Homework Help

Brookline College Oklahoma City Haider Abualsaud Worksheet 3

 

I’m working on a mechanical engineering question and need support to help me learn.

HE 1. This blueprint must include front, left, right and model views, also has all dimensions (all like on the example)

HE 2. This exercise for sheet metal and need has flat and model views with all dimensions and positions

HE 3. It is weldment HE. Blueprint here must include that you see on the first sheet (body, cut table and small bodies). For small bodies use Relative views. Second sheet is not need to include to your homework

HE 4. This sheet includes surface body. Here is must stay standard and model views. All correct parameters for this body you can see on the separate Solidworks file, which attached here

All examples have to create in the mm (exclude HE #4)

Engineering Homework Help

IT 415 Southern New Hampshire University IT Course Discussion and Journal

 

Part 1 : 

Post a discussion reflecting on your design effort and the documentation required to support information systems planning and design. What went well during your design phase? What did not go so well?

Additionally, discuss how you will prepare for IT 420:

How did the courses in your program prepare you for IT 415 and IT 420?

What other projects and information do you plan to include in your IT portfolio, which you will prepare in the capstone course?

What are your professional IT goals after graduating? Are you targeting a specific industry?

In response to your peers, provide your thoughts on their career plans and provide any suggestions or resources. Do you have any specific insight into their targeted industries or career paths? 

Part 2:

Compile and submit the feedback that you have been collecting in your feedback journal assignments. Make sure that each feedback comment contains information regarding whether the feedback was incorporated or rejected.

In your journal, include a two- to three-paragraph reflection on how exchanging feedback in this course helped you with your system design or with preparing the required documentation. Make sure you answer the following questions:

Did you find the weekly status reports helpful with keeping your classmates and instructor updated? Explain why or why not.

Did the status reports help facilitate the exchange of feedback? If so, how?

Engineering Homework Help

Mississippi State University Orthographic Views Questionnaire

 

Problem is on page 272 named the Index Feed. This is still an English scale problem so your limits will be 0,0 and 11,8.5. Use the formula to space out views equally on page just like safety key. You will of course have different numbers that you plug into formula. You will be drawing a Multiview meaning you will draw a front, top and right side.

Engineering Homework Help

ITS 420 CSU W8 Local Linux in a Global Setting Questions

 

Option #1: Local Linux in a Global Setting

You are hired to plan and implement setting up a local Linux environment for a global organization. Your project is to setup a Linux environment for an organization that has offices globally with many computers and devices connected to the main office (headquarters), and with an access to a cloud-based environment. The organization also uses cloud-based environment, and your local Linux environment is connected to the cloud environment of the organization.

Write a paper that contains the process of setting up Linux environment, detail explanation of the build and implementation, and how the environment will operate. Some of the topics and requirements may require research to properly address.

Submission Requirements:

  • Write an eight- to 10-page paper, not counting required title and reference pages. Include additional pages as needed to accommodate graphics.
  • Format your paper according to the CSU Global Writing Center (Links to an external site.).
  • Incorporate four to six scholarly sources to support your paper. The CSU Global Library is a good place to find these sources.

You must address the following in your proposal and may make any assumptions which are not specified:

  • Which Linux distribution(s) will be required? This should include information about both client and server operating systems.
  • Describe the hardware to be used and the installation options.
  • Describe how users will log onto the systems.
  • Explain how systems will receive IP addresses.
  • Explain how DNS will be accessed by the systems.
  • Explain how users will securely share files within their group and other selected groups/users in the company.
  • How will printing be implemented and managed?
  • What kind of data encryption will be required?
  • Explain the local host and network security requirements.

Engineering Homework Help

IT 337 SNHU Consistency and Standards Heuristic Challenge Discussion

 

A true heuristic review requires multiple reviewers. For this discussion, you are going to act as one of those reviewers.

You will select an interactive website, evaluate it using the 10 Usability Heuristics for User Interface Design, and record your results within this Module Five Discussion Heuristic Review Template.

In your initial post, you will:

  • Share your completed template.
  • Post a screenshot showing one example of a heuristic that was either effectively implemented or obviously violated on the website you selected.
  • Clearly describe your reasons for choosing the example.

In your responses to your peers, you will:

  • Provide a suggestion that could either improve the design or remedy the violated heuristic.
  • Suggest an evaluation method, other than a heuristic review, that could be used to evaluate the usability of the website and explain how this method differs from the heuristic review.

Engineering Homework Help

SNHU Cybersecurity Incidents Shutting Down Wifi System Discussion

 

Different types of adversaries pose different types of threats depending on their capabilities, intentions, and the assets they are targeting. For example, organized crime might target a financial institution for financial gain while a hacktivist might target organizations with differing ideologies. In addition, companies react to the loss of assets differently. There is a difference in the mitigation tactics that would be used depending on whether there is a loss of one asset or of an entire category of assets.

For your initial post, identify a recent cybersecurity incident (within the last two years). Briefly summarize the incident, and post a link to an article on the incident if possible. Ensure your summary identifies the threat actor(s) involved, at least one characteristic of the threat actor (capability, intent, target), and why the threat actor may have attacked what they did. If your article does not identify the “why,” hypothesize what you think may be the “why” based on the known information.

Note: Try not to post the same example as your peers.

In responding to your peers, identify a potential mitigation tactic (other than those identified in the article) for the threat actors they have identified. Also identify potential legal and ethical considerations that influence your choice of tactic given the information.

Reply:

Brett Levasseur posted Sep 27, 2021 8:13 AM

Subscribe

Previous Next 

This page automatically marks posts as read as you scroll.Adjust automatic marking as read setting

A very recent case involves the Colonial Pipeline, a pipeline that supplies gasoline to about fifty million Americans. This pipeline supplies 45% of the fuel used by the 50 million Americans that use the fuel from the pipeline.

In May 2021, the pipeline was subjected to “a ransomware attack that forced a shutdown of all pipeline operations” (1). This attack was noted as “one of the most serious ransomware incidents to date, impacting tens of millions of people. It is a major national security incident, and it highlights the vulnerability of the nation’s infrastructure to these sorts of attacks.” (1).

In the article, there is no discussion as to why this was a target. It is said to be the work of a group called DarkSide, “a so-called “ransomware-as-a-service” group that develops ransomware used by other cybercriminals and receives a share of the proceeds” (2). There were rumors it was initiated by a foreign government but there are no details to corroborate this claim.

If this was done on behalf of a foreign government, this would have given them an advantage for oil/fuel sales with the United States and created a dependency for their product.

REFERENCES:

  1. https://www.forbes.com/sites/rrapier/2021/05/09/th…

2. https://www.cnn.com/2021/05/22/politics/colonial-d…

Repy:

Ryan Taylor posted Sep 28, 2021 9:56 AM

Subscribe

Previous Next 

This page automatically marks posts as read as you scroll.Adjust automatic marking as read setting

Howdy,

A recent cybersecurity incident that I would like to explore would be the Canva data breach that happen in May 2019. Canva is a graphic design website company that had an attack that exposed email addresses, names, city of residence, passwords, and usernames of 139 million users. Hackers were also able to view files, but not steal, that included partial payments and credit card data. The hacker group know as Gnostic Players, claimed to have obtained the users open authorizations (OAuth) login tokens which are used for login via Google to the website. Canva confirmed the attack and notified its users and told them to update their passwords and reset their OAuth tokens.

The article didn’t say what the intent was with Gnostic Players, however they did say that they later released the information on the dark web. So if I had to venture a guess I would say personal financial gain and bragging rights. I based this on the other attacks known by Gnostic Players and their intent of malicious attacks for personal financial gain.

Cheers,

Ryan

Works cited:

Barth, B. (2019, May 28). Hacker has designs on Canva data, steals info belonging to 139M users. SC Media. https://www.scmagazine.com/news/security-news/data-breach/hacker-has-designs-on-canva-data-steals-info-belonging-to-139m-users

Engineering Homework Help

ENGR 101 Arizona State Engineering Problem Solving Excel Analysis Problem Question

 

A step by step listing of tasks that is to be completed is provided for your success on this assignment.

  • Open the data file “EXCEL Data Analysis Assignment 1.XLSX”
  • Save the file as “EXCEL Data Analysis Assignment ENGR101_#$%_Lastname_Firstname.xlsx” where #$% is the three character section number of your ENGR 101 course.
  • Create a new sheet in the file and name it “Summary”
  • In the Summary Sheet Create
    • Type in the name of the first data sheet in Cell A1
    • Table 1 starting in Cell A2
    • Merge the first row of the sheet such that it is the width of the entire table
    • Fill in the values in the table with the corresponding functions and columns of data from the names sheet
    • In Cell A10 type in the name “Force Comparison”
    • Create a table with all 6 sensor locations indicated as rows and columns as shown in Table 1 above
    • Fill in the respective data for forces from each of the respective data sheets
    • Starting in Cell A20 repeat steps f and g for the resultant accelerations from the different sensor locations
    • In Cell A30 Answer the following question: In looking at the data that you have just summarized, is there any relationship between the sensor locations in regard to the forces and/or resultant acceleration? If so, please describe that potential relationship as well.