Tag Archives: academic writing

Get Help-Alterations in Oxygen Transport

Get Help-Alterations in Oxygen Transport

Alterations in Oxygen Transport

Deb Smith, age fifty-six, came to her nurse practitioner (NP) with fatigue, pallor, dyspnea on exertion, and palpitations. Her laboratory report indicates that her hematocrit, hemoglobin, and reticulocyte counts are low; that her MCV is high; and that her MCH and MCHC are normal. Her diagnosis is pernicious anemia.

Answer the following questions regarding Deb’s anemia and provide the pathophysiology associated with the body’s response to this disease process.

  • Why should Deb’s NP ask her about paresthesia and ataxia?
  • Why did her NP prescribe vitamin B12 by intramuscular injection rather than orally?
  • What causes pernicious anemia?
  • What are the technical terms that describe an anemia with high MCV and normal MCH?

Get Help-Alterations in Oxygen Transport

Assignment Help-Discussion Question 1

Assignment Help-Discussion Question 1

Considering your role specialization (nurse educator, nurse informatics, nurse administrator, and family or adult-gerontology NP), rank the top three current trends or issues that you believe to be most important with regard to credentialing. You will want to identify two strategies that address how these issues will strengthen advanced nursing practice. Synthesize knowledge from values theory, ethics and legal regulatory statutes, and develop your personal philosophy for a career as an advanced practice nurse.


Get Help-Discussion Question 2

Get Help-Discussion Question 2

Discussion Question 2

Nurses in advanced practice roles need to be familiar with current health policy and strategies to contribute to policy development. Describe a policy issue for your selected role specialization. Synthesize knowledge for values theory, ethics, and legal regulatory statutes, and develop a personal philosophy that will map out a policy strategy that uses a high degree of political competence to address the policy issue as an advanced practice nurse.

Get Help-Discussion Question 2

Assignment 1: Discussion Question

Assignment 1: Discussion Question

Evaluate how you have achieved course competencies and your plans to develop further in these areas. The course competencies for this course are as follows:

  1. Explore the historical evolution of the advance practice nurse.
  2. Differentiate the roles and scope of practice for nurses working in advanced clinical, education, administration, informatics, research, and health policy arenas.
  3. Analyze attributes of the practice arena such as access and availability, degree of consumer choice, competition, and financing that impact advanced practice nurses and their ability to effectively collaborate with other health professionals.
  4. Integrate evidence from research and theory into discussions of practice competencies, health promotion and disease prevention strategies, quality improvement, and safety standards.
  5. Identify collaborative, organizational, communication, and leadership skills in working with other professionals in healthcare facilities and/or academic institutions.
  6. Synthesize knowledge from values theory, ethics, and legal/regulatory statutes in the development of a personal philosophy for a career as an advanced practice nurse.


Get Help on your Assignment

Get Help on your Assignment

Buy your research paper Online [http://customwritings-us.com/orders.php]

Question 1 (1 point)

Which two of the following are among the major 5 actors of the NIST Cloud Computing Reference Architecture?

Question 1 options:

Cloud Auditor
Cloud Broker
Cloud Database

Question 2 (1 point)

What is the block (word) size used by SHA-512 algorithm?

Question 2 options:


Question 3 (1 point)

Which of the following can be utilized as traceroute tool?

Question 3 options:

TTL (Time to Live)
Path Analyzer Pro

Question 4 (1 point)

What is a network of many hacked smartphones called?

Question 4 options:


Which version of the Linux kernal does Android rely upon?

Question 5 options:


Question 6 (1 point)

The Autorun feature of Removable Disks and CD Drives can be a threat to network Security.

What is the best course of action to remove Autorun for Removable Disks and CD Drives in


Question 6 options:

Tape the USB ports
Provide Users without Administrative Rights
Use Group Policy
Remove the CD-ROM Drive from the System

Question 7 (1 point)

According to the text, the three different types of Virtualization include:

Question 7 options:

SAN Virtualization
Network Virtualization
Storage Virtualization
Server Virtualization

Question 8 (1 point)

Among all smartphones, which is most likely to be hacked? (choose all that apply)

Question 8 options:

Windows Phone

Question 9 (1 point)

Some of the Infrastructure as a service vendors include: (choose all that apply)

Question 9 options:

Windows SkyDrive
Amazon EC2
Go Grid

Question 10 (1 point)

The psexec utility can be utilized to perform which of the following actions?

Question 10 options:

Get System Information
List Processes
Launch an Interactive Command Session
Show open files

Question 11 (1 point)

Which of the following are Mobile Network Based Attacks? (choose all that apply)

Question 11 options:

Man-in-the-Middle Attacks
Rogue Access Points
Packet Sniffing
SSL Strip

Question 12 (1 point)

The Management Information Base (MIB) includes which of the following?

(choose all that apply)

Question 12 options:

Scalar and Tabular Objects
File and Folder Permissions
OID Numbers
User Accounts

Question 13 (1 point)

Which of the following applies to an SSID? (choose all that apply)

Question 13 options:

Will be encrypted in WEP or WPA/WPA2 is utilized
Is part of the frame header
Is Case Sensitive
Can be up to 32 characters

Question 14 (1 point)

Which of the following are app stores? (choose all that apply)

Question 14 options:

ITunes Store
Google Play
BlackBerry App World

Question 15 (1 point)

Which Cloud Deployment model is a multi-tenant infrastructure shared among

organizations with common characteristics?

Question 15 options:

Private Cloud
Hybrid Cloud
Public Cloud
Community Cloud

Question 16 (1 point)

Question 16 options:

Disable File and Print Sharing
Block ICMP so the host cannot be detected
Use TCP Wrappers
Turn on the Windows Firewal

Question 17 (1 point)

A lack of vetting of apps can lead to which two of the following results?

Question 17 options:

Malicious apps
fake apps

According to your text, which of the following are ways to detect an Intrusion with

an (IDS)? (choose all that apply)

Choose all that apply

Question 18 options:

Anti-Virus Alerts
Anomaly Detection
Protocol Anomaly Detection
Signature Detection

Which of the following firewall architectures is designed to host servers that


public services?

Question 19 options:

Screened host
Bastion Host
Screened subnet

Question 20 (1 point)

Black hat hackers are:

Question 20 options:

Individuals who work both offensively and defensively at various times
Individuals who aim to bring down critical infrastructure for a cause

and are not worried about jail

Individuals professing hacker skills and using them for defensive

purposees, or security analysts

Individuals with extraordinary computing skills, resorting to malicious

or destructive activities

Question 21 (1 point)

Identify the Nmap Scan method that is often referred to as half open scan:

Question 21 options:

SYN Stealth
Half open
Windows Scan
ACK Scan

Question 22 (1 point)

According to the text, a major Denial of Service Attack caused major

problems for ___.

Question 22 options:

DALnet IRC Network
The Department of Defense
780th Military Intelligence Brigade

Question 23 (1 point)

Which of the following Management Information Base (MIB) files contains

information about server services?

Question 23 options:


Question 24 (1 point)

According to the text, which of the following is a form of MITM Attack?

Question 24 options:

Packet Sniffing
Checksum Evasion
API Hooking
SSL Strip

Question 25 (1 point)

Of the following options, which are virtualization vendors? (

choose all that apply)

Question 25 options:

VMware vSphere
VMware vCloud Suite
Virtual Box

Question 26 (1 point)

Which password cracking technique will the attacker use if she gets

some information about the password to crack?

Question 26 options:

Denial of Service Attack
Distributed Network Attack (DNA)
Rule-based Attack
Syllable Attack

Question 27 (1 point)

Which of the following are signs of file system intrusion?

(choose all that apply)

Question 27 options:

Connection Requests
Double Extensions
Rogue SUID Entries
Reduced Bandwidth


Question 28 (1 point)

According to OWASP, strong encryption channels, such as which of the following should be used? (choose all that apply)

Question 28 options:


Buy your research paper Online [http://customwritings-us.com/orders.php]

Question 29 (1 point)

Which of the following are risks of rooting? (choose all that apply)

Question 29 options:

voiding the warranty
poor performance

Question 30 (1 point)

Buffer overflow attacks allow an attacker to modify the ___________ in order to control the process execution, .

Question 30 options:

Target process’s address space
Target remote access
Target rainbow table
Target SAM file

Question 31 (1 point)

According to the text, by 2018, what percentage of enterprises will specify Wi-Fi as the default connection?

Question 31 options:


Question 32 (1 point)

Identify the attack which forces an unsuspecting user’s browser to send malicious requests they did not intend.

Question 32 options:

SQL injection attack
LDAP Injection attack
Cross-Site Request Forgery (CSRF)
Cross-Site Scripting (XSS)

Question 33 (1 point)

Which of the following is an antenna based on the principal of a satellite dish and can pick up Wi-Fi signals from 10 miles away?

Question 33 options:

Omni Directional

Question 34 (1 point)

You should place your Intrusion Detection System (IDS) in this location on the network (choose all that apply):

Question 34 options:

Outside the Firewall
At the ISP Location
Inside the Firewall

Question 35 (1 point)

Permutation Scanning involves which of the following?

Question 35 options:

Using a psudorandom function
Looking for new vulnerable machines on the local subnet
Collecting a list of possibly vulnerable machines
Using information from infected machines

Buy your research paper Online [http://customwritings-us.com/orders.php]

Question 36 (1 point)

What are some of the limitations of Cloud Computing services? (choose all that apply)

Question 36 options:

Storage Limits
Control Limits

Question 37 (1 point)

Which wireless standard has bandwidth up to 54 Mbps and signals in a regulated frequency spectrum around 5 GHz?

Question 37 options:


Question 38 (1 point)

It was well publicized that BlackShades Net was used as an attack tool against:

Question 38 options:

Syrain Political Activists
Sony Pictures

Question 39 (1 point)

Which Cloud Consumer model includes storage, service management, and content delivery?

Question 39 options:


Question 40 (1 point)

What were the two dominant attack strategies identified in Symantec’s Threat Report?

Question 40 options:

Advanced Persistent Threats
Broader Strokes
Focused Attack
Distributed Denial of Service

Question 41 (1 point)

SYN flooding takes advantage of which of the following? (choose all that apply)

Question 41 options:

A flaw in how the three-way handshake can be implemented
A flaw in some firewalls which do not restrict ICMP traffic by default
Not replying to SYN/ACKs
Holding the incomplete connection for a period up to one second

Question 42 (1 point)

Which of the following is a tool that can be used to check for modified or trojanzied files?

Question 42 options:


Question 43 (1 point)

The advantages of a using a Community Cloud Deployment include which of the following? (choose all that apply)

Question 43 options:

High Security
Clear Legal Entity
Compliance to Regulations
Shared Resources

Question 44 (1 point)

Which of the following sentences is true about a proxy?

Question 44 options:

Cannot be used to filter out unwanted content
Allows attacker to view the desktop of users system
Protects the local network from outside access
Does not allow the connection of a number of computers to the Internet when having

only one IP


Question 45 (1 point)

Which of the following Windows Utilities can be utilized to enumerate hosts?

Question 45 options:

net stop
net view
net Use
net start

Question 46 (1 point)

Which of the following is the 3D Graphics Library of Android?

Question 46 options:

Media Framework

Question 47 (1 point)

Which of the following applies to an Intrusion Detection System (IDS)? (choose all that apply)

Question 47 options:

Monitors outbound traffic
Monitors inbound traffic
Will perform actions to stop the attacker in their tracks
Signals an alarm

Question 48 (1 point)

What is the size of WEP initialization vector (IV)?

Question 48 options:


Question 49 (1 point)

low? (choose all that apply)

Question 49 options:

removing bloatware
Low level access to hardware
deleting system files

Question 50 (1 point)

If you want to mask (or spoof) your IP Address, what type of scan should you use?

Question 50 options:

ACK Flag Probe Scan
Stealth Scan
UDP Scan

Question 51 (1 point)

An organization can implement this Cloud Deployment model within the corporate firewall.

Question 51 options:

Public Cloud
Hybrid Cloud
Community Cloud
Private Cloud

Question 52 (1 point)

Which of the following is true about the 802.11i standard?

Question 52 options:

It operates at both 2.4 GHZ and 5 GHZ
It defines WPA-2 Enterprise and Personal
It operates at 5 GHZ only
It operates at 2.4 GHZ only

Question 53 (1 point)

Which two of the following are included in Android Runtime?

Question 53 options:

core libraries
Dalvik Virtual Machine
Flash memory driver
Bind IPC driver

Question 54 (1 point)

Which modes on Bluetooth devices at greater risk? (choose all that apply)

Question 54 options:


Question 55 (1 point)

Which of the following is an example of a Trojan that can be utilized for Website Defacement?

Question 55 options:


Question 56 (1 point)

Which rootkit modifies the boot sequence to load themselves instead of the original virtual machine monitor?

Question 56 options:

Library level rootkits
Hypervisor level rootkit
Boot loader level rootkit
Kernel level rootkit

Question 57 (1 point)

Central Source propagation commonly utilized what two protocols?

Question 57 options:


Question 58 (1 point)

What happens when the CAM table is full?

Question 58 options:

It does not affect the switch functioning
Additional ARP request traffic will not be forwarded to any port on the switch
Additional ARP request traffic will flood every port on the switch
The switch will stop functioning and get disconnected from network

Question 59 (1 point)

Which of the following companies offer Cloud Computing services? (choose all that apply)

Question 59 options:


Question 60 (1 point)

Which of the following evasion techniques rely on Time-to-Live (TTL) fields of a TCP/IP packet?

Question 60 options:

Denial-of-Service Attack
Insertion Attack
Unicode Evasion

Question 61 (1 point)

Which of the following conditions shows the presence of a honeypot?

Question 61 options:

Ports show a particular service running and allow a three-way handshake connection
Ports show a particular service running but deny a three-way handshake connection
Scan shows that no scanned port is live on the network
Ports do not show any particular service running

Question 62 (1 point)

What virus modifies the directory table entries so they point to the virus code instead of the actual program?

Question 62 options:

Boot Sector Viruses
Macro Viruses
Cluster Viruses
Encryption Viruses

Question 63 (1 point)

Identify the statement which is true for RC6 algorithm:

Question 63 options:

Is a 64 bit block cipher that uses a key length that can vary between 32 and 448 bits
Is a parameterized algorithm with a variable block size, key size, and a variable number

of rounds

Includes integer multiplication and the use of four 4-bit working registers
Is a variable key-size stream cipher with byte-oriented operations and is based on random


Question 64 (1 point)

ARP Spoofing involves constructing a large number of forged ARP request and reply packets to overload:

Question 64 options:


Question 65 (1 point)

Packet filtering firewall works at which of these layers of the OSI model?

Question 65 options:

Physical layer
Application layer
Session layer
Network layer

Question 66 (1 point)

All of the following are true about an SSID except which of the following?

Question 66 options:

Is Case Sensitive
Can be up to 32 characters
Is part of the frame header
Will be encrypted in WEP or WPA/WPA2 is utilized

Question 67 (1 point)

According to your text, which of the following are Cloud Deployment Models? (choose all that apply)

Question 67 options:

Community Cloud
Public Cloud
Hybrid Cloud
Private Cloud

Question 68 (1 point)

Which of the following is true about active stack fingerprinting?

Question 68 options:

Uses sniffing techniques instead of the scanning techniques
Uses password crackers to escalate system privileges
TCP connect scan
Is based on the differential implantation of the stack and the various ways an OS responds

to it

Is based on the fact that various vendors of OS implement the TCP stack differently

Question 69 (1 point)

Which of the following are characteristics of Cloud Computing services? (choose all that apply)

Question 69 options:

Distributed Storage
Virtualization Technology
Measured Services
Resource Pooling

Question 70 (1 point)

According to OWASP, the top ten mobile risks include which two of the following?

Question 70 options:

Insecure Data Storage
Client Side Injection
WEP and WPA1

Question 71 (1 point)

According to your text, examples of malware include which of the following? (choose all that apply)

Question 71 options:


Question 72 (1 point)

BlackShades Net can best be described as a:

Question 72 options:

DDoS Tool

Question 73 (1 point)

With Cross Site Scripting, attackers can inject malicious ____. (choose all that apply)

Question 73 options:


Question 74 (1 point)

With this Cloud Deployment model, the provider makes services such as applications, servers, and data storage available.

Question 74 options:

Hybrid Cloud
Community Cloud
Public Cloud
Private Cloud

Question 75 (1 point)

When an attacker is performing a denial of service and a SYN attack is initiated which of the following occurs? (choose all that apply)

Question 75 options:

Sends a large number of ACK packets to the target
Uses a fake source address
Sends a large number SYN requests to the target
Uses the actual source address

Buy your research paper Online [http://customwritings-us.com/orders.php]

Question 76 (1 point)

Which scanning technique will bypass firewall rules, logging mechanism, and hide themselves?

Question 76 options:

TCP connect scanning technique
Xmas scanning technique
Stealth scanning technique
Maintaining Access
FIN scanning technique

Question 77 (1 point)

Which of the following characteristics applies to the Simple Service Discovery Protocol (SSDP)? (choose all that apply)

Question 77 options:

Can be vulnerable to denial of service
Not work behind a firewall
Controls Communication for the Universal Plug and Play Service
Uses multicast addresses

Question 78 (1 point)

Of the following, which two are purposes of malware?

Question 78 options:

Making a Computer Useless
Obtaining Passwords
Remove the Default LAN Route
Disable Networking Functions

Question 79 (1 point)

Which of the following techniques is used to simulate an attack from someone who is unfamiliar with the system?

Question 79 options:

White box pen testing
Grey box pen testing
Maintaining Access
Announced pen testing
Black box pen testing

Question 80 (1 point)

Which version of Wired Equivalent Privacy (WEP) uses a 104-bit key size?

Question 80 options:

152 bit WEP
64 bit WEP
128 bit WEP
256 bit WEP

Question 81 (1 point)

Which of the following are Mobile Physical Based Attacks? (choose all that apply)

Question 81 options:

Carrier Loaded Software
No passcode

Question 82 (1 point)

Which of the following uses direct client to client (DCC)?

Question 82 options:

Internet Relay Chat
Internet Browser
File Sharing with Mapped Drives
Email Clients such as Outlook Express

Question 83 (1 point)

Which device in a wireless local area network determines the next network to which a packet should be forwarded?

Question 83 options:

Wireless modem
Mobile station
Wireless router

Question 84 (1 point)

Mobile Devices are replacing which of the following devices? (choose all that apply)

Question 84 options:


Question 85 (1 point)

Which of the following are some of the main functions of an Intrusion Detection System (IDS)? (choose all that apply)

Question 85 options:

Performs packet sniffing
Blocks rule-based traffic
Performs packet analysis
Gathers and analyses information from a network

Buy your research paper Online [http://customwritings-us.com/orders.php]

Question 86 (1 point)

Which of the following scans only works if the operating systems TCP/IP implementation is based on RFC 793?

Question 86 options:

Maintaining Access
IDLE scan
TCP connect scan
NULL scan
FTP bounce scan

Question 87 (1 point)

Which of the following is one of the most reliable forms of TCP scanning?

Question 87 options:

Half-open Scan
Connect Scan
Inverse TCP Flag Scan

Question 88 (1 point)

Fake Defender deleted apk files from which two of the following locations?

Question 88 options:


Question 89 (1 point)

Which of the following 802.11 standards uses Orthogonal Frequency Division Multiplexing? (choose all that apply)

Question 89 options:


Question 90 (1 point)

Passive sniffing refers to:

Question 90 options:

Sniffing through a hub
Sniffing through a switch
Sniffing through a bridge
Sniffing through a router

Question 91 (1 point)

Which of the following are methods to connect smartphones to a network? (choose all that apply)

Question 91 options:

Wired Connection

Question 92 (1 point)

Which of the following are disadvantages of signature detection? (choose all that apply)

Question 92 options:

False Alerts
Signature Detection
False Positives
Administrative Alerts

Buy your research paper Online [http://customwritings-us.com/orders.php]

Question 93 (1 point)

Which of the following protocols are susceptible to sniffing?

Question 93 options:


Question 94 (1 point)

Which of the following are SPAM? (choose all that apply)

Question 94 options:


Question 95 (1 point)

Which of the following factors contribute to a successful session hijacking attack?

Question 95 options:

Definite session expiration time
No clear text transmission
Weak session ID generation algorithm
Account lockout for invalid session IDs

Question 96 (1 point)

Which of the following ports does NTP use as its primary means of communication?

Question 96 options:

UDP port 161
UDP port 113
UDP port 320
UDP port 123

Question 97 (1 point)

Which of the following viruses evades the anti-virus software by intercepting its requests to the operating system?

Question 97 options:

Cluster virus
System or boot sector virus
Macro virus
Stealth/Tunneling virus

Question 98 (1 point)

Which of the following Wi-Fi chalking methods refers to drawing symbols in public places to advertise open Wi-Fi?

Question 98 options:


Question 99 (1 point)

According to your text, what are the 3 types of cloud services?

Question 99 options:

Platform as a Service
Infrastructure as a Service
Virtualization as a Service
Software as a Service

Question 100 (1 point)

Which of the following is transmission method of digital data that uses a pseudo random noise spreading code?

Question 100 options:


Question 101 (1 point)

Which of the following steganography techniques embeds a secret message in the frequency domain of a signal?

Question 101 options:

Transform domain techniques
Cover generation techniques
Domain distortion techniques
Spread spectrum techniques

Question 102 (1 point)

Which of the following commands can be used in a UNIX environment to enumerate the shared directories?

Question 102 options:


Question 103 (1 point)

Which of the following are Network Time Protocol (NTP) enumeration commands? (choose all that apply)

Question 103 options:

Net time

Question 104 (1 point)

The SMTP Protocol provides 3 built in commands, including which of the following?

Question 104 options:


Question 105 (1 point)

Temporal keys are changed for every ___________.

Question 105 options:

1,000 packets
5,000 packets
10,000 packets
15,000 packets

Question 106 (1 point)

The MAC Address of an access point is referred to as the ___.

Question 106 options:


Question 107 (1 point)

According to your text, components of a Cloud Broker include which of the following? (choose all that apply)

Question 107 options:

Service Arbitration
Service Negotiation
Service Intermediation
Service Aggregation

Question 108 (1 point)

Which of the following is a symptom of a DoS attack?

Question 108 options:

Decrease in the amount of spam emails received
Automatic increase in network performance
Automatic increase in network bandwidth
Unavailability of a particular website

Buy your research paper Online [http://customwritings-us.com/orders.php]

Question 109 (1 point)

Which of the following are LDAP enumeration tools? (choose all that apply)

Question 109 options:

Active Directory Explorer

Question 110 (1 point)

Identify the correct statement for a software firewall.

Question 110 options:

Software firewall is placed between the router and the networking components of the

operating system

Software firewall is placed between the desktop and the software components of the

operating system

Software firewall is placed between the normal application and the networking component

s of the operating system

Software firewall is placed between the anti-virus application and the IDS components of

the operating system

Buy your research paper Online [http://customwritings-us.com/orders.php]

Question 111 (1 point)

Which of the following is an antenna used in wireless base stations and provides a 360 degree horizontal radiation pattern?

Question 111 options:

Omnidirectional antenna
Parabolic grid antenna
Yagi antenna
Dipole antenna

Question 112 (1 point)

Signs of Intrusions include which of the following? (choose all that apply)

Question 112 options:

Strange Processes
Slow Performance
System Crashes
Missing Logs

Question 113 (1 point)

According to the text, which of the following will protect by limiting the ability to access resources?

Question 113 options:

Jail Breaking
Android Rooting
app sandboxing
Jail break detection

Buy your research paper Online [http://customwritings-us.com/orders.php]

Question 114 (1 point)

Sophos mobile security features include (choose all that apply)

Question 114 options:

Spam Protection
Loss and Theft Protection
antivirus anti-malware
Privacy Protection and security

Question 115 (1 point)

According to OWASP, which of the following should be applied to transport channels? (choose all that apply)

Question 115 options:

WPA2 with AES

Question 116 (1 point)

According to the text, characteristics of Virtualization in cloud computing technology include which of the following? (choose all that apply)

Question 116 options:

Wireless Capable

Question 117 (1 point)

What does SSL Strip do? (choose all that apply)

Question 117 options:

Remove HTTPS
Force HTTP
Exploit the Server
Exploit the Client Connection

Buy your research paper Online [http://customwritings-us.com/orders.php]

Question 118 (1 point)

Which two of the following are signs of network intrusion? (choose all that apply)

Question 118 options:

Sudden Influx of Data
File Size Modifications
Repeated Service Probes
Missing Files

Question 119 (1 point)

Which of the following below accurately describes Transmission Control Protocol? (choose all that apply)

Question 119 options:

Can terminate a connection
Provides acknowledgment
Supports Retransmission of lost Data
Connection-less oriented protocol

Question 120 (1 point)

Footprining tools will help gather the following information about a target. (choose all that apply)

Question 120 options:

IP Addresses
Host Names
Process Lists
DNS Records

Buy your research paper Online [http://customwritings-us.com/orders.php]

Question 121 (1 point)

Which of the following are types of database attacks? (choose all that apply)

Question 121 options:

HOS Command Execution
Privilege Escalation
Data Dumping
SQL Injection

Buy your research paper Online [http://customwritings-us.com/orders.php]

Question 122 (1 point)

Which of the following techniques practiced by an attacker exploits human behavior to make attacks?

Question 122 options:

Denial of Service
SQL injection
Social Engineering
Buffer overflow

Question 123 (1 point)

Identify the denial-of-service attack that is carried out using a method known as “bricking a system.”

Question 123 options:

Bandwidth Attacks
Application Level Flood Attacks
ICMP Flood Attack

Question 124 (1 point)

Which of the following enumeration techniques does an attacker use to obtain list of computers that belongs to a domain?

Question 124 options:

Netbios enumeration
SNMP enumeration
SMTP enumeration
NTP enumeration

Buy your research paper Online [http://customwritings-us.com/orders.php]

Question 125 (1 point)

Which is the best location to place keyloggers?

Question 125 options:

UPS and keyboard
Monitor and keyboard software
Keyboard hardware and the operating system
Operating system and UPS

Get Help-Assignment (AMA)

Get Help-Assignment (AMA)

Assignment (AMA)


Q3: Two opposite corners are removed from an 8-by-8 checkerboard. Prove that it is impossible to cover the remaining 65 squares with 31 dominoes, such that each domino covers two adjacent squares?




Q3: Through A Write an algorithm to construct the indicated graph operation, using only the primary graph operations of additions and deletions of vertices and edges. Test your algorithm on the pair ( P4, W5 ) and on the pair ( K4 – K2, C4 ):

  • Cartesian product of two graphs (psedocode)?


Q4: Through A,B either draw the required graph or explain why no such graph exists:

  • An 8-vertex, 2-component, simple graph with exactly 10 edges and three cycles?
  • An 11-vertex, simple, connected graph with exactly 14 edges that contains five edge-disjoint cycles?


Q5: Prove or disprove: If a simple graph G has no cut-edge, then every vertex pf G has even degree?


Q6: Prove that if a graph has exactly two vertices of odd degree, then there must be a path between them?


Q7: Show that any nontrivial simple graph contains at least two vertices that are not cut-vertices?


Q8: Through A Draw the specified tree(s) or explain why on such a tree(s) can exist?

  • A 14-vertex binary tree of height 3.


Q9: Prove that a directed tree that has more than one vertex with in degree 0 cannot be a rooted tree?

Get Help-Assignment (AMA)


Need Help-MSE 250 HW 4 Reading: Callister Ch. 7 and Ch. 8

Need Help-MSE 250  HW 4 Reading: Callister Ch. 7 and Ch. 8

MSE 250  HW 4

Reading: Callister Ch. 7 and Ch. 8.


Academic Integrity:  Students are encouraged to study with a partner or small group, but each student should complete their homework by themselves (no copying allowed). The data table and plots referred to are given at the end of the homework.


Please write clearly, show all work in an organized fashion, and circle answers.


1)  Using the data shown in Figures 6.14 (at 25oC) and 6.21, combine both curves onto one plot, being careful to correctly plot the modulus, yield strength, tensile (ultimate) strength, and ductility.  Discuss how the modulus, yield strength, and ductility compare for pure iron (figure 6.14) vs. the alloy steel.


2)  The equation for the effect of grain size on yield strength is given by:

sy = sI +kD-0.5

where sy is the yield stress, sI is the intrinsic resistance of the lattice to dislocation motion, k is the “blocking parameter” which measures the effectiveness of grain boundaries in blocking dislocation motion, and D is the grain diameter.

Use this equation to determine the change in yield strength of a typical steel when the grain size is increased from 10micron to 50 micron (1 micron = 10-6 m), due to grain growth.  .  sI = 150 MN/m2 and k = 0.70 MN/m1.5 .


3)  Using the data shown in Callister Figure 7.19, draw an approximate stress-strain curve for the 1040 steel at 0% cold work and at 30% cold work, clearly indicating the yield strength, ductility, and tensile strength of the steel before and after cold-working (Young’s modulus of steel E = 250 MPa).


4)  A fatigue test is carried out on a steel having an ultimate strength of 289 MPa.  The number of cycles required to break the specimen at different stresses are given below:


Stress Amplitude                  Fatigue Life

(MPa)                                     (cycles)

223                                         4.5 x 104

209                                         2.4 x 105

192                                         8.0 x 105

178                                         1.5 x 106

175                                         2.7 x 106

168                                         7.8 x 106

168                                         >1.0 x 107 (did not break)

165                                         >2.6 x 107

162                                         >2.2 x 107


  1. a) Plot the data on linear-log scale, preferably with a computerized figure-plotting program.
  2. b) Determine the average fatigue strength at 106 cycles (hint: use curve-fitting software to fit the line).
  3. c) What is the ratio of the fatigue strength at 106 cycles to the ultimate strength?
  4. e) If you plan to use this material for 108 cycles, what is the maximum fatigue strength you would recommend (assuming 20% fluctuations in stress amplitude).


Callister Homework Problems:  7.22, 8.4, 8.12 (see next page)



Need Help-MSE 250  HW 4 Reading: Callister Ch. 7 and Ch. 8




































Need Help-ENGL 250, F16 Assignment 1

Need Help-ENGL 250, F16 Assignment 1 

In this assignment, you will apply the pyramid structure to memo writing, integrate content (by paraphrasing, summarizing or quoting) from professional publications, and use APA style documentation (in-text citations and reference list).

This assignment must be completed individually. It is worth 5%, and it is due at the start of class in week 4. Please submit an electronic version of the assignment to the drop box on eCentennial AND a hard copy of the assignment in class. Due Date: Friday, September 30, 2016.

Assignment learning outcomes:

  • Format and write memos
  • Keep an accurate and reliable record of research findings
  • Read and comprehend articles in scientific and professional publications


Your Task

  • Select a topic. Your topic should be an emerging technology, new finding or breakthrough, current trend, or recent news items related to your field of study at Centennial College.
  • Conduct research on your topic. Your goal is to find professional and / or scientific sources on your chosen topic. You may access these resources through Centennial College’s library OR Google Scholar. You must use a minimum of two sources for this assignment.
  • Write a memo to inform your instructor about your chosen topic. Write a concise, one -page (single spaced) informative memo report to your ENGL 250 instructor about this topic. In your report you should use the pyramid structure and address the following questions:
    • What is your field of study at Centennial?
    • What did you learn about your chosen topic? You should paraphrase, summarize and / or quote content from your sources to address this question.
    • Why is your chosen topic important to your field of study?
  • Use your own words. Your report will be submitted to Turnitin. Content that is copied and pasted from your sources is considered plagiarism and is not acceptable.
  • Acknowledge your sources. In your report, include
    • correctly formatted in-text citations (APA) and
    • a correctly formatted reference page (APA).
  • Use an appropriate tone, technical writing style and correct format. Your writing in this course should be clear, concise, correct, courteous, complete, and concrete. Where possible, you should use active voice. Ensure that you proofread your work for grammatical and formatting errors.

To successfully complete this assignment, you must refer to the Centennial College APA Style Examples of In-text Citations & References, 6th ed. (2010), which can be found on the Centennial College library website at http://library.centennialcollege.ca/research/apa (it is also posted on our eCentennial site) OR another credible source on APA Style.

 Need Help-ENGL 250, F16 Assignment 1  


Tommy Smith
Due date: Sec001
This project milestone will require students to practice the following SolidWorks skills
Extrudes (boss and cut), Shell,
Sketch Relations, Convert Entities, Linear Feature
Patterns, Equations, and Global Variables.
Students must create a 6×2
block similar to LEGO part number
(see last page of
your LEGO kit documentation). The block must be created according to
the following, and in
this order
Save your
original SolidWorks part file
to your project folder on the W drive, called
The file type should be SLDPRT (*.prt; *.sldprt).
Create global variables “Length” and “Width” and set Length=6 and Widt
Create the base extrude feature, based on a sketch where the length and width are defined
using an equation referencing the two global variables already defined in Step #1 and
multiplying by 8mm to calculate the total width and length of the block.
Place your sketch
on the “top” plane for this base feature and be sure to extrude “up”. Extrude the sketch to
Create one circular knob feature, with diameter of 5mm and height of 1.8 mm. Locate the
center of the boss 4mm each direction from the co
rner of the base feature.
Tommy Smith
Create a linear feature pattern in two dimensions, using the edges of the base feature to
define the direction. Set the spacing to 8mm and set the number of instances in each
direction by using equations to reference the two global variables already define
d in Step
On the bottom of the base feature, use the shell command to create a shell feature with a
thickness value of 1.5 mm.
Adjust the depth of the hollow under the LEGO by doing another extrude cut that is 0.1 mm
deep. This makes the depth 1.8 m
m instead of 1.7mm (so the LEGO blocks would fit
together properly)
Create a sketch on the underside (same face you just adjusted in step 6). Use “convert
entities” to bring the four circular edges of the bosses into your sketch. Select the four
in your sketch and make them construction geometry (dashed lines). Now create an
annulus (circle inside a circle, concentric) such that the outside circle is tangent to the
dashed circles (only need three tangencies to define) and the inside circle has a
diameter of
Notice that you don’t have enough of the annulus bosses on the underside. Fix this by
creating another linear feature pattern in two directions, using an equation to link it to the
“Length” and “Width”. Hint: Remember that you need to use
an “n
1” approach…there are
always one less ring underneath in each direction compared to the number of knobs on top.
Try redefining “Length” and “Width” to be other values. Note that your patterns work well so
long as there is more than one new instance
of the feature. For instance, if you set Length=2
and Width=2 you will get an error because the pattern for the ring underneath no longer has
any new instances. The solution to this problem is to “suppress” the pattern when it is not
being used (“suppress
” is available when you right
click a feature in the tree).

HVAC DUCT Design Project Grading

HVAC DUCT Design Project Grading


  1. Geometry creation 15 pts.
  2. Grid generation 5 pts.
  3. CFD results and post processing 15 pts.
  4. Design changes if needed for providing required flow
  5. Presentation of results 15 pts.


  1. Presentation of HW Results:
  2. Problem description,
  3. Preliminary Analysis, your design philosophy
  4. Duct design geometry presentation (make sure reader can understand the duct design geometry). All Figures in HW must have a title and you must refer to them in your discussions.
  5. Presentation of Mesh
  6. Presentation of Sample CFD results
  7. Report mass flux output from each outlet in tabulated form (and from CFD code in the appendix. Output numbers directly from CFD code in the Appendix).  Also report static pressure loss (needed to select a fan for this HVAC duct.)
  8. Design changes if needed to provide required flow rate
  9. Appendix: CFD input/output



Additional Work for Graduate Students (20 points):

Report proposed modification to the ducting systems to obtain the required flow rates.

Clearly identify modifications and see number 6 above


heat exchanger design to accommodate temperature output required.

Report proposed heat exchanger design to accommodate temperature output required.

Location of heat exchangers, How they affect required flow rate and static pressure?

How you incorporate heat exchanger into CFD results

%d bloggers like this: