Discussion 300 words

 

As connected medical devices are increasingly adopted within healthcare providers—from patient beds to syringes—so are the cyber risks associated with them.

Discuss the policies that need to be in place for medical device management and maintenance

PowerPoint_2G_Orientation #PowerPoint_2G_Orientation

 

PowerPoint_2G_Orientation #PowerPoint_2G_Orientation

Project Description:

In the following project, you will format a presentation that is  shown to Sensation Park Entertainment Group employees on their first day  of a three-day orientation.

Open   the file Student_PowerPoint_2G_Orientation.pptx downloaded with this project.
 

On Slide 1, format the subtitle—New Employee Orientation—as WordArt   using the last style in the first row.

Select the picture and then Crop   the image from the left side so  that the center-left crop handle aligns with   the left half of the  horizontal ruler at 5 inches.
 

Change the picture Height to 3.5   and then apply a Glow: 8 point;  Turquoise, Accent color 1 picture effect to   the image. Use the Align  Selected Objects command to apply Align Middle to   the title and the  picture.

On Slide 2, remove the bullet   symbol from the paragraph, and then  change the Shape Fill to, under Theme   Colors, in the third column, the  second color, and the Shape Outline to under   Theme Colors, in the  second column, the first color.

On Slide 3, convert the bulleted   list to the Hierarchy type  SmartArt graphic—Hierarchy List. Change the color   to Colorful Range –  Accent Colors 3 to 4, and then apply the 3-D Inset style.

On Slide 4, change the two   bulleted lists to Numbering.

On Slide 5, change the bullet   symbols to Filled Square Bullets,  change the Color to under Theme Colors, in   the third column, the  fourth color, and then change the Size to 100.

On Slide 5, in the placeholder   on the right, insert an online picture by searching for fire alarm and then insert a picture of a   fire alarm with a background.
   Note—alternatively, insert the image p02G_Alarm.jpg   downloaded with the data files for this project.

If the option is available,   remove the background from the picture,  and then apply the Glow: 18 point,   Bright Green, Accent color 3  picture effect.

On Slide 5, insert a Text Box   below the content placeholder on the left side of the slide. In the text box,   type All   employees will be tested on park safety procedures! Using the Align to Slide option   Align Center the text box and apply Align Bottom.

On Slide 6, from the Shapes   gallery, under Basic Shapes, insert a  Diamond of any size anywhere on the   slide. Resize the diamond so that  its Shape Height is 6 and its Shape Width   is 8. 

Using the Align to Slide option,   apply Align Center, and Align  Middle to the diamond shape. Apply the Moderate   Effect – Bright Green,  Accent 3 shape style.

In the diamond, type Sensation   Park Entertainment Group Welcomes You!  Change the Font Size to 28, and then apply the   Round Convex Bevel  effect to the diamond shape. Note—this effect may be   called Art Deco  on some systems.

Insert a Header & Footer on   the Notes and Handouts. Include the  Date and time updated automatically, the   Page number, and a Footer  with the text 2G_Orientation 

Display the document properties.   As the Tags type orientation.

Save and close the file, and   then submit for grading.

Discussion 300 words

 Tech companies prepare for cyberattacks using common cybersecurity resources. Select one of the resources listed and explain how you could implement that particular policy to prevent an attack:  1. monitoring and assessment, 2. policies and controls, 3. hiring, 4. software, 5. firewalls, 6. authentication and access, 7. encryption. 

What service daemon can

  

1. What service daemon can be configured and started so that linuxsupersuser does not have to manage and assign static ip addresses to a network host?

2. The linux firewall daemon iptables can enforce rules on all the following chains except input output route forward

3. As a security measure, all tcp services are protected by tcp wrappers, what two files make up the tcp wrappers?

4. After linux uses the secure shell command to generate a pair of public and private keys what should the user do with the public key?

5. The secure shell daemon, sshd listens whatcp port?

6. A user with the name jsmith will have the default directory ___ assigned to him for private use

7. The first line of a Linux Bash script must be ____

8. When using the chmod command in numeric mode, the permission r– can be represented by what number?

9. You can manage groups by using the following commmnads except___ groupadd,groupmod,groupdel,grouprm

Discussion – LAN Domain

This week you are learning about policies for IT infrastructure.  Choose a domain and write one standard or procedure for that domain.  For example,  you may choose LAN domain and write the Wi-FI Access point Security Standard.

500 words APA format required.

SIEMENS SIMATIC

I need to write a term paper on the topic Siemens Simatic- PCS7/WINCC (SCADA) 

There are all the requirements for the term paper alongside the template for the term paper.
Please help and thank you 

C++ CPU Temperature Sensors and Computational Mathematics

 

Your task is to take the temperature readings and generate for each core:

  1. A piecewise linear interpolation.
  2. A global linear least squares approximation.
  3. (Optional) A cubic spline (or other non-linear) interpolation.

2 Program Arguments & Execution

Your program must accept an input filename as the first command line argument. Your program must NOT prompt the user for a filename.

2.1 Input Format

Data takes the form of temperatures in a txt file. All data points are whitespace delimited. For example, if I had 5 temperature readings:

Example 1: Sample Input with Labels+61.0°C +63.0°C +50.0°C +58.0°C +80.0°C +81.0°C +68.0°C +77.0°C +62.0°C +63.0°C +52.0°C +60.0°C +83.0°C +82.0°C +70.0°C +79.0°C +68.0°C +69.0°C +58.0°C +65.0°C 

Example 2: Sample Input without Labels61.0 63.0 50.0 58.0 80.0 81.0 68.0 77.0 62.0 63.0 52.0 60.0 83.0 82.0 70.0 79.0 68.0 69.0 58.0 65.0 

would be a possible input files. Each line represents temperature readings from 4 processor cores. Process each temperature column independently. Readings are taken every 30 seconds. In this example:

  • line 1 is 0 sec
  • line 2 is 30 sec,
  • line 3 is 60 sec.
  • line 4 is 90 sec.
  • line 5 is 120 sec.
  • line 6 is 150 sec.
  • line 7 is 180 sec.

Your first step should be to pre-process this data into a usable form. Conceptually, you need the data in the following format:

This table is a conceptual visualization of the data. You may select any combination data structures, e.g., ADTS (classes or structs), arrays, lists, vectors, or maps.

Time (sec)Core 0Core 1Core 2Core 3061.063.050.058.03080.081.068.077.06062.063.052.060.012083.082.070.079.018068.069.058.065.0

2.3 Output Format

All output must be written to text files (one file pre core). Each line must take the form:

xk<=xtype

where

  • xkxk and xk+1xk+1 are the domain in which ykyk is applicable
  • ykyk is the kthkth function
  • type is either least-squares or interpolation

You will have:

  • n−1n−1 interpolation lines for each core
  • exactly one least squares approximation line for each core

For the example data in described in Section 2.1 (Input Format) you would generate 4 output files.

  • {basename}-core-0.{txt}
  • {basename}-core-1.{txt}
  • {basename}-core-2.{txt}
  • {basename}-core-3.{txt}

3 Sample Execution & Output

3.2 Sample Output

The following is an example of piecewise linear interpolation output for a single core.

ex-interpolation-one-core.txt 

4.1 Documentation Requirements

All code must be properly and fully documented using a language appropriate comment style. All functions (including parameters and return types) must be documented.

  1. Doxygen can be used for C++, Java, or JavaScript. Consider the following Doxygen Example:
    Example 3: C++ Doxygen Documentation/**  * Retrieve the value stored in three selected Cells  *  * @param cell1Id numeric id representing the 1st desired cell  * @param cell2Id numeric id representing the 2nd desired cell  * @param cell3Id numeric id representing the 3rd desired cell  *  * @return value stored in the Cell  *  * @pre (cell1Id > 0 && cell1Id < 10) &&  *      (cell2Id > 0 && cell2Id < 10) &&  *      (cell3Id > 0 && cell3Id < 10)  */ CellTriple get3Cells(int cell1Id, int cell2Id, int cell3Id) const;