zanimehara

zanimehara

Lv2

zanimehara

0 Followers
0 Following
0 Helped

ANSWERS

Published29

Subjects

Law2English2Astronomy1Information Technology2Computer Science8Finance5Chemistry9
Answer:Laughing gas is the common name for nitrous oxide (N2O), which is a col...

Assignment Brief and Guidance:

EMC Cloud Solutions is reputed as the nation’s most reliable Cloud solution provider in Sri Lanka. A number of high-profile businesses in Sri Lanka including Esoft Metro Camps network, SME Bank Sri Lanka and WEEFM are facilitated by EMC Cloud Solutions. EMC Cloud provides nearly 500 of its customers with SaaS, PaaS & IaaS solutions with high-capacity compute and storage options. Also, EMC is a selected contractor for Sri Lanka, The Ministry of Defense for hosting government and defense systems.

EMC’s central data center facility is located at Colombo Sri Lanka along with its corporate head-office in Bambalapitiya. Their premises at Bambalapitiya is a six-story building with the 1st floor dedicated to sales and customer services equipped with public wifi facility. Second-floor hosts HR, Finance and Training & Development departments and the third-floor hosts boardroom and offices for senior executives along with the IT and Data center department. Floor 4,5,6 hosts computer servers which make up the data center.

With the rapid growth of information technology in Kandy area in recent years, EMC seeks opportunity to extend its services to Kandy, Sri Lanka. As of yet, the organization still considers the nature of such extension with what to implement, where is the suitable location and other essential options such as security are actually being discussed.

You are hired by the management of EMC Solutions as a Security Expert to evaluate the security-related specifics of its present system and provide recommendations on security and reliability related improvements of its present system as well as to plan the establishment of the extension on a solid  security foundation.

Activity 01

Assuming the role of External Security Consultant, you need to compile a report focusing on following elements to the board of EMC Cloud Solutions;
Identify types of security risks EMC Cloud is subject to, in its present setup and the impact, such issues would create on the business itself.

Develop and describe security procedures for EMC Cloud to minimize the impact of issues discussed in section (1.1) by assessing and treating the risks.

Activity 02
Discuss how EMC Cloud and its clients will be impacted by improper/ incorrect configurations which are applicable to firewalls and VPN solutions.

Explain how following technologies would benefit EMC Cloud and its Clients by facilitating a ‘trusted network’. (Support your answer with suitable illustrations).
DMZ
Static IP iii) NAT
Discuss the benefits of implementing network monitoring systems.


Activity 03
Formulate a suitable risk assessment procedure for EMC Cloud solutions to safeguard itself and its clients.


Explain the mandatory data protection laws and procedures which will be applied to data storage solutions provided by EMC Cloud. You may also highlight on risk management methodology.

Comment on the topic, ‘IT Security & Organizational Policy’

Answer:Activity 01: Types of security risks EMC Cloud is subject to, in its pr...
Answer:An everyday example of a solution is saltwater. In this solution, salt ...
Answer:First, let's write out the balanced chemical equation for the reaction ...
Answer:Hello! Yes, I'm available to chat. How can I assist you with 3210?
Answer: Python is a high-level, interpreted programming language that is widel...

Explanation about Python theory??

Introduction to Python Programming Language

Are you ready to learn Python? Join us on our Learn Coding Channel!

 

Python is a high-level, interpreted programming language used for web development, data analysis, artificial intelligence, and more. It was first introduced in 1991 by Guido van Rossum, and has since become one of the most popular languages among developers.

 

Installing Python

Before we can start coding in Python, we need to install it on our system. Here's how:

 

Go to the Python website

Download the appropriate version for your system (Windows, Mac, Linux, etc.)

Run the installer

Follow the instructions to complete the installation

Getting Started with Python

Now that we have Python installed on our system, we can start coding! Python has a simple syntax, which makes it easy to learn for beginners. Here are a few basic commands to get you started:

 

print("Hello, World!") - This command will print the text "Hello, World!" to the console

x = 5 - This command will create a variable called x and assign it the value of 5

if x == 5:

print("x is equal to 5") - This command will print the text "x is equal to 5" to the console if the value of x is 5

These are just a few basic commands in Python. As you continue to learn, you'll discover many more powerful functions and libraries that will help you code even more effectively.

 

Applications Limitations:

 

Python is a general-purpose language used everywhere.

It is dynamically typed.

Python is used to develop software that can be written with Python.

Python has been described as a 'general-purpose' language for more than 30 years.

It was designed for the purpose of developing software that could be written in the Python language.

Python's creator says the language is a "general-purpose purpose-built" language that is designed to work in the context of the world.

Python is now available to developers to create software that uses Python for the first time.

It's a 'safely typed' language that can work in its own way of working in the language.

It has no easy-to-read software that has been developed in the way of developing in the past.

Python has a built-in, language-free software that works in its native language.

The language-free source software is easy to source and is available in the region.

It's free source, and it'll be available to use.

Python is a safe source software preventing software distributors and providers.

Python has been available to provide software resource, software machine-based systems, and software distributors for Python users.

Python-preferred software users are software makers, language providers, and Python-based software savvy software predominations.

Python is a reliable-driven and blocked software bi-prepared in a distributed software generational bundle.

About Guido van Rossum's New Book

Guido van Rossum's new book is written in a very lowkey manner yet developed at a high level, making it easy to read and understand Python. It's named after a comedy group and is available in the UK and Australia for ÂŁ25.99.

 

Python program brings a variable to creation;

Guido van Rossum's new book is a great resource for understanding Python;

The book is available in the UK and Australia for ÂŁ25.99.

Guido van Rossum is the author of the book which was released in October.

Answer: Python is a high-level, interpreted programming language that is widel...
Answer: Flexibility refers to the range of motion in our joints and muscles. I...
Answer: Getting Started with ROS ROS (Robot Operating System) is an open-sourc...
Answer: 1. Non-verbal Communication: Communication that occurs without the use...
Answer: a. High dividends. High growth stocks are companies that are expected ...
Answer: To calculate the average bond enthalpy of the C-C bond in propane, we ...

This question got resolved

I put in his code

void getUID() {
  FirebaseAuth auth = FirebaseAuth.instance;
  User? user = auth.currentUser;
  if (user != null) {
    setState(() {
      uid = user.uid;
    });
  }
}

When I run the flutter program I now get this error  msg

======== Exception caught by widgets library =======================================================
The following assertion was thrown building TaskListPage(dirty, state: _TaskListPageState#61ebf):
a document path must be a non-empty string
'package:cloud_firestore/src/collection_reference.dart':
Failed assertion: line 116 pos 14: 'path.isNotEmpty'

When the exception was thrown, this was the stack: 
#2      _JsonCollectionReference.doc (package:cloud_firestore/src/collection_reference.dart:116:14)
#3      _TaskListPageState.build (package:todolist/pages/tasklist/tasklist.dart:75:16)
#4      StatefulElement.build (package:flutter/src/widgets/framework.dart:5080:27)
#5      ComponentElement.performRebuild (package:flutter/src/widgets/framework.dart:4968:15)
#6      StatefulElement.performRebuild (package:flutter/src/widgets/framework.dart:5133:11)
#7      Element.rebuild (package:flutter/src/widgets/framework.dart:4690:5)
#8      ComponentElement._firstBuild (package:flutter/src/widgets/framework.dart:4950:5)
#9      StatefulElement._firstBuild (package:flutter/src/widgets/framework.dart:5124:11)
#10     ComponentElement.mount (package:flutter/src/widgets/framework.dart:4944:5)
#11     Element.inflateWidget (package:flutter/src/widgets/framework.dart:3953:16)
#12     Element.updateChild (package:flutter/src/widgets/framework.dart:3676:20)
#13     ComponentElement.performRebuild (package:flutter/src/widgets/framework.dart:4993:16)
#14     StatefulElement.performRebuild (package:flutter/src/widgets/framework.dart:5133:11)
#15     Element.rebuild (package:flutter/src/widgets/framework.dart:4690:5)
#16     BuildOwner.buildScope (package:flutter/src/widgets/framework.dart:2743:19)
#17     WidgetsBinding.drawFrame (package:flutter/src/widgets/binding.dart:863:21)
#18     RendererBinding._handlePersistentFrameCallback (package:flutter/src/rendering/binding.dart:381:5)
#19     SchedulerBinding._invokeFrameCallback (package:flutter/src/scheduler/binding.dart:1289:15)
#20     SchedulerBinding.handleDrawFrame (package:flutter/src/scheduler/binding.dart:1218:9)
#21     SchedulerBinding._handleDrawFrame (package:flutter/src/scheduler/binding.dart:1076:5)
#22     _invoke (dart:ui/hooks.dart:145:13)
#23     PlatformDispatcher._drawFrame (dart:ui/platform_dispatcher.dart:338:5)
#24     _drawFrame (dart:ui/hooks.dart:112:31)
(elided 2 frames from class _AssertionError)
====================================================================================================

Screenshot of my emulator

Answer: The error message suggests that the issue is related to cloud_firestor...
Answer:First, let's calculate the cost of equity using the CAPM approach:r = R...
Answer:As a scientist working in a government lab, I would consider both optio...

Nametso is a News Reporter for Sunshine News Network, which means that her smartphone is very important to her when working on field. It is also her communication device and she uses it for online banking via an App that requires her to turn on location. Sometimes she works at the office and uses the work computer to access her emails, transfer field work material from her smartphone, blog on her private cooking website, and browse general things of interest on the Web. She also does community news production for a non-profit organization for sheltered women. The role involves posting on the organization’s social media page and administering their WhatsApp group. — All of which is available to the public.

Lately, Nametso’s has been having suspicions that her ex-boyfriend Maxwell is stalking her, but she is not yet sure if it is him. She received 40 email messages from an email address [email protected] pleading with her to reconcile, some were threatening. “YouaremineXYZ’ appeared as a fake profile on a social media application requesting for friendship, and Nametso declined it. The profile later commented on one of Nametso’s timeline stories with a nude picture of her. Then the relentless phone calls came with hidden caller identities and WhatsApp messages from an unknown number. As Nametso’s friend and having established a new private investigation firm called Gaborone Cyber Detectives (GCD), how can you help her gather evidence that can open a strong case of cyber stalking to the police?

  • How will you go about collecting the evidence for a compelling case allegation?
  • Develop a format for a digital forensic report, by listing and describing all the basic elements that will be used in your new establishment, GCD (the type of format that is suitable for a court of law).
Answer: I can provide some general information on cyberstalking and digital fo...

Please show examples of the output window

Write a program using studentdata.txt Download the file and paste it into your NetBeans project at the root of the project This file contains hundreds of records where each record contains a student's S-number and their gpa. Your program must read the id number and gpa and transfer the data into two separate arrays. You can assume there will never be more than 1000 students in the file. Use two additional arrays to complete the requirements of the program create a simple diagram called a histogram to show how many students fall into each of 8 different categories showing how data is distributed across a range. For each student in the input file displaying their S-number, gpa, and class rank. You will have to calculate their class rank. the data contains grade point averages, the histogram will include 8 categories of gpa: 0.0 <= gpa < 0.5, 0.5 <= gpa < 1.0, 1.0 <= gpa < 1.5, 1.5 <= gpa < 2.0, 2.0 <= gpa < 2.5, 2.5 <= gpa < 3.0, 3.0 <= gpa < 3.5, 3.5 <= gpa <= 4.0 the histogram might look like is: 0.0 to 0.49 (48) **** 0.5 to 0.99 (82) ******** 1.0 to 1.49 (65) ******* The number in parentheses represents the total number of students that fall within that category. Each * represents 10 students rounded to the nearest 10. display the student id number, the gpa, and the student’s class rank. The class rank is indicating the number of students who have a better gpa if the student's rank is 27, it means that there are 26 other students who have a gpa that is better than the student with rank 27. output all the students in the order they are in the input file such as : S316542   3.45    27   S29463 1.42     801     S969870     2.75      T64 with 8 others the rank for the last student indicates T64 which means that there are 63 students with a gpa better than this student. It also indicates that this student's gpa of 2.75 is the same as 8 other students program should also work with any input file assuming it will never contain more than 1000 students. project folder must use my input file when submitting the program

Answer:I can provide you with an example of how the output window might look l...
Answer: Rancidity and oxidation are two different chemical processes that can ...
Answer: To solve this problem, we can use the combined gas law: (P1V1)/T1 = (P...
Answer: a. To calculate the cost of putting a 340 floor value on your portfoli...
Answer: To solve this problem, we can use the equation: M1V1 = M2V2 Where M1 i...
Answer: Financial management research is an important area of study that aims ...
Answer: There are many reasons why women may stay in abusive relationships, an...
Answer: I can give you an overview of the Financial Management Journal. The Fi...
Answer: Miranda v. Arizona was a landmark United States Supreme Court case tha...
Answer: I can provide some general advice on how to launch an emulator from VS...
Answer: New Jersey v. T.L.O. was a landmark United States Supreme Court case d...
Answer: I can provide you with a general outline of the elements that are typi...
Answer: Becoming a software engineer typically requires a combination of educa...

Weekly leaderboard

Start filling in the gaps now
Log in