Home Work Security

In: Computers and Technology

Submitted By charliehill
Words 562
Pages 3
Charlie Hill
GE253_V6.0:Physics>Week 1>Assignment>Assignment

The scientific method is a process to systematically investigate observations, solve problems and test hypotheses.
1. The first step to scientific method is to state the problem. It is important to clearly state what your problem is to avoid any confusion later in the scientific method.
2. The second step to scientific method is making observations about the problem. The scientific method consists of a series of steps used by scientists to conduct experiments. The word observation has two meanings in scientific method, first there the scientists observation of the world as it leads to the hypothetical theory (a theory that lacks merit) This is the first step of scientific method and can be presented in two ways either as a natural observation or a staged one, Second in the collection of data in a experiment using the scientific method there are two observations ,Qualitive and Quantive.
The third step to scientific method is the hypothesis (a proposed explanation for a phenomenon) for a hypothesis to be scientific hypothesis; the scientific method requires that one can test it.
4. The fourth step to scientific method is the experiment to test an hypothesis. The experiment must be unbiased in nature meaning that scientists cannot create an experiment that will favor the outcome that they predicted in their hypothesis
5. The fifth and final step in scientific method is to draw a conclusion. Scientists draw conclusions by examining the data from an experiment and there are two outcomes. Either the experiment supported the hypothesis and can be regarded as true, or the experiment disproved the hypothesis as false.

The difference between science and technology are that where science is a systematically knowledge base where a series of steps is followed in order to reliably predict the type of…...

Similar Documents

Home Work

...Associate Level Material Appendix B Security Assessment Directions: Choose one of the Facts for Consideration sections from Ch. 3 of the text and list the page number for the section you chose. Then, complete the following table. List five threats appropriate to the environment from the section you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures. Once you complete the table, write a brief explanation of the countermeasures for the two threats with the highest risk total, stating how the countermeasure reduces the risk associated with that threat. This assessment is based on the Facts for Consideration on page _93___ | | | | |THREAT |RISK |COUNTERMEASURE | | |Probability |Criticality |Total | | |Example: | | | | | |Physical assault |9 |4 |13 |Highly visible officer presence | |Possible Escape |9 |5 |13 |An extra guard can limit......

Words: 439 - Pages: 2

Home Work

...changing their host name. The Router interfaces should be assigned the first usable IP address in each /24 network. The PCs can be assigned any IP address in the respective /24 range (PC1 should be assigned from the same network as FA0/1 and PC2 should be assigned an IP from the same network as FA0/0. Fill in the below diagram (2 points). Key configuration steps • Change the hostnames • The Router interfaces will need to be brought up and configured with their IP address • The PCs will need to have their IP address, mask and default gateway assigned. The default gateway is the address of the router interface in the same network. 3. Test your network to make sure everything works. Have an instructor sign off once the connectivity is working. (3 points) ____ Can ping from Router to PC1 ____ Can ping from Router to PC2 ____ Can ping from PC1 to FA 0/1 ____ Can ping from PC1 to FA 0/0 ____ Can ping from PC1 toPC2 ____ Can ping from PC2 to FA 0/0 ____ Can ping from PC2 to FA 0/1 ____ Can ping from PC2 to PC1 ________ Signoff 4.Write down the output of the show ip route command. Specifically, write down the subnet, CIDR mask and interface of the C (connected routes): (4 points) [pic] ----------------------- FA0/1 _______________________ /24 Pittsburgh FA0/0 _______________________......

Words: 400 - Pages: 2

Home Work

...DOCUMENTS ESTABLISHING CONFORMITY OF THE GOODS WITH THE BIDDING DOCUMENTS To establish the conformity of goods documentary evidence in shape of brochures, literature, drawings & date etc., to be provided by the bidder. Standard, Quality, Brands etc., to be specified PERIOD OF VALIDITY The bid shall remain valid for the period specified in the bid document, otherwise it shall be rejected. The bid validity period could be extended on written request of the purchaser. In case of refusal by the supplier, the bid security could not be forfeited. FORMAT & SIGNING OF BID Original technical / financial proposal be provided. No cutting & over writings, if made to be signed in full by the bidder. Each page of the bid to be signed by the bidder. Arithmetic SCOPE OF BIDS: Name, identification, specification of goods. CORRUPT PRACTICES: Behaviour on the part of officials in the public / private sector by which they improperly and unlawfully enrich themselves or induce other to do so. MISUSE OF A POSITION: Offering, giving and receiving anything of value to influence the action of any official in procurement process. FRAUDULENT PRACTICE: Misrepresentation of facts in order to influence a procurement process or execution of contract to the detriment of the client. Collusive practice among bidders (prior or after bid submission) ELIGIBLE BIDDER: A natural person, private entity,......

Words: 563 - Pages: 3

Home Work 7

...HOME WORK 7 3. Name two different types of encryption supported by GPG for your key. 4. What happens when you sign and trust a new key to your keychain? 5. If a user sends you his/her public key, will he/she be able to decrypt your encrypted messages once you import and sign his/her key? 6.What are the similarities between an MD5 hash and a fingerprint? 7. How would you encrypt a Web server and the pages it serves up? 8. Why is hashing all database inputs not considered encryption of the database? What value does hashing database entries provide? 9. Where would you remove a user’s certifi cate from being able to access systems on your network? 10. Which connection type is secure and which is cleartext between SSH, Telnet, and FTP? 1 2-What was the allocated source IP host address for the TargetWindows01 server, TargetUbuntu01 server, and the IP default gateway router? 3-Did the targeted IP hosts respond to the ICMP echo-request packet with an ICMP echo-reply packet when you initiated the “ping” command at your DOS prompt? If yes, how many ICMP echo-request packets were sent back to the IP source? 4-If you ping the TargetWindows01 server and the UbuntuTarget01 server, which fields in the ICMP echo-request/echo-replies vary? 5. What is the command line syntax for running an “Intense Scan” with Zenmap on a target subnet of 6. Name at least fi ve different scans that may be performed from the Zenmap GUI. Document under what......

Words: 788 - Pages: 4

Home Work

...LOVELY PROFESSIONAL UNIVERSITY Form/LPUO/AP-3 (The format to be used for Planning the academic activities other than Lecturers/Tutorial/Practical like Assignments, Case study, Presentation, Quiz, Projects, Class tests, industrial visits, teaching practice, court visits etc. to be undertaken as a part of the continuous assessment for the Course) Home-Work1 School : LSB Department of Management Name of the faculty member : Neha Shandilya Course No. ECO515 Course Title: Managerial Economics Class: MBA Semester I Section: R1001 Batch 2010-12 Max. Marks: 15 Date of Allotment:18/8/10 Date of Submission: 01/09/10 S. no. Roll No. Topic No. Objectives of Aca demic Activity Topic Evaluation Details Each student will attempt all the questions. To make the students understood of basic managerial economic concepts and how these concepts are applied in economic decision making in present day economy Each student will attempt all the questions given in the assignment i.e. 15 questions for each student. A test will be conduct after submission of assignment. THERE IS NO MARKS FOR SUBMISSION. But only those students will be allowed to sit in test those who have submitted their assignments. 3 questions will asked in test and evaluations will be done out of 15......

Words: 1019 - Pages: 5

Home Work

...whole area. Sample means a sample of people taken out of the population to be tested or studied. 1.13 What is the difference between a statistic and parameter? The difference between parameter and a statistic is that a parameter is a number obtained by calculation from a population while statistic is a number calculated from a sample. A statistic is usually used to estimate a parameter. 1.22 A Gallup poll indicated that 74% of Americans who had yet to retire look to retirement accounts as major funding sources when they retire. Interestingly, 40% also said that they looked to stocks or stock market mutual fund investments as major funding sources when they retire. (data extracted from D.Jacobs, “Investors Look Beyond Social Security to Fund Retirement,” www.gallup.com, March 28, 2011). The results are based on telephone interviews conducted March 24, 2011, with 1,000 or more adults living in the United States, aged 18 and older. a. Describe the population of interest. They are the Americans that have not retire yet. b. Describe the sample that was collected. They are the 18 and older group of adults. c. Is 74% a parameter or a statistic? Explain. It is a parameter. It measuring the characteristic of the population. d. Is 40% a parameter or a statistic? It is a statistic. It is measuring the characteristic of a sample. 1.23 The Data and Story Library (DASL) is an online library of data files and......

Words: 1086 - Pages: 5

Home Work

...behaviors, short-term focus, individual activity, concern for quantity, primary concern for results. * Differentiation Strategy * Unique products: design image, technology, etc * Build brand loyalty, price premium, invest in R&D * Iams company, Saks Fifth Avenue * Employee roles: creative behavior, long-term focus, cooperative and interdependent behavior, risk taking, openness to novel work. Question 8 List and explain the differences between discretionary and legally required (mandated) benefits. Why do companies need to provide both to employees? Ha Question 9 List and describe the seven types of monetary compensation. MA UNIT 2 Apr 13 Question 1 Son, MA Choose one Executive Order from Chapter 2, and create a realistic scenario that explains the protections it provides. Make sure you include specifically who is covered by the order and what action is prohibited. Son   Question 2 Son, Ha You are the Total Rewards Director for your organization. Over the past few years employees have been leaving to work for competitors. The CEO has expressed that she wants to conduct an organization wide review of the company’s current compensation strategy. The company now uses a seniority pay rewards system. The CEO wants to know if they should change to a merit pay strategy in order to make the company more competitive.  Prepare a memo to the CEO outlining your recommendation as to whether or not the company should continue to......

Words: 1715 - Pages: 7

Home Security

...Home Security Vulnerabilities DeVry Online, SEC310 Professor Kathryn Fenner The neighborhood I have lived in for the past three years is southwest of Chicago. The main benefit of living forty-five minutes from the city is the peace and quiet. It is an old farm town with newly built homes. The population of Lockport houses approximately twenty-five thousand residents. The town is very quiet, with two lane access roads throughout much of the city. The traffic is minimal, the stars are visible at night and the sound of horses and roosters in the morning are what make residents feel a sense of security. When walking through the neighborhood, it is not out of the ordinary to see garage doors left open or front doors open with the screen door closed to let some air in the house. As a result of a small town feel, people tend to feel their town is totally safe. They forget to assess home security vulnerabilities because there seems to be no imminent threat. Burglars make the most of on this by studying their subjects, the neighborhood they live in, and the routine of their victims. In order to properly assess vulnerabilities, we must think like a criminal and analyze what areas around our home can be used as an advantage for entry; including a neighborhood assessment, alarms, lighting, doors, windows, locks, windows, and cameras. My neighborhood would be considered an upper-middle class area with a good blend of older homes and new subdivisions. The areas surrounding my......

Words: 1342 - Pages: 6

Home Work

...the company. This process alone eliminates timesheets done manually and record electrically which can be viewed systemically and avoids human error. This example of implement a system that can record, view, and process people work hours with discrepancy. With that said Step 2 evolves the standard set and now measures the performance. Managers can view the performance and data of this new "ID scanning" by the system is clocks in by. This system needs to be provide managers a report on a timely basis to measure whether is records the time served or does it have any issue occurred in the process of scanning or "clocking in". Usually in most cases new ideas are brought up in this step to enhance this process. Now comes Step 3 which is comparing performance with the standard. This step Dalman and Lei have their weekly results from their new system they implemented and compare it with the goals they set. They can see the good and bad results that came out of the system. Also participants can identify successful actions to recommend in the future and avoid the mistakes next time around. For example, let's say a employee had another employee clock in for each other and they didn't go to the desk in work. The only way they can prove that it was indeed another employee clocking in would be a camera of some sort. The best place that a camera would be where the employees clock in. This is one of many examples that Dalman and Lei can...

Words: 787 - Pages: 4

Home Security Vulnerabilities

...Home Security Vulnerabilities Principles & Theory of Security Management Professor James Leiman DeVry University On-Line Antoinette Bowen 19 January 2014 Home Security Vulnerability With criminals being smart enough wait and watch even pay real close attention to their victims daily habits; “at every 15 seconds, a home in the United States is broken into, said Angela Mickalide, director of education and outreach for the National Home Safety Council.” (Herbet, 2014) It would seem that it’s hopeless for people to stay safe. That in order for people to feel safe they need to purchase state of the art equipment to secure their property. For those who maybe considering the option to purchase a security system but really don’t have the funds for the monthly services should realize that there are several other methods of prevention. When observing our own environment it will appear to be safe, but how safe are we? Since people consider a very familiar area their comfort zone is when we tend to overlook the possibilities of being watched-to become a delinquent’s next victim. Let us look into our own backyards to assess the safety of our own homes. Being in a home that had been constructed in the 1920’s would seem fairly unsafe and susceptible to break-ins even becoming an easy target for offenders. Easy to kick doors in, break through windows, and bust locks due to a decaying foundation. Even as the dynamic of the changing neighborhood goes from home owners to being...

Words: 1106 - Pages: 5

Home Work

...Difficulty: 2 Medium award: 1.00 point Target date immunization would primarily be of interest to _________. banks mutual funds → pension funds individual investors Learning Objective: 11-04 Formulate fixed-income immunization strategies for various investment horizons. Multiple Choice Difficulty: 1 Easy 7 of 13 11/29/2014 1:56 PM Assignment Print View http://ezto.mheducation.com/hm_finance.tpx award: 1.00 point A bank has an average duration of its liabilities equal to 2 years. The bank's average duration of its assets is 3.5 years. The bank's market value of equity is at risk if _______________________. interest rates fall credit spreads fall → interest rates rise the price of all fixed-income securities rises Learning Objective: 11-04 Formulate fixed-income immunization strategies for various investment horizons. Multiple Choice Difficulty: 2 Medium award: 1.00 point All other things equal, a bond's duration is _________. higher when the coupon rate is higher → lower when the coupon rate is higher the same when the coupon rate is higher indeterminable when the coupon rate is high Learning Objective: 11-02 Compute the duration of bonds; and use duration to measure interest rate sensitivity. Multiple Choice Difficulty: 1 Easy award: 1.00 point Rank the interest sensitivity of the following from the most sensitive to an interest rate change to the least sensitive: I. 8% coupon, noncallable 20-year......

Words: 2817 - Pages: 12

Home Work

...given. Charities are not made for people to make money off of it or get a certain cause out. Charities are made for help. They are made to get people and their attention together into one whole and give. The quote, give to get, comes into consideration here. They give not to get back anything but the happiness of those who they helped. These people are not looked down upon; they are respected and looked up to. Although some charities may be a reason to come together for a cause due to something negative that occurred, it makes a strong connection between people. When it is for something positive, there is positive energy from those helping and it also makes people come together and be proud of a great cause that was accomplished. Group work, and dedication is a key to joining in a charity. Those who need help are grateful and thankful for people like the ones who help that actually put differences aside and help them. Becoming a sponsor to a charity makes this bond between the person helping those in need, a bond that is rare, yet very unique. Just the thought of having nothing and being helpless kills some people. As negative as that is, at the same time it is a reason to the positivity that comes from all those helping the cause. At that time they are the only one who care for the people who wish to have a normal, ordinary life. Mostly those who help get a special thank you in return. If someone were to see a child or even an adult in need of help; food, clothes, or......

Words: 1035 - Pages: 5

Home Computer Security

...Home Computer Security -- Glossary Note: This is an historic document. We are no longer maintaining the content, but it may have value for research purposes. Pages linked to from the document may no longer be available.Home Computer Security       Glossary | This section contains definitions of terms used throughout this booklet. Unless otherwise stated, the definitions come from the Webopedia Online Dictionary for Computer and Internet Terms. | ARPAnet | The precursor to the Internet, ARPAnet was a large wide-area network created by the United States Defense Advanced Research Project Agency (ARPA). Established in 1969, ARPAnet served as a testbed for new networkingtechnologies, linking many universities and research centers. The first two nodes that formed the ARPAnet were UCLA and the Stanford Research Institute, followed shortly thereafter by the University of Utah. | attack | An action conducted by an adversary, the attacker, on a potential victim. (From the glossary of State of the Practice of Intrusion Detection Technologies.) | backdoor | Also called a trapdoor. An undocumented way of gaining access to a program, online service or an entire computer system. The backdoor is written by the programmer who creates the code for the program. It is often only known by the programmer. A backdoor is a potential security risk. | backup | Copy of files and programs made to facilitate recovery, if necessary. (From the National Information Systems Security (INFOSEC)......

Words: 3740 - Pages: 15

Benefits of Home Security App

...The home security app is an integrated system that contains four major components. Each component as specific requirement and benefits. They are as follows: Motion sensor • It detects when some one intrudes your home in your absence. • It can be programmed to record events via security camera when motion is detected. • It can helpful in monitoring children and teens in your absence. • It can trigger a doorbell or an alert when some one is approaching your front door or any restricted area. • It can save you from high energy consumption by using motion sensor lights that can automatically turn on/off based on your presence in a room. • It can read changes in energy, detect heat and movement using infrared, microwave radiations and sound waves. • It has a capability to detect false alarms using dual technology motion sensor. • If any of the sensors are tampered automatic notification will be triggered. • It can also be useful in opening garage doors when it is approached by a car. • You can customize all notifications and setup threat levels based on your needs. Smoke detector • Smoke alarm provides a life saving warning to allow you to get out of the house in case of fire or smoke. • It can detect the purity of air and can give you the levels of different gaseous elements. • It can trigger the sprinkling system incase of a fire. • It triggers an alarm when you have lot of smoke coming from cooking in a kitchen. • It can monitor the temperature of...

Words: 446 - Pages: 2

Home Work

... Then there is breeding rabbit for breeding. First u have to find out what kind of rabbits people are raising around you area. Too build a herd for breeding the rabbits must registered, because you are trying to sell top quality litters. Now it is time to name your rabbitry. It is all up to you what you name it. Once you done that you must find a way to attract customers. Go visit local rabbitrys or fares and tell them what you got. Then you ask them if there interested and tell them where they can find you. It also ant a bad idea if you enter your rabbits in the far. Then the will be able to see what you got or you could sell after the show. Now you have the knowledge to start your own rabbitry. If you think all this knowledge I work so hard to type, please crumple op this paper and through it in the trash can!!!...

Words: 541 - Pages: 3