Use questions to answer the article

Please read the article closely, answer the following questions:

1. What is the motivation for the study – what is the broad problem in the field that the study helps to address?

2. What is the specific hypothesis being tested?

3. What is the experimental approach to testing the hypothesis?  What was measured?

4. What were the important quantitative results?

5. Explain whether the results support or contradict the hypothesis.

6. What do the results mean in terms of the broader issues that motivated the study?

Crypto Systems and Data Protection PMA (First Sit)

1 ContextYou are a system architect in a large cyber security consultancy. You have been asked to propose a solution to meet the requirements of a new client. The client is a UK University. The client uses an ID card-based authentication system to enable access to campus services such as those described in Section 2.2. The client is exploring the feasibility of replacing the card-based system with a phone app-based system.2 RequirementsYou are required to produce: a Cryptool based cryptosystem simulation of a proposed campus identity management system (CIMS); an accompanying report; and a video which outlines and describes the CIMS.2.1 COTSThe CIMS will comprise a combination of commercial off the shelf systems which will provide the functionality described in Section 2.2. Examples of these systems include, but are not limited to authentication/OTP systems including: Yoti, SecureAuth, Google Authenticator, Microsoft Authenticator; payment systems including: Apple Pay, Alipay, Blackboard Transact, WeChat Pay, Walmart Pay, Google Pay, Samsung Pay; physical access control systems including: FingerTec QR, AptiQmobile, HID Global, Tapkey, Stanley Onedoor, Onecard Mobile, Kisi and SSO/access gateway systems such as Okta verifyDesign your CIMS using one or a combination of these and/or other products. For example, you might choose to use Google authenticator as the authentication system and Google Pay as the payment system. You might find a COTS that performs all the desired functions.2.2 System FunctionalityThe CIMS must incorporate the following functionality. Users must be able to:a. Borrow library books.b. Submit and pay for document prints, and pay for other items on campus.c. Access buildings/physical services using an underlying technology such as Bluetooth Smart , with a minimum security level of 1. Buildings/services include but are not limited to: the sports centre, accommodation, and campus buildings.d. The University provides several web services including: VLE access, accommodation web site, email, file storage, library, and the sports centre. These services must be accessed through a single sign-in system.e. Access to information systems must take place from a recognised host. When a user logs in from a different host, the system will generate a one-time passcode which the user must present within a defined time. When successfully presented, the system will implement the sign on process.3 Deliverables3.1 Cryptosystem (50%)Simulate a provably functional cryptosystem using one Cryptool configuration for each of the requirements stated in Section 2.2. Each Cryptool configuration file must have an appropriate filename.You are producing simulations. Your simulations may:

Utilise the Achterbahn algorithm (or another algorithm) to demonstrate both symmetric and asymmetric encryption
Pseudo implement an X.509 certificate.
Make further assumptions which must be clearly stated.Realistic implementations will attract more credit.3.2 Report (40%)Your report should contain:a. Introduction. A very brief introduction outlining the scope of the report.b. Technical Description.a. Provide a brief description of each COTS used. How does the COTS work from a cryptosystem perspective?b. By referring to the cryptosystem simulations, present a detailed technical description of the protocols and data exchanges between elements such as the user, browser, servers, databases.Provide a critical overview of how these systems will work together in your design to achieve the desired system functionality described in Section 2.2.c. Reflection. Provide a critique of the merits/demerits of the implementation. What are the assumptions made? Is there a more secure method of implementing any of the elements?3.3 Video (10%)A 10-minute video demonstrating the solution functionality. Your voice must be heard in this video and must evidence that you are the owner and narrator of this video. The video will walk through your cryptosystem simulation carefully explaining each element.

Sample Solution
The post Crypto Systems and Data Protection PMA (First Sit) appeared first on nursing writers.

Environmental Systems: Climate and Vegetation Spring

GES 1000: Environmental Systems: Climate and Vegetation Spring semester 2021
Lab #9: Biomes
1.) What biome is Colorado Springs situated in?
2.) What is the dominant climate associated with each of the following biomes?
Biome Climate
Tropical rain forest
Tropical deciduous forest
Tropical savanna
Desert
Sclerophyllous woodland
Temperate rain forest
Boreal forest
Tundra
3.) What accounts for the major biomes in the United States? Refer to the map in Figure
11-22 on pages 322-323 of the textbook.
4.) The temperate grassland biome in North America stretches from the United StatesMexican border in Texas to central Saskatchewan. What explains the eastern boundary
of the temperate grassland? In other words, what prevents the biome from occurring
further east?
Page 2
5.) South-central California is in the sclerophyllous woodland biome. A similar type of
vegetation exists around the Mediterranean Sea. What is an explanation for seeing the
same biomes in two widely separated continents?
6.) The diagram below shows the biomass distribution of vegetation in five biomes.
Which of the two biomes listed have the greatest biomass percentages below ground?
7.) On page 3 is a table with typical summer temperatures as you go up in the
atmosphere and as you go underneath the ground surface in an Arizona desert biome. At
which points are both the highest and lowest temperatures recorded?
Page 3
Altitude in centimeters Temp. (°C) at sunrise Temp. (°C) at mid-afternoon
200 13.5 43.0
150 12.5 43.0
100 12.0 44.0
50 11.5 46.0
5 11.0 49.0
0 11.0 73.0
-3 23.0 51.0
-5 24.0 42.0
-20 32.0 30.0
-50 28.0 28.0
-100 28.0 28.0
-150 28.0 28.0
-200 27.0 27.0
8.) In mid-afternoon why is the surface temperature so much higher than the temperature
at a height of 200 cm?
9.) Besides moisture deficits, what other environmental factors must desert plants and
animals adapt to?
10.) Why are desert plants often widely spaced?
11.) As one moves from east to west across the North American grasslands what happens
to the height of the grasses? Why
Page 4
12.) Why can grass withstand fire?
13.) The diagram below is a representation of the solar radiation striking the forest floor
of a temperate deciduous forest in southern Illinois. At what time of the year is solar
radiation striking the forest floor the greatest?
14.) Why are there two main “peaks” of solar radiation at the forest floor in the figure
from question 13?
15.) An important feature of the tundra biome is a subsurface of permanently frozen
ground, called permafrost. The layer of soil above the permafrost (the active layer) is
frozen during the winter but thaws during the summer season. What determines how
deep the active layer can become?
Page 5
Net primary production (NPP) is the amount of new living plant tissue gained by
growth, less the amount lost through death or relocation, per unit area, per unit interval of
time. NPP is often measured as the total weight of new material in all living things,
called plant biomass, produced annually within a square meter area over the course of a
year (g m-2
yr-1
). NPP is an important index of how well vegetation lives within the
ecological community of a place.
Plant growth is sensitive to two climatic variables, temperature and precipitation,
both of which affect evapotranspiration. Potential evapotranspiration (PE) is the moisture
that could be yielded to the atmosphere if the water supply was limitless, and is solely a
function of temperature. Actual evapotranspiration (AE) represents the amount of
moisture actually yielded to the atmosphere, and is limited by both temperature and
moisture availability. If conditions are both hot and wet, AE will be high. If conditions
are either cold or dry, AE will be low. Since AE exerts a genuine control over plant
growth, AE may be used to estimate NPP as shown in the graph below:
The equation for the line in the graph below is NPP = (2.29AE) – 366.8, and this
equation can be used to estimate the NPP of a place as long as you have the value for AE.
This equation was developed based on direct measurement of AE and NPP in a swamp in
Florida.
16.) Some tropical rainforests have an annual AE of 1900 mm. What would be their
estimated NPP?
17.) Some deserts have an annual AE of only 80 mm. What would be their estimated
NPP?
Page 6
18.) Some polar areas have an annual AE of only 150 mm. What would be their
estimated NPP?
19.) Please complete the NPP column for the table below.
Site Location Annual AE
(mm)
Annual NPP
(g m-2
yr-1
)
Green Bay,
Wisconsin
45ºN, 88ºW 504
Dryden, Ontario 50ºN, 93ºW 424
New Orleans,
Louisiana
30ºN, 90ºW 1008
Lamar, Colorado 38ºN, 103ºW 374
Painted Desert,
Arizona
36ºN, 112ºW 240
20.) The AE:NPP relationship in the graph on page 5 and in the equation derives from
direct measurements. Negative NPP values mean that a net loss of vegetation should
normally occur every year. If so, no vegetation should exist at all after only a few years,
yet there is vegetation in most deserts and polar areas. How do you explain the apparent
misprediction? (Hint: Where was the source of the data from the graph on page 5?)

Sample Solution

The post Environmental Systems: Climate and Vegetation Spring appeared first on nursing writers.

The post Environmental Systems: Climate and Vegetation Spring appeared first on nursing writers.

agency budget paper 4

Resources: Internet, Government and State websites

Conduct research budgets for three different public sector agencies.

Write a 210 word compare and contrast paper that includes the following:

  • Describe and give brief overview of the agency such as the size of community, size of agency, and the agency responsibilities.
  • Describe the type of budget process utilized and process put in place by each agency (City counsel presentations, city manger applications, county board of supervisors)
  • Explain the advantages and disadvantages of the differing budgets
  • Assess the effects of the differing budgets on the employees, citizens, and external stakeholders affected by budgets and related services
  • Summarize your findings and make recommendations about the use of differing budgets

Format your paper consistent with APA guidelines.

 

Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code “Newclient” for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

The post agency budget paper 4 appeared first on Essay Writers.