Class of Theoretical Computer Science…… 2 questions for Turing Machine. Deadline on Sunday… 1 answer below »

Class of Theoretical Computer Science…… 2 questions for Turing Machine. Deadline on Sunday 10/6 at 6 PM

Attachments:

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Sweet Sugar Company manufactures three products (white sugar, brown sugar, and powdered sugar) in…

  1. Activity-Based Product Costing

    Sweet Sugar Company manufactures three products (white sugar, brown sugar, and powdered sugar) in a continuous production process. Senior management has asked the controller to conduct an activity-based costing study. The controller identified the amount of factory overhead required by the critical activities of the organization as follows:

    Activity Budgeted Activity Cost
    Production $500,000
    Setup 144,000
    Inspection 44,000
    Shipping 115,000
    Customer Service 84,000
    Total $887,000

    The activity bases identified for each activity are as follows:

    Activity Activity Base
    Production Machine hours
    Setup Number of setups
    Inspection Number of inspections
    Shipping Number of customer orders
    Customer Service Number of customer service requests

    The activity-base usage quantities and units produced for the three products were determined from corporate records and are as follows:

    Machine Hours Number of Setups Number of Inspections Number of Customer Orders Customer Service Requests Units
    White sugar 5,000 85 220 1,150 60 10,000
    Brown sugar 2,500 170 330 2,600 350 5,000
    Powdered sugar 2,500 195 550 2,000 190 5,000
    Total 10,000 450 1,100 5,750 600 20,000

    Each product requires 0.5 machine hour per unit.

    Required:

    If required, round all per unit amounts to the nearest cent.

    1. Determine the activity rate for each activity.

    Production $ per machine hour
    Setup $ per setup
    Inspection $ per inspection
    Shipping $ per cust. ord.
    Customer service $ per customer service request

    2. Determine the total and per-unit activity cost for all three products.

    Total Activity Cost Activity Cost Per Unit
    White sugar $ $
    Brown sugar
    Powdered sugar

    3. Why aren’t the activity unit costs equal across all three products since they require the same machine time per unit?

    The unit costs are different because the products consume many activities in ratios different from the _____ sales mix or volume.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

The BWK will exist to assist building arrivals to the correct part of the building. It needs to…

The BWK will exist to assist building arrivals to the correct part of the building. It needs to

accept that it will be presented with a limited amount of information to do so and ultimately

handle each situation correctly.

In its most basic form, the BWK should provide a map of the building.

Further:

– BWK will allow for entry of a Room and give directions to that room.

– BWK will allow entry of details studentid / name / mobile / college for example and

provide directions to a person’s phone.

– BWK will allow studentid / name / mobile / college and contact the person who they

have a meeting booked.

It needs to take into account:

? Privacy

? Security

? Appointments

? Building Layout with regard to Lifts, Colleges, People and Rooms

? Be configurable

? Be multi-lingual

? Usability

Attachments:

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

An insulated rigid tank is divided into two equal parts by a partition. Initially, one part contains…

An insulated rigid tank is divided into two equal parts by a partition. Initially, one part contains 3 kg of argon gas at 300 kPa and 70°C, and the other side is evacuated. The partition is now removed, and the gas fills the entire tank. Assuming the surroundings to be at 25°C, determine the exergy destroyed during this process.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Need to respond to two student discussions with at least 150 words minimum for each response. Below.

Need to respond to two student discussions with at least 150 words minimum for each response. Below in the bold are the questions the students are responding to.

For this assignment, create a new message and address the following items in your response.

  1. Identify two specific ways in which security for enterprise computing is different from personal computing.
  2. Describe two techniques to help reduce the insider threat.
  3. Explain the difference between passive and active attacks on a network. Give an example of each

Student one:

Good Evening Class, we are now in the home stretch! Best of luck to everyone here.

Personal computing and enterprise computing are very simply the difference between a computer owned by you the end user and a computer used to perform a function on a higher level for a corporation. Protecting a personal computer is usually as simple as safe browsing and up to date anti-virus. Enterprise involves much more, firewalls, penetration testing, training, software standards and policies. Each of these functions of security serves a different purpose within a corporation.

The topic of an insider threat is such a hot button issue within corporations. This term covers many different aspects of threats to a company but the underlying connective concept is that a person within an organization uses that access to cause damage to an organization or its people. Many companies are employing specialists to limit the exposure and investigate the persons that may intend to cause harm. The US Army has employed 7 processes to limit the exposure to an insider threat.

– Screen the Army

– Clear the Army

– Protect the Networks

– Secure Installations

– Share Information

– Establish/Operate the Hub

– Train, Report and Respond

(Caleb, 2016)

The most important aspects of this list is to notice a pattern. That is to secure what is valuable to the infrastructure, limit the damage done by training the employees (in this case soldiers) on what to notice for someone who is an insider threat in the making.

Due to this being such a new form of threat to organizations the criteria in which to evaluate and categorize possible threats is still evolving. Within my current occupation we are establishing an insider threat program and rely heavily on big data management and looking at patterns that exist within case studies for the various threats, theft, data piracy and hostile acts are some of the most common form of insider threat.

Finally the difference between active and passive threats on a network. A passive attack is something that is intended to not be noticed immediately and tends to hide in the background, this is similar to phishing attacks and Man in the Middle. An active attack is something that is unleashed to cause damage and interrupt the networks day to day activity and may not be intended to remain quiet and unnoticed.

Dan

Caleb. (2016, August 17). Reducing Insider Threat. Retrieved from 

Smith, R. E. (2016). Elemantary Information Security. Subury: Jones& Bartlett Learning.

Student two:

Enterprise computing, in contrast to personal computing, relies on more than just one person caring about cyber security. In order to have an effective computer security posture, all employees must be on board with making sure that their online practices are safe. In personal computing as well as enterprise computing, a single user can exercise great care while using the internet, however, “if an employee must choose between computer security and meeting a deadline for the company president, computer security isn’t going to win” (Smith, 2016). Another way that personal and enterprise computing differ is the amount and type of threats. An enterprise computing network is more likely to be attacked than an individual because companies have more information that hackers might want.

Reducing an insider threat is simply a matter of making some tasks only doable by multiple people. When a person is able to complete a task alone, they are much more likely to be an insider threat than when they are required to work with others. Monitoring personnel is another solution to insider threats. If an employer regularly checks on an employee or has a system where they can monitor work that is getting done, the employee is far less likely to do anything wrong.

A passive attack is when information is viewed and data is collected. If an attacker were to hack into a bank manager’s email and read how much money a person just transferred would be an example of a passive attack. An active attack is when someone prompts the user to do something by sending them information. If the person who looked into the bank manager’s email sent an email that asked for information on previous transactions, that would be an example of an active attack.

References

Smith, R. E. Elementary Information Security. [VitalSource]. Retrieved from 

-Austin

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

What types of landform are composed largely of biological sediments?

What types of landform are composed largely of biological sediments?
 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Suppose there is a permanent fall in private aggregate demand Suppose there is a permanent fall in..

Suppose there is a permanent fall in private aggregate demand

Suppose there is a permanent fall in private aggregate demand for a country’s output (a downward shift of the entire aggregate demand schedule). What is the effect on output? What government policy response would you recommend?

Suppose there is a permanent fall in private aggregate demand

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

In Of Mice and Men , what is the significance of the rabbits and the dream of a farm that George and

In Of Mice and Men, what is the significance of the rabbits and the dream of a farm that George and Lennie repeat?

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Paper instructions: discuss various goals and the means by which government regulates the environmen

Paper instructions:
discuss various goals and the means by which government regulates the environment.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"