1 Assume that you are working as IT Security section in a company called Xybocin Corp. You company 6M has 150 employees in three departments which are ENG, BUSS and MAN. The company had no firewall to secure its network and the entire company is in one LAN and connected directly to Internet. However Xybocin Corp has one application proxy for SMTP and another Server that has all the customer financial data of Xybocin Corp. The Server is managed by MAN department.
You have to create a proposal to submit in front of Xybocin Corp management for purchasing four hew firewalls with 18000 OMR. In the proposal you have to design/draw the new network architecture for the company for improving security with firewalls. Mention the advantages of each design components and its importance in improving security of the company. Also, if possible in your design give higher level of security to MAN department and highest level of security to the server with available firewalls.
2 Mention why users are considered as weakest link in computer security with a relevant example, How you can solve this problem?
3 Mention the importance of auditability in evaluating firewall products. Give an example.
In: Computer Science
I did SPSS analysis on whether females text more than males, now I need to do a report of my findings in APA format. The report is to include an abstract, introduction, method, and results. What is this type of report called or could you include an outline of what is supposed to be included in each section?
In: Statistics and Probability
In JAVA Implement the moveMinToFront method in IntSinglyLinkedList. The moveMinToFront method looks through the list to find the element with the minimum value. It moves that element to the front of the list.
Before abstract view: [7, 3, 2]
After Abstract view: [2,7,3]
Before Abstract view: [4,1,7]
After Abstract view: [1,4,7]
public void moveMinToFront() {
}
Test:
package net.datastructures;
import org.junit.jupiter.api.Test;
import static org.junit.jupiter.api.Assertions.assertEquals;
import static org.junit.jupiter.api.Assertions.assertTrue;
import java.util.Random;
public class IntSinglyLinkedListTest {
@Test
public void moveMinToFrontTestEmpty() {
IntSinglyLinkedList s = new IntSinglyLinkedList();
s.moveMinToFront();
assertTrue(s.isEmpty());
}
@Test
public void moveMinToFrontTest1() {
IntSinglyLinkedList s = new IntSinglyLinkedList();
s.addLast(10);
s.addLast(20);
s.addLast(30);
s.addLast(40);
s.addLast(50);
s.moveMinToFront();
assertEquals(10, (int)s.first());
assertEquals(5, (int)s.size());
assertEquals(50, (int)s.last());
}
@Test
public void moveMinToFrontTest2() {
IntSinglyLinkedList s = new IntSinglyLinkedList();
s.addLast(20);
s.addLast(15);
s.addLast(30);
s.addLast(40);
s.addLast(50);
s.addLast(60);
s.addLast(70);
s.addLast(80);
s.moveMinToFront();
assertEquals(15, (int)s.first());
assertEquals(8, (int)s.size());
assertEquals(80, (int)s.last());
}
@Test
public void moveMinToFrontTest3() {
IntSinglyLinkedList s = new IntSinglyLinkedList();
s.addFirst(10);
s.addFirst(20);
s.addFirst(30);
s.addFirst(40);
s.addFirst(50);
s.moveMinToFront();
assertEquals(10, (int)s.first());
assertEquals(5, (int)s.size());
assertEquals(20, (int)s.last());
}
@Test
public void moveMinToFrontTest4() {
IntSinglyLinkedList s = new IntSinglyLinkedList();
s.addFirst(20);
s.addFirst(15);
s.addFirst(30);
s.addFirst(40);
s.addFirst(50);
s.addFirst(60);
s.addFirst(70);
s.addFirst(80);
s.moveMinToFront();
assertEquals(15, (int)s.first());
assertEquals(8, (int)s.size());
assertEquals(20, (int)s.last());
}
@Test
public void moveMinToFrontTest5() {
IntSinglyLinkedList s = new IntSinglyLinkedList();
Random r = new Random(111);
int min = Integer.MAX_VALUE;
int last = Integer.MAX_VALUE;
final int lengthOfList = 100;
for (int i=0; i<lengthOfList; i++) {
int x = r.nextInt(2000);
min = Math.min(x, min);
s.addLast(x);
last = x;
}
s.moveMinToFront();
assertEquals(min, (int)s.first());
assertEquals(lengthOfList, (int)s.size());
assertEquals(last, (int)s.last());
}
}In: Computer Science
|
Prepare Stoughton's statement of cash flows for the year ended December 31, 2018, using the indirect method. |
|
|
Evaluate the company's cash flows for the year. In your evaluation, mention all three categories of cash flows and give the rationale for your evaluation. |
Evaluate the company's cash flows for the year. In your evaluation, mention all three categories of cash flows and give the rationale for your evaluation. |
Revenues:
Service revenue $283,000
Dividend revenue 8,700
$291,700
Expenses:
Cost of goods
sold
103,000
Salary
expense
55,000
Depreciation
expense
34,000
Advertising
expense
4,300
Interest
expense
2,100
Income tax
expense
10,000
208,400
Net income
$83,300
a. Acquisition of plant assets was $ 156,000. Of this amount, $ 105,000 was paid in cash and $ 51,000 was financed by signing a note payable.
b. Proceeds from the sale of land totaled $ 23,000.
c. Proceeds from the issuance of common stock totaled $ 35, 000.
d. Payment of a long-term note payable was $ 17,000.
e. Payment of dividends was $ 13, 000.
f. From the balance sheets:
|
Current Assets |
2018 |
2017 |
|
Cash |
80,000 |
52,000 |
|
Account Receivable |
38,000 |
55,000 |
|
Inventory |
50,000 |
69,000 |
|
Prepaid Expenses |
9,400 |
8,100 |
|
Current Liabilities |
||
|
Accounts Payable |
36,000 |
18,0001 |
|
Accrued Liabilities |
14,000 |
79,000 |
Cash flows from financing activities
Cash receipt from issuance of common stock
Payment of Note payable
Payment of Dividends
Net cash Provided by (ued for) financing activities
Net increase (decrease) in cash
Cash balance at December 31 2013
Cash Balance at December 31 2014
Noncash investing and financing activities:
Acquisition of plant assets by issuing a note payable
In: Accounting
A. Give 3 categories of Long-term Investments (please mention examples for each category) B. What is the difference between Tangible Assets and Intangible Assets? Give examples please.
In: Accounting
1) If you do an investment audit, specify the accounts/accounting records, and what documents are examined in relation to the audit.
2) Mention the activities/transactions that are most at risk in the investment audit.
In: Accounting
In: Accounting
COVID-19 pandemic brings great effect to the worldwide economy. Mention and explain 4 microeconomics and 4 macroeconomics consequences of the economic phenomenon that happens amid COVID-19 pandemic!
In: Economics
How can one do plant breeding for developing resistance to insect pests? Give a few examples to insect resistance characteristics. Also mention the source of pest resistance genes.
In: Biology
Discuss financial ratios for the purpose of financial analysis:
•mention uses and limitations
•choose three ratios from different categories (such as liquidity, asset management, debt management, profitability, etc.)
In: Finance