writing an Engineering Standards
answer those 6 questions: 1-Enter the full IEEE-style reference for your first engineering standard. 2-Enter a quote from the standard and end with citation e.g. “”. Make sure you choose a quote that effected your design. 3-Explain how the quoted section of this standard effects your design decisions, constrains, and helps your design. 4-Enter the full IEEE-style reference for your second engineering standard. 5-Enter a quote from the second standard and end with citation e.g. “”. Make sure you choose a quote that effected your design. 6-Explain how the quoted section of this second engineering standard effects your design decisions, constrains, and helps your design.
(DSS program)- Read the requirements before accepting the application
Engineering Assignment Help You must implement all the requirements, provide correct solutions, and use the program
all your answers and upload the document on canvas For question-9 you
can provide the pdf copy of the Mathcad results Include the screenshots
of the results obtained from OpenDSS.
350 words main post 100 words two responses with APA Format and citations and references -ST
Users who see security as an obstacle or a nuisance are less likely to abide by security policies. Referred to as “resistance behavior,” a Virginia Tech study found that even if people understand that a security breach can have severe consequences on an organization, that knowledge does not always make users accept and conform to security policy rules. Individuals may feel their competence challenged, which triggers a negative attitude toward security in general. Users may also view some security controls, such as scheduled password changes, as unnecessary interruptions. Security controls, such as a fingerprint scanner, that don’t work consistently may make users feel overwhelmed and lead to mistrust of security controls or even overriding them.
Answer the following question(s):
If you were a professional in charge of security for an organization, what would you say to a user who believes they have the right to decide whether to participate in security measures?
In the same scenario, what kind of incentive do you think would encourage the user to participate?
Fully address the questions in this discussion; provide valid rationale or a citation for your choices; and respond to at least two other students’ views.
Initial post should be at least 350 words in length. Each reply post should be at least 150 words in length.