Enable contrast version

Tutor profile: Macha M.

Macha M.
Student at University of California, and Tutor during free time

Questions

Subject: French

TutorMe
Question:

How would you translate these different sentences from English to French? - How was your day today? Did you have a great time? - What would you do if you had only one last day to live on earth? - Where are you been for so long? - Could you please give me the salt that is on the table?

Macha M.
Answer:

- Comment s'est passe ta journee? Est ce que tu t'es bien amuse? - Que ferais tu s'il te restait seulement un jour a vivre sur Terre? - Ou etais tu pendant si longtemps? - Peux tu me donner le sel qui est sur la table s'il te plait?

Subject: Computer Science (General)

TutorMe
Question:

We have been asked to provide advise on how a company can manage security on their customer information database. The database maintains information on customer sales contacts, orders, and pricing options. Their goal is a database that will be available to their (traveling) sales people via the Internet, to customers for reviewing orders and payment, and within the company for financial reporting, order forecasting, etc. As such, the system contains confidential information and information where integrity is critical. Your task is to identify security threats, and to choose approaches to reduce the risk. You need to explain why the techniques address the threats, and why the threats matter. We need to describe your recommendations to the Chief Information Officer of the company.

Macha M.
Answer:

Data has been always the concern of companies around the world. Indeed it is considered even as critical asset. For this purpose, it is essential to manage security concerns of customer information database. As such, we discuss in this report recommendations to tackle these security concerns. First of all, we start by discussion the potential threats to the customer data versus their accessibility locally or outside of the company premises. Listed below are some of the threats that are discovered and should be mimicked. • Security Against Data Jeopardy Customer data that includes payments, orders, shipping etc, is needed sometimes even outside the company premise. In fact, employees need this data accessibility to confirm receipts or law inspections measures. However, this kind of data have to be accessible only to the concerned employees and upon the right authentication. Therefore, when it is needed, a virtual private network is needed to be able to authenticate and access it. Furthermore, two factors authentication process has to be established. This way, the only parties that will succeed at reaching this data specifically are the once that are granted access to that particular virtual private network and must succeed at authenticating using there double factors authentication. • Accidental Sharing Sometimes data needs to be shared either via emails, chats etc. Serving this purpose could lead to data being accessible by unauthorized entities. To mimic this, shared data have to be sent with access right granted only to the concerned parties. This way, if data is exposed to an outsider organization by mistake it will not be accessible, because they are not granted the right to. • System Threats Due to system update failure, precisely after a hot fix release this could cause serious database risk. In fact, data thieves are more focused when a new system release is made. Therefore, keeping up with database update is vital. To overcome that, database & system patches have to be tested after every patch. All in all, there are hundreds of database security threats that could penetrate and jeopardize data and data integrity. Updating the database policy regularly and adhering to it.

Subject: Algebra

TutorMe
Question:

2(3x - 7) + 4 (3x + 2) = 6 (5x + 9 ) + 3 Give the value of x

Macha M.
Answer:

For this exercise, we need to follow a few steps before answering the questions. (1) The first step is to calculate the parentheses on both side of the equation. Which gives us: 2 * 3x - 2 * 7 + 4 * 3x + 4 * 2 = 6 * 5x + 6 * 9 + 3 6x - 14 + 12x + 8 = 30x + 54 + 3 (2) Now we calculate the x numbers and the plain numbers together, such as: 6x + 12x - 14 + 8 = 30x + 54 + 3 18x - 6 = 30x + 57 (3) Third step is to put all the x on one side of the = sign, and the other numbers on the other side, and calculate them. 18x - 30x = 57 + 6 - 12x = 63 (4) Now to get the value of x, we divide 63 by -12 x = -63 / 12 = -21 / 4

FAQs

What is a lesson?
A lesson is virtual lesson space on our platform where you and a tutor can communicate. You'll have the option to communicate using video/audio as well as text chat. You can also upload documents, edit papers in real time and use our cutting-edge virtual whiteboard.
How do I begin a lesson?
If the tutor is currently online, you can click the "Start Lesson" button above. If they are offline, you can always send them a message to schedule a lesson.
Who are TutorMe tutors?
Many of our tutors are current college students or recent graduates of top-tier universities like MIT, Harvard and USC. TutorMe has thousands of top-quality tutors available to work with you.
BEST IN CLASS SINCE 2015
TutorMe homepage
Made in California by GoGuardian
Copyright © 2022. Zorro Holdco, LLC doing business as TutorMe.
All Rights Reserved.
High Contrast Mode
On
Off