Tag Archive for: Assignment Help Online Services Collections

Computer Science 2023 Home Work

2023 What is most important is that you use YOUR OWN WORDS Do the following review questions | Assignment Collections

  What is most important is that you use YOUR OWN WORDS  

Do the following review questions:

  • 4.1 List ways in which secret keys can be distributed to two communicating parties.
  • 4.2 What is the difference between a session key and a master key?
  • 4.3 What is a key distribution center?
  • 4.4 What entities constitute a full-service Kerberos environment?
  • 4.5 In the context of Kerberos, what is a realm?
  • 4.6 What are the principal differences between version 4 and version 5 of Kerberos?
  • 4.7 What is a nonce?
  • 4.8 What are two different uses of public-key cryptography related to key distribution?
  • 4.9 What are the essential ingredients of a public-key directory?
  • 4.10 What is a public-key certificate?
  • 4.11 What are the requirements for the use of a public-key certificate scheme?
  • 4.12 What is the purpose of the X.509 standard?
  • 4.13 What is a chain of certificates?
  • 4.14 How is an X.509 certificate revoked?

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 File/directory processing

2023 File directory processing Write a Java C or C C program the choice is yours for file directory processing according to | Assignment Collections

File/directory processing
Write a Java, C# or C/C++ program (the choice is yours) for file/directory processing according to the following rules. The program requested for this project must have a text menu like this:
0 – Exit
1 – Select directory
2 – List directory content (first level)
3 – List directory content (all levels)
4 – Delete file
5 – Display file (hexadecimal view)
6 – Encrypt file (XOR with password)
7 – Decrypt file (XOR with password)
Select option:
The menu is displayed and the user must select an option (a number between 0 and 7). The action corresponding to the selection is performed, then the menu is displayed again and the user can choose another option. This cycle is repeated until the user selects 0, which exits the loop and ends the program.
The options are:
0 – Exit
This options ends the program
1 – Select directory
The user is prompted for a directory [absolute] name. This is the first options that must be selected by the user. All the options below are working on the directory selected here. After performing several operations on the selected directory, the user can select another directory and work with it.
2 – List directory content (first level)
This option displays the content of the selected directory on the screen. All the files and sub-directories from the first level must be displayed (files and directories should be listed separately). If no directory was selected an error message must be displayed.
3 – List directory content (all levels)
This option displays the content of the selected directory on the screen. All the files and sub-directories from the first and subsequent levels must be displayed (files and directories should be listed separately). If no directory was selected an error message must be displayed.
4 – Delete file
This option prompts the user for a filename and deletes that file from the selected directory. If no directory was selected an error message must be displayed. If the directory does not contain the file specified by the user, an error message must be displayed. The filename does not include any path, it’s just the name of the file.
5 – Display file (hexadecimal view)
This option prompts the user for a filename (from the selected directory) and displays the content of that file on the screen, in hexadecimal view. If no directory was selected an error message must be displayed. If the directory does not contain the file specified by the user, an error message must be displayed. The filename does not include any path, it’s just the name of the file.
Note 1: The hexadecimal view displays each byte of the file in hexadecimal; it should look something like this, but simpler:
Note2: The ASCII representation, the Current Offset and the Value Preview are NOT required; also there is no window, no graphics, no colors, just black and white text display. Being a text only display, you are required to display ONLY the Data Offset and the Hexadecimal Representation.
6 – Encrypt file (XOR with password)
This option prompts the user for a password (max 256 bytes long, may contain letters, digits, other characters) and then prompts the user for a filename and encrypts the content of the selected file using that password. The encryption method is very simple: just XOR the password with the file content byte after byte; the password being shorter than the file content, you must repeat the password as needed.
Example:
passwordpasswordpasswordpasswordpasswordpasswordpass
this is the file content that we need to encrypt now
chiphertext is obtained here by XORing byte to byte
Note1: the user must be prompted for the filename of the encrypted file (containing the ciphertext) as well, otherwise we would need to overwrite the initial file.
Note2: If no directory was selected an error message must be displayed. If the directory does not contain either of the files specified by the user, an error message must be displayed. The filenames do not include any path.
7 – Decrypt file (XOR with password)
This option prompts the user for a password (max 256 bytes long, may contain letters, digits, other characters) and then prompts the user for a filename and decrypts the content of the selected file using that password. The decryption method is very simple: just XOR the password with the file content byte after byte; the password being shorter than the file content, you must repeat the password as needed.
Example:
passwordpasswordpasswordpasswordpasswordpasswordpass
chiphertext is here …
this is the file content that we had initially
Note1: the user must be prompted for the filename of the decrypted file as well, otherwise we would need to overwrite the initial file.
Note2: it may seem strange that we are using the same operation (XOR) both for encryption and for decryption, but this is how XOR (exclusive OR) works.
Note3: If no directory was selected an error message must be displayed. If the directory does not contain either of the files specified by the user, an error message must be displayed. The filenames do not include any path.
Testing:
1. You should use this file as the test file for Display, Encryption and Decryption.
2. For encryption, use the following password “Qwertyuiop[123$4$567]”
3. After encrypting this file with the above password, you obtain an encrypted file of the same length; after decrypting that file with the same password you should obtain an exact replica of this file, and this must be reflected in the Report document by appropriate screenshots showing the content of the files involved in these operations.
Deliverables:
1. Source code (zipped)
2. A Report showing the program performing each of the 7 actions correctly (use screenshots), plus screenshots showing the error reporting situations.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 A+ Answers

2023 POS 433 Version 1 File Processing Commands Worksheet What UID and PID have the highest amount of physical | Assignment Collections

POS/433 Version 1 File Processing Commands Worksheet

 

·        What UID and PID have the highest amount of physical memory a process has used and is not swapped out? Show all processes and full output.

·        If using a long listing and no process modifiers, what is the swap space amount for the bash command?

·        When using top command, what command would you use to kill a process?

·        If you were not using top command, what command would you use to kill a process?

·        What command would you use to manually mount the standard CD-ROM device /dev/db1 at /media/disk?

·        What command would you use to display the amount of available disk space on /dev/db1 in a human readable form?

·        Type in the command grep – – help to access the help manual. Using this information and the information from the text, how would you write a command to find the pattern 111 in a file called myfile.txt?

 

 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Block Chain & Finance

2023 Prepare an 8 page APA style paper using the resources you have read | Assignment Collections

Prepare an 8 page APA style paper using the resources you have read in this course and at least 3 additional peer reviewed resources. Follow the writing requirements for this course. Include an introduction and conclusion in the paper. This paper should address the following questions:

(1) Does Blockchain technology have the potential to cause a shift in financial business practices that many experts are predicting? Explain why or why not. Support your answer with research.

(2) Is there evidence to suggest that Blockchain technology will change the way finance is applied and practiced? If there is, discuss that evidence. If there is not, what issues exist that impede its adoption?

(3) Which functions of financial management could be most impacted by Blockchain technology? How might the financial functions change? Support your answer with research.

Course writing requirements:

References must be cited within your paper in APA format. Your reference page and in-text citations must match 100%. Papers without in-text citations will earn failing grades.

Always include a cover page and reference page with all submissions (even initial discussion posts)

Provide the exact web link on the reference page citations for all online sources – do not provide just the home page, but the exact link – I check all sources

No abbreviations, no contractions – write formally

Write in the third person formal voice (no first or second person pronouns)

Write more than the minimum requirement of the word count assigned

As always, the word count is only for the body of the paper – the cover page, reference page, and / or Appendix (if included) do not count towards the word count for the paper

Indent the first line of each new paragraph five spaces

Refer to the example APA paper in the getting started folder under the content tab if you need an example. Also, a Power Point is provided under the information tab that addresses APA format.

Use double-spacing / zero point line spacing, a running header, page numbers, and left justify the margins.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Simnet Week 3

2023 Let Me Try Chapter 3 Simnet Pause Practice Chapter 3 found in Chapter 3 of the textbook submitted | Assignment Collections

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 information system

2023 BIE2423 SOFTWARE REQUIREMENT ENGINEERING Group Assignment 30 Department | Assignment Collections

BIE2423 ● SOFTWARE REQUIREMENT ENGINEERING

       
 
 
   

Group

Assignment

30%

 

 

Department                          :   Faculty of Information & Communication Technology

Course Name                      :   B.Sc (Hons) Information Technology

Commence Date                 :   15th April 2015 (Week 7)

Deadline Date                      :   Week 12

Unit Controller / Examiner :   Princewill Obinna Iwuorie

Contact Number                  :   –

E-mail                                    :   [email protected]

 

 

Assignment title

 

  • Requirement Validation

 

Objective

 

The objective of this Group Assignment is for students:

·         To help students to understand how important requirement validation is in the early phase of SDLC.

·         To prepare students to do major project course

Assignment description

Based on your Assignment 1, you are required to choose the following information system that you are interested to develop:

  • Web based information system
  • Mobile based information system
  • E-commerce information system
  • E-Learning information system
  • Expert system or other Intelligent information system
  • Other information system that is approved by the lecturer

 

Since the topics are general, try to choose topic that you are interested to be proposed for major project. Determine more specific system, e.g. a disaster notification through mobile application, learning mathematics with Kinect for kids, etc.

 

After you choose topic, find out future users of the information system that you build. If you build an e-commerce system, you may consider manager, customer and owner. If you build e-learning system for kids, you may consider teacher, children and parents.

 

Based on the requirements derived in your assignment 1 you are required to Validate and verify your requirements.

 

Validation Objectives include:

·         Completeness and Consistency

·         Conformance to standards

·         Requirements conflict

·         Technical Error

·         Ambiguous requirements.

 

DOCUMENTS CHECK LIST

The following are documents that you have to submit in CD:

 

Table 2. Documents check list

No.

Document’s Name

1.

Report file in doc or docx format

2.

Copy of Conformance standards e.g. (ISO or IEEE doc)

 

 

REPORT STRUCTURE

 

In the hardcopy of this assignment, you have to write according to the following structure:

  1. Cover Page

2.     Topics

·         Brief explanation of how the requirements were gathered.

3.     Requirements

·         Explain the requirements and how they were derived.

·         Validate the requirements using Validation objectives stated previously.

4.     Conclusion

 

SuBmission information

 

  • Plagiarism will be marked as 0.
  • This assignment is a group assignment consists of maximum THREE (3) students (no bargaining).
  • Students are required to submit the report in hardcopy and the softcopy in CD and email to me ([email protected]). The softcopy must include all the documents stated in table 2. The assignment will not be marked if both of softcopy and hardcopy have not been submitted.
  • Student who submits this assignment after the deadline date stated above will be penalized (1 mark every week).
  • Print out the source code by using Arial font style, size of 10 and space by 1.
  • You must submit the work with an assignment cover page and bind together as submission.

SuBmission information

  • You are required to present your project in class and in front of your classmates.
  • The presentation is within week 9 and 10.
  • You are required to submit the member of groups latest by week 7.
  • You should reserve a time slot for your presentation on week 7.
  • Each group member must present the part of project that he/she was in charge of doing that.
  • The presentation slides should be well-designed and clear in content.
  • DO NOT copy and paste the contents of your project directly into the slides. Take note that the slides should not have a lot of texts and should be limited to titles only.
  • Practice for your presentation and make sure that you are not reading directly from the slides.

 

Specific Information

 

  • This Assignment is a group work and it contributes 30% to your total marks.

 

rules and regulations

 

  • You are NOT allowed to work together to get a detailed solution, to copy a solution, or to give away a solution other than your group
  • Do NOT let other members see your solution.
  • Do NOT e-mail your solution to anyone other than the lecturer.
  • If someone cheats by using your work, you will be penalized.


Marking Scheme

Software Design Group Assignment 2

April 2015

 

Student Name

ID

 

 

 

 

 

 

 

No.

Criteria

Marks

1.

Brief explanation of how the requirements were gathered.

/ 4

2.

Explain the requirements and how they were derived.

/ 4

3.

Validate the requirements using Validation objectives

/ 10

4.

Conclusion is meaningful

/ 2

5.

Presentation

/10

 

TOTAL

   / 30

 

 

 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Assignment 3: Create An Incident Response Policy

2023 Look for at least two incident response policies for organizations of a similar type to your | Assignment Collections

Look for at least two incident response policies for organizations of a similar type to your organization. In addition, download NIST “Computer Security Incident Handling Guide, rev 2” SP800-61 located at http://csrc.nist.gov/publications/nistpubs/800-61rev2/SP800-61rev2.pdf.  Based on your research, create an initial draft of an incident response policy for your organization. Consider HIPAA and other health care–related compliance requirements. Create a summary report that justifies the content you included in the draft policy. Reference your research so that one may add or refine this report before submission to senior management. Prepare a two (2) page, double-spaced document using Times New Roman 12 point. Post finished document in iLearn by the due date in the syllabus. 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Local Area Network (LAN) Design Considerations (IT Professionals Only)

2023 Background Hugh Generic of Generic Financial Services has hired XYZ Systems Consulting to help with the LAN design of | Assignment Collections

Background: Hugh Generic of Generic Financial Services has hired XYZ Systems Consulting to help with the LAN design of two offices. Mary Prince of XYZ Systems Consulting met with Hugh Generic and a transcript of their conversation can be found in the student download section on the right within the XYZ Systems Consulting folder.

Resources:

To gain additional insight on how to analyze network needs and possible vulnerabilities, download and use NMap which also contains Zenmap GUI as the graphical interface to show scan results. NMap is a free open source tool used to gain additional information on how to review network traffic and determine additional hosts, operating systems being used, scan ports, and application versions used on a network. The instructions for use can be downloaded using the link under the materials section on the right. Be sure to follow these instructions and then review the types of information provided.

 

Assignment:

Determine how use of this tool can be used to make decisions and provide the modification needed for this LAN Design project.

Prepare a LAN design using Visio® for service request SR-mf-005 & SR-mf-007.

Name your project “005_LastName_FirstInitial” and choose Create an Empty Scenario.

 

Materials (These tools must be used to complete assignment)

Attachments: 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 PLEC14

2023 Discuss each question in a paragraph of at least five sentences Include the | Assignment Collections

 

Discuss each question in a paragraph of at least five sentences. Include the question and number your answers accordingly

  1. Give an example from the book where insufficient testing was a factor in a program error or system failure.
  2. What was one cause in the delay in the completing of the Denver Airport.
  3. Why didn’t the healthcare.gov website work at first?
  4. What is one characteristic of high reliability organizations?
  5. Describe the potential risks of alert fatigue in EHR systems.
  6. What were 2 common factors in both the Therac-25 case and the space shuttle disaster.
  7. What does design for failure mean?

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Asap 2

2023 Assignment Tasks Chapter 2 Create either pseudocode or a flowchart for a program that does the following a | Assignment Collections

Assignment Tasks

Chapter 2: Create either pseudocode or a flowchart for a program that does the following:

a)      Prompt the user to enter a sales tax rate.

b)      Prompt the user to enter a price.

c)      Calculate and output the amount of tax for the item and the total price with tax.

 Chapter 3: Computer programs can contain structures within structures and stacked structures, creating very large programs. Computers also can perform millions of arithmetic calculations in an hour. How can we possibly know the results are correct?

Writing Requirements

APA Format

3-5 Pages in length (excluding cover page, abstract, and reference list)

Incorporate concepts, theories, and terms from the text and supplemental material.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now