Questions
What are VT features with UNIX and give examples.

What are VT features with UNIX and give examples.

In: Computer Science

What do you think are the most important attributes for a project manager in IT and...

What do you think are the most important attributes for a project manager in IT and why?

In: Computer Science

write a 400 word persuasive essay on the effects of technology in modern day.

write a 400 word persuasive essay on the effects of technology in modern day.

In: Computer Science

Describing the organizational multitiered cyber risk management approach, analyze a life cycle-based process for managing cyber...

Describing the organizational multitiered cyber risk management approach, analyze a life cycle-based process for managing cyber risk including a general overview of the risk management process. Discuss how organizations establish the context for risk-based decisions, assess risk, respond to risk, and monitor risk over time.

In: Computer Science

What needs to be done to a server rack to get servers in them?

What needs to be done to a server rack to get servers in them?

In: Computer Science

Software Quality Assurance Exam Question: Outline the history of software engineering from the 1960s to today....

Software Quality Assurance Exam Question:

Outline the history of software engineering from the 1960s to today. Include any significant events and paradigms that have shaped the discipline. Must include at least 5 points.

In: Computer Science

Match the appropriate field names for an Ethernet frame Field 1 Field 2 Field 3 Field...

Match the appropriate field names for an Ethernet frame

Field 1 Field 2 Field 3 Field 4 Field 5 Field 6

Group of answer choices

Field 1

      [ Choose ]            Source Port            Preamble            Ethernet Type            File Check Sequence            Destination Address            Source Address            Data Length            Destination Port            Data and Padding      

Field 2

      [ Choose ]            Source Port            Preamble            Ethernet Type            File Check Sequence            Destination Address            Source Address            Data Length            Destination Port            Data and Padding      

Field 3

      [ Choose ]            Source Port            Preamble            Ethernet Type            File Check Sequence            Destination Address            Source Address            Data Length            Destination Port            Data and Padding      

Field 4

      [ Choose ]            Source Port            Preamble            Ethernet Type            File Check Sequence            Destination Address            Source Address            Data Length            Destination Port            Data and Padding      

Field 5

      [ Choose ]            Source Port            Preamble            Ethernet Type            File Check Sequence            Destination Address            Source Address            Data Length            Destination Port            Data and Padding      

Field 6

      [ Choose ]            Source Port            Preamble            Ethernet Type            File Check Sequence            Destination Address            Source Address            Data Length            Destination Port            Data and Padding      

PreviousNext

In: Computer Science

Implement a Message Authentication Code program in either C/C++ or Python. 1. Accept a message as...

Implement a Message Authentication Code program in either C/C++ or Python.

1. Accept a message as keyboard input to your program.

2. Accept a secret key for the sender/recipient as keyboard input to your program.

3. Your hash function H() is simply the checksum. To compute the checksum, you add all the characters of the string in ASCII codes. For example, the checksum of a string "TAMUC" would be 84 + 65 + 77 + 85 + 67 = 378.

Concatenate the secret key of the sender/recipient (from step 2) and the message (from step 1) and compute the checksum of the concatenated string. For ASCII codes, refer to the following website:

http://www.asciitable.com

4. Accept a secret key for the attacker as keyboard input to your program.

5. The attacker modifies the message from step 1. The original message can be modified any way you want.

6. Concatenate the secret key of the attacker (from step 4) and the modified message (from step 5) and compute the checksum of the concatenated string.

7. Concatenate the secret key of the sender/recipient (from step 2) and the modified message (from step 5) and compute the checksum of the concatenated string.

8. Compare the checksum from step 7 and the checksum from step 6. See if they match or not.

9. Compare the checksum from step 3 and the checksum from step 6. See if they match or not.

NOTE: your program should have separate functions for the checksum and the message modification by the attacker.

In: Computer Science

Write a Java code to represent a 1. Date class. As date class is composed of...

Write a Java code to represent a

1. Date class. As date class is composed of three attributes, namely month, year and day; so the class contains three Data Members, and one method called displayDate() which will print these data members.

  1. Test the Date class using main class named DateDemo.
    • Create two objects of date class.
    • Initialize the data fields in Date class using the objects,
    • invoke the method displyaDate().

Date

month : String year: int

day : int

displayDate(): void

In: Computer Science

Draw an EER model of given scenario We wish to create a database for a company...

Draw an EER model of given scenario

We wish to create a database for a company that runs training courses. For this, we must store data about the trainees and the instructors. For each course participant (about 5,000),identified by a code, we want to store her social security number, surname, age, sex, place of birth, employer’s name, address and telephone number, previous employers (and periods employed), the courses attended (there are about 200 courses) and the final assessment for each course. We need also to represent the seminars that each participant is attending at present and, for each day, the places and times the classes are held. Each course has a code and a title and any course can be given any number of times. Each time a particular course is given, we will call it an ‘edition’ of the course. For each edition, we represent the start date, the end date, and the number of participants. If a trainee is self-employed, we need to know her area of expertise, and, if appropriate, her title. For somebody who works for a company, we store the level and position held. For each instructor (about 300), we will show the surname, age, place of birth, the edition of the course taught, those taught in the past and the courses that the tutor is qualified to teach. All the instructors’ telephone numbers are also stored. An instructor can be permanently employed by the training company or freelance.        

Note:It will be really helpful if you provide it on a paper by hand.

In: Computer Science

2. Write a Regular expression that matches words, where a word is a series of ASCII...

2. Write a Regular expression that matches words, where a word is a series of ASCII alphabetic characters. Match both upper- and lowercase.

Note: Enter man grep to read about the options of grep.
Answer:

In: Computer Science

explain in general how one would calculate the one-way delay of a packet sent from host...

explain in general how one would calculate the one-way delay of a packet sent from host A to host B in the given network topology. identify all possible sources of delay.(not only formulas)

In: Computer Science

IN C# Create classes: Person, Student, Employee, Professor, Staff and Address ☐ Address class must have...

IN C#

Create classes: Person, Student, Employee, Professor, Staff and Address

  1. ☐ Address class must have suitable auto-implemented properties for Address 1, Address 2 and City.
  2. ☐ Person class must have suitable auto-implemented properties for Name, Residence (type Address) and email.
  3. ☐ Student and Employee must be subclasses of Person.
  4. ☐ Employee must be a super class for Professor and Staff.
  5. ☐ Employee class must have suitable auto-implemented properties for salary (between 2000 to 8000), and hire date.
  6. ☐ Professor class must have suitable auto-implemented properties for office hours and rank (use enum, e.g. Assist. Prof., Assoc. Prof., etc.)
  7. ☐ Staff class must have auto-implemented property for a designation (use enum, e.g. Office Assistance, Clerk, etc.)
  8. ☐ All classes must have suitable constructor(s) and making use of super class constructors as applicable.
  9. ☐ Override the ToString method in each class to return the class name and all other information in one/single line (use string interpolation and use base class ToString as applicable)

In the Main Method, create three Lists for (Student, Staff, and Professor) with hard-coded data for at least 4 entries each.

Implement the menu driven CONSOLE logic as:

Press 1 to modify Student

Press 2 to modify Staff

Press 3 to modify Professor

Press 0 to exit program

☐modify Student Menu

Press 1 to list all students

Press 2 to add a new student

Press 3 to update …

Press 4 to delete …

Press 5 to return to main menu

☐ modify Staff Menu

Press 1 to list all Staff

Press 2 to add a new Staff

Press 3 to update …

Press 4 to delete …

Press 5 to return to main menu

☐modify Professor Menu

Press 1 to list all Professors

Press 2 to add a new Professor

Press 3 to update …

Press 4 to delete …

Press 5 to return to main menu

☐ Console application must have a hierarchy of above-shown menus and run continuously until the person quits the application

☐ For Search (required to find and update) must use LINQ.

In: Computer Science

Suppose 8 bits are used to store signed integers. The largest value that can be represented...

  1. Suppose 8 bits are used to store signed integers. The largest value that can be represented is 0111 1111. What is the decimal value of that number?

127

128

177

178

  1. 2.Suppose a 6-bit storage unit is used to store unsigned integers. What is the binary representation of the decimal number 67?

01000011

1000011

010000

000011

In: Computer Science

Using HTML and JAVASCRIPT Create a Content area on the main entry page will include inputs...

Using HTML and JAVASCRIPT

Create a Content area on the main entry page will include inputs for customer entry for the following:

  • Entry field (with labeling) for the Customer's name
  • Entry field (with labeling) for the Customer's email address
  • Entry field (with labeling) for which room the customer is planning on painting
  • Entry field (with labeling) for the width of the room
  • Entry field (with labeling) for the length of the room
  • Entry field (with labeling) using a colour box so the customer can pick the colour they want to paint the room
  • A selection list so the user can decide whether they want standard paint (24.99 per can) or premium paint (39.99 per can)
  • A button to create a quote for the customer

On the next page create content on the quote page (a separate page) will include the following:

  • Customer's contact information (name and email)
  • Room to be painted
  • Square footage of the room based on length and width
  • A colour swatch showing the colour the customer picked
  • The number of paint cans that will be needed to paint the room based on each can cover approximately 400 sq ft of wall space (rounded up)
  • The final price for the number of cans based on which type of paint was selected plus 13% HST

Data from the entry page MUST be pulled from local storage in order to fill in quote page and ES6 concepts used where applicable.

In: Computer Science