Questions
Give a complete implementation of the queue ADT using a singly linked list that includes a...

Give a complete implementation of the queue ADT using a singly linked list that includes a header sentinel (in Python).

In: Computer Science

(12 pts) Suppose r0 = 0xFFFFFFFF, r1 = 0x00000001, r2 = 0x00000000 Initially N, Z, C,...

(12 pts) Suppose r0 = 0xFFFFFFFF, r1 = 0x00000001, r2 = 0x00000000 Initially N, Z, C, V flags are
zero. Find the value of the N, Z, C, V flags of the following instructions. (Assume each instruction
runs individually, i.e. these instructions are not part of a program.). Hint: This time remember
what the default flag are values for the N, Z, C, V flags. The default flag values might vary based
on the flag type.
• ADD r3, r0, r2
• SUBS r3, r0, r0
• ADDS r3, r0, r2
• LSL r3, r0, #1

4. (12 pts) Suppose r0 = 0x0F0F0F0F, and r1 = 0xFEDCBA98, find the result of the following
operations.
• ORR r3, r1, r0
• AND r3, r1, r0
• BFI r3, r1, #4, #8
• MVN r3, r1
ADD r3, r1, r3

In: Computer Science

write a c++ program in which for loop iterates over all integers in the range 0...

write a c++ program in which for loop iterates over all integers in the range 0 to 99 inclusive and prints out all of those numbers dividible by both 2 and 5.

In: Computer Science

Two scenarios are provided for the candidates. The candidates can provide appropriate solutions for any one...

Two scenarios are provided for the candidates. The candidates can provide appropriate solutions for any one or both the scenarios considering all the points.

Scenario 1:

An environment is attacked by zero-day attack with users identifying a notepad with attacker details and instructions to regain access, 60% of estate/users are impacted. Every endpoint had AV & EDR tools, but the machines were infected. Environment had required security controls for network, firewall, log monitoring, nothing was detected in SIEM. Backup strategy used is snapshot back-up on the same network in the same domain.

Using threat hunting techniques can we establish how hacker could have infiltrate and,

  1. How to find what are the IOC’s.
  2. How do you identify if any data exfiltration has happened?
  3. Approach to restrict further propagation of malicious code in estate & immediate corrective actions.
  4. What will be the incident response and recovery strategy ?

Scenario 2:

When looking at any security team, one thing you might notice is that there is a tool for everything. And we do mean everything: ticketing, threat intelligence, security investigations, malware analysis, detection, incident response, advanced persistent threats, security monitoring the list goes on.

Every organization wants the best of the best to build their defenses. This can often leave their security teams and security operations centers with a tool stack of uncooperative solutions that don’t communicate with one another, with their full value remaining untapped, and they can interrupt or even cancel each other out. The team becomes paralyzed by the sheer number of alerts generated by these solutions, losing time that could be spent on contextualized investigation and response.

We often cite alert fatigue as a common challenge in SOCs, and with good reason. Nobody likes alerts, because whether it’s a fire alarm, car alarm, or alarm for any other kind of emergency, it signals to us that a real threat is present. But after hearing alerts time and time again, all we hear is the boy who cried wolf. We downplay these alerts because we’ve spent so much of our precious time combing through them, only to reveal themselves as fake. In SOC terms, this leads to real threats being missed, often to devastating consequences.

There is a solution. That solution is connecting the tools that security teams run, to communicate with each other and do away with the tedious, time-consuming tasks that have a high potential for human error. Streamlining the process with which tools are used helps to keep security professionals from losing any of their precious time.

  1. What is security orchestration?
  2. What can we use security orchestration for?
  3. What are the benefits of security orchestration?
  4. What are the key elements that are needed for SOAR to perform as desired?
  5. What is Automated response and how does it work, can you give an example?

In: Computer Science

In a one processor system, there is an interrupt clock which is set to a “time...

In a one processor system, there is an interrupt clock which is set to a “time slice Q”, that is, every Q an interrupt occurs to stop the process. There is only one I/O device in the system    which is interrupted when the process needs an I/O. There are 3 processes A, B, C.

    

     Process A executes an I/O interrupt every T units of time.

     Process B executes an I/O interrupt every 2T units of time.

     Process C executes an I/O interrupt every 3T units of time.

(a) Which of the above processes will benefit the most and which is not when Q = T.

      Explain your answer

(b) Which of the above processes will benefit the most and which is not when Q = 2T.

      Explain your answer

(a) Which of the above processes will benefit the most and which is not when Q = 3T.

      Explain your answer

What is the best value should Q takes for good performance ? explain your answer in full.

In: Computer Science

how the stemming and Lemmatization affect a ration of precision and recall with examples ? {does...

how the stemming and Lemmatization affect a ration of precision and recall with examples ? {does increase or decrease]

In: Computer Science

-if user select 3Duser needs to select the shape type (Cube, Cylinder, or Pyramid) after selected...

-if user select 3Duser needs to select the shape type (Cube, Cylinder, or Pyramid) after selected shape the user needs to specify whether to find the surface-Area and the volume using user-defined-constructor or default-constructor, accordingly the needed constructor is used. Important Points: 1- all selections must be done within an infinite loop such that the user selects to exit when needed. 2- all entered values need to be validated, otherwise, repetition occurs (must be re-entered again). 3- Any selection must create an instance (object) of the corresponding class, the object must test the class functionality by setting its values and displaying the output. 4- Summary Print() method should display the information in a proper way,

o User Name: jone

o Selected category : 2D

o Shape Name: square

o Side Length: 5 m3

o Volume: 29

o Surface Area : 60 m2

In: Computer Science

write an overview of a microprocessor

write an overview of a microprocessor

In: Computer Science

find the k-th smallest value given array[ 5, 2, 1, 15, 6, 9, 3, 4, 11]...

find the k-th smallest value

given array[ 5, 2, 1, 15, 6, 9, 3, 4, 11] , k=2, the algorithm return the first two value: 1, 2

please show steps of how to output the first 2 values by using merge sort

and please analyze the running time.

your time is greatly appreciated.

In: Computer Science

A system is composed of 4 components:➢The performance of 5% of the system can be doubled....

A system is composed of 4 components:➢The performance of 5% of the system can be doubled. We will call this part component 1➢The performance of 20% of the system can be improved by 80%. We will call this part component 2➢The performance of 45% of the system can be improved by 50%. We will call this part component 3.The performance of the remaining of the system cannot be improved. We will call this part component 4Using Amdahl's law, which component is most worthy to work on to get themaximum overall improvement?

In: Computer Science

Afterananalysis, we realize that 70% component of a problem can be run on a hexa-coreparallelmachine architecture,...

Afterananalysis, we realize that 70% component of a problem can be run on a hexa-coreparallelmachine architecture, and out of which 30% component is bound to run on an octa-core and 20% is bound to run on quad core only.What is the parallel speedup when runnin on a parallel machinewithout any parallelization overheads?

In: Computer Science

needs to be done in C++ Q3. Just just have to code the function and the...

needs to be done in C++

Q3. Just just have to code the function and the function call statement.

This program is for a Carpet Store. Create a function, named CarpetCost, that will have 3 parameters that are float values of length and width and price. The function will return the Total Cost of a piece of Carpet. The values for the Length and the Width is in Feet.   The price of the carpet is in Dollars per Square Yard.

The equation for the Area of the Carpet in Square Feet is: Area_sq_ft = length * width;

The equation for the Area in Carpet in Sqaure Yards is : Area_sq_yd = Area_sq_ft / 9.0;

The equation for the Price of the Carpet in Square Yards is : Price = Area_sq_yd * price;

Example RUN:

Enter the length and width of the Carpet > 5.5 9.5

Enter the price of the carpet in dollar.cents format ($##.##) > = 44.40

In: Computer Science

What type of optimum does backpropagation learn? How does batch mode learning work with backpropagation? Thank...

  1. What type of optimum does backpropagation learn?
  2. How does batch mode learning work with backpropagation?

Thank you

In: Computer Science

Use a switch statement on a char variable to write a function that's a simple calculator...

Use a switch statement on a char variable to write a function that's a simple calculator that keeps running waiting for input

Should have a do while loop that continually loops the function, prompting for a new input and new operator, until the calculator returns 0, in which case it will close.

In: Computer Science

write JAVA program have a public class named GeometricShapes that has the main() method. In the...

write JAVA program have a public class named GeometricShapes that has the main() method. In the main() method the user needs to select if he want 2D shapes or 3D shape -if user select 2D user needs to select the shape type (Square, Circle, or Triangle) after selected shape the user needs to specify whether to find the Area or the Perimeter or to find side-length (radius for the circles), accordingly the needed constructor is used. (using Polymorphism principle) -if user select 3Duser needs to select the shape type (Cube, Cylinder, or Pyramid) after selected shape the user needs to specify whether to find the surface-Area and the volume using user-defined-constructor or default-constructor, accordingly the needed constructor is used. Important Points: 1- all selections must be done within an infinite loop such that the user selects to exit when needed. 2- all entered values need to be validated, otherwise, repetition occurs (must be re-entered again). 3- Any selection must create an instance (object) of the corresponding class, the object must test the class functionality by setting its values and displaying the output. 4- Summary Print() method should display the information in a proper way,

o User Name: jone

o Selected category : 2D

o Shape Name: square

o Side Length: 5 m3

o Volume: 29

o Surface Area : 60 m2

In: Computer Science