Questions
Answer the question: Some IT security personnel believe that their organizations should employ former computer criminals...

Answer the question:
Some IT security personnel believe that their organizations should employ former computer criminals to identify weaknesses in their organizations’ security defenses. Do you agree? Why or why not?


Notes:
answer by using your own words, please.
the name of the course is "Professional Computing Issues."

In: Computer Science

Suppose you have the following two data sequences: 1101110101100110, and 0101010101010010. What is the value you...

Suppose you have the following two data sequences: 1101110101100110, and 0101010101010010. What is the value you should put in the checksum field if those are the only data you have?

In: Computer Science

Write a java program that asks the user for a positive integer N and then calculates...

Write a java program that asks the user for a positive integer N and then calculates a new value for N based on whether it is even or odd: if N is even, the new N is N/2. (Use integer division.) if N is odd, the new N is 3*N + 1. Repeat with each new N until you reach the value 1. For example, say the initial value is 12. Then the successive values are:

12 (even, next value is 12/2)

6 (even, next value is 6/2)

3 (odd, next value is 3*3+1)

10 (even, next value is 10/2)

5 (odd, next value is 3*5+1)

16 (even, next value is 16/2)

8 (even, next value is 8/2)

4 (even, next value is 4/2)

2 (even, next value is 2/2)

1 (stop calculation)

In: Computer Science

The following problems deal with sign extension and overflow. Registers X0 and X1 hold the values...

The following problems deal with sign extension and overflow. Registers X0 and X1 hold the values as shown in the table below. You will be asked to perform LEGv8 operations on these registers and show the result for the contents of A and B in the table 2 following.

A.

X0 = 0x7000000016

X1 = 0x0FFFFFFF16

B.

X0 = 0x4000000016

X1 = 0x4000000016

Table 2.

  1. For the contents of registers X0 and X1 as specified above, what is the value of X4 for the following assembly code for the contents of A and B respectively:

ADD X4, X0, X1

  1. Is the result in X4 the desired result, or has there been overflow in each of A and B?
  1. For the contents of registers X0 and X1 as specified above, what is the value of X0 for the following assembly code for the contents of A and B respectively:

SUB X4, X0, X1

  1. Is the result in X4 the desired result, or has there been overflow in each of A and B?

  1. For the contents of registers X0 and X1 as specified above, what is the value of X4 for the following assembly code for the contents of A and B respectively:

ADD X4, X0, X1

ADD X4, X0, X0

  1. Is the result in X4 the desired result, or has there been overflow in each of A and B?

In: Computer Science

Convert the Queue to Generic implementation: public class MyQueueImpl implements MyQueue {    private int capacity;...

Convert the Queue to Generic implementation:

public class MyQueueImpl implements MyQueue {
   private int capacity;
   private int front;
   private int rear;
   private int[] arr;
   public MyQueueImpl(int capacity){
       this.capacity = capacity;
       this.front = 0;
       this.rear = -1;
       this.arr = new int[this.capacity];
   }
   @Override
   public boolean enQueue(int v) {      
           if(this.rear == this.capacity - 1) {
               //Perform shift
               int tempSize = this.size();
               for(int i=0; i < tempSize; i++) {
                   arr[i] = arr[front];
                   front++;
               }
               front = 0;
               rear = tempSize - 1;
           }
           this.rear ++;
           arr[rear] = v;
           return true;
   }
   @Override
   public int deQueue() {
       return arr[front++];
      
   }
   public String toString() {
       String content = "Queue :: ";
      
       for(int i=front; i<= rear; i++) {
           content += "\n" + arr[i];
       }
       return content;
   }
   @Override
   public boolean isFull() {
       return (this.size() == this.capacity);
   }
   @Override
   public int size() {
       return rear - front + 1;
   }
   @Override
   public boolean isEmpty() {
       // TODO Auto-generated method stub
       return (this.size() == 0);
   }
   @Override
   public int peek() {
       // TODO Auto-generated method stub
       return this.arr[this.front];
   }
}

In: Computer Science

Linux Have your script request a word from the user, then checks if it is an...

Linux

Have your script request a word from the user, then checks if it is an ordinary file. If yes display the size of the file. If the name is a directory, then display the number of objects in that directory, then display the second line of a long listing of that directory.

In: Computer Science

in assemby, please share code and output - thanks 1. First clear all your general purpose...

in assemby, please share code and output - thanks

1. First clear all your general purpose registers by moving the value “0” into them. Initialize a variable for a BYTE, WORD, DWORD storage size each with any desired value in the data segment. Initialize another variable called Result with the size of a DWORD and make the value as an uninitialized value. In the code segment, create a label called L1 that moves the variables in the appropriate sized register and making sure NOT to overwrite them in the process. After, create another label L2 that adds all these values together and at the end of your program make sure your ECX register contains the final value. Call the DUMPREGS instruction to display your register values and move the final result into the Result variable.

2. Use the following code below as a template and follow the instructions written in the comments ;Assume I have the following data segment written: .data val1 BYTE 10h val2 WORD 8000h val3 DWORD 0FFFFh val4 WORD 7FFFh ;1. Write an instruction that increments val2. ;2. Write an instruction that subtracts val3 from EAX. ;3. Write instructions that subtract val4 from val2. .code ;Write your instructions here

In: Computer Science

Compare radixSort to bubbleSort, SelectionSort, and InsertionSort Compare quickSort to bubbleSort, SelectionSort, and InsertionSort

Compare radixSort to bubbleSort, SelectionSort, and InsertionSort

Compare quickSort to bubbleSort, SelectionSort, and InsertionSort

In: Computer Science

what is the operation for DragonFly BSD DragonFly BSD os structure

what is the operation for DragonFly BSD

DragonFly BSD os structure

In: Computer Science

Write a function lbs2lboz(p) that takes a non-negative number, p , that represents a weight in...

Write a function lbs2lboz(p) that takes a non-negative number, p , that represents a weight in pounds and outputs a pair (l,o) such that l is an integer and p=l+o/16.

Write a function oz2lboz(oz) that takes a non-negative number, oz , that represents a weight in ounces and outputs a pair (l,o) such that l is an integer and oz=l*16+o.

on python

In: Computer Science

What are the three types of processor scheduling? What is the difference between turnaround time and...

What are the three types of processor scheduling?

What is the difference between turnaround time and response time?

What is the difference between preemptive and non-preemptive scheduling?

Is a non-preemptive scheduling approach a good choice for interactive systems? Why?

What is the meaning of the term: feedback scheduling?

In: Computer Science

IN JAVA Methods**: Sort three values Write a method Ascend3 with an array of integers of...

IN JAVA

Methods**: Sort three values

Write a method Ascend3 with an array of integers of size three as the parameter, that sorts the values of the array into ascending order. Ex: If the array contains [5, 2, 7], after the call Ascend3(int[] vals), the array will now hold [2, 5, 7].

Hints:

  • Return type should be void.

  • One approach puts the three values into an array, then sorts the array. We won't be describing that approach here. Instead, we'll use branches.

  • One solution approach realizes that only 6 possible orderings of xyz exist: xyz, xzy, yxz, yzx, zxy, zyx. An if-else can be used to detect which order x, y, z are initially in.

  • Once detected, three variables lowVal, midVal, and highVal can be assigned. Note: Don't assign the parameter right away, because you'll overwrite a value that is still needed.

  • After the if-else, those lowVal, midVal, and highVal variables are ready. So just set the vals[0] with lowVal, vals[1] with midVal, and vals[2] with highVal.

  • Be aware that two values could be equal. So use <= rather than < in your comparisons.

GIVEN CODE:

import java.util.Scanner;

public class Main {

// Define Ascend3() here

public static void main(String[] args) {
Scanner scnr = new Scanner(System.in);
int[] arrVals = new int[3];
  
arrVals[0] = scnr.nextInt(); // x
arrVals[1] = scnr.nextInt(); // y
arrVals[2] = scnr.nextInt(); // z
  
Ascend3(arrVals);
  
System.out.println(arrVals[0] + " " + arrVals[1] + " " + arrVals[2]);
}
}

In: Computer Science

Implement the earse one() function by using the array shifting method (i.e., remove one target item...

Implement the earse one() function by using the array shifting method (i.e., remove one target item and shift all right items one position left).

In: Computer Science

How does a value-returning function differ from the void functions? in pyhton

How does a value-returning function differ from the void functions? in pyhton

In: Computer Science

How are the security vulnerabilities found on Microsoft Windows systems different or similar with those found...

  • How are the security vulnerabilities found on Microsoft Windows systems different or similar with those found on Linux systems? Which operating environment is more vulnerable and what is the basis of your assertion? How would these differences or similarities impact the work of a security administrator?
  • Are virtual private networks (VPNs) always secure? What could make a VPN environment vulnerable to attacks? And how would defense-in-depth and creating a layered-technology approach enhance VPN networks?

In: Computer Science