Questions
An employee suspects that his password has been compromised. He changed it two days ago, yet...

An employee suspects that his password has been compromised. He changed it two days ago, yet it seems someone has used it again. What might be going on?

Answer according to digital forensics

In: Computer Science

Discuss the importance of effective project management in following the workflow and achieving the specific project...

Discuss the importance of effective project management in following the workflow and achieving the specific project deliverables. Address appropriate strategies and methodologies for Software Development, or Web Design and Development. Be thorough. Take into consideration all stakeholders and identify both positive and negative potential outcomes

In: Computer Science

A cloud customer has asked you to do a forensics analysis of data stored on a...

A cloud customer has asked you to do a forensics analysis of data stored on a CSP’s server. The customer’s attorney explains that the CSP offers little support for data acquisition and analysis but will help with data collection for a fee. The attorney asks you to prepare a memo with detailed questions of what you need to know to perform this task. She plans to use this memo to negotiate for services you’ll provide in collecting and analyzing evidence. Write a one- to two-page memo with questions to ask the CSP.

Answer according to digital forensics

In: Computer Science

I am trying to return a string from certain position of the sentence on C++, like...

I am trying to return a string from certain position of the sentence on C++, like a function/ statement that is equivalent to excel mid function.

In: Computer Science

An 8-bit byte with binary value 11001101 is to be encoded using an even-parity Hamming code....

An 8-bit byte with binary value 11001101 is to be encoded using an even-parity Hamming code.
What is the binary value after encoding?

A bit stream 10101010 is transmitted using the standard CRC method. The divisor is 1011.
Show the actual bit string transmitted. Suppose the second bit from the left is inverted during
transmission. Show that how this error is detected by the receiver?

What is the maximum size of the sender window and receiver windows for each of the following
protocols when the number of bits in the sequence field is 8?
c. Go-Back-N ARQ
d. Selective-Repeat ARQ


Compare and contrast the Go-Back-N ARQ Protocol with Selective-Repeat ARQ describing
the process of each protocol with a suitable example.

In: Computer Science

Pass or Fail (C++) Given a vector, where each element in the vector is a [name,...

Pass or Fail (C++)

Given a vector, where each element in the vector is a [name, grade] pair sort range by name, partition range into pass and fail, preserving alphabetical order within partition. The grades are the number of points earned (600 points earns a passing grade).

std::vector<std::pair<std::string, int>> v {
{"josh", 851},
{"mark", 600},
{"charles", 412},
{"sebnem", 1000},
{"abdol", 905},
{"imen", 300}
};


--------EXPECTED OUTPUT-------------------------------------------------

std::vector<std::pair<std::string, int>> w {
{"abdol", 905},
{"josh", 851},
{"mark", 600},
{"sebnem", 1000}, // Everyone after this point failed
{"charles", 412},
{"imen", 300}
};

Note: NO LOOPS ALLOWED

Thanks!

In: Computer Science

Python 3.7.4: The current calendar, called the Gregorian calendar, was introduced in 1582. Every year divisible...

Python 3.7.4:

The current calendar, called the Gregorian calendar, was introduced in 1582. Every year divisible by four was created to be a leap year, with the exception of the years ending in 00 (that is, those divisible by 100) and not divisible by 400. For ­instance, the years 1600 and 2000 are leap years, but 1700, 1800, and 1900 are not. Write a program that requests a year as input and states whether it is a leap year. We need to run this as many times as the user wants to check for leap years.

Below was marked incorrect for me. I need to put it in a while loop. Also, I'm curious if there is a way to do it without def? Do we have to call main? Sorry for all of the newbie questions. Thank you!

----------------------

def leap(year):
    if(year % 400 == 0):
        return True
    elif year % 100 == 0:
        return False
    elif year%4 == 0:
        return True
    else:
        return False
def main():
    year = int(input("Enter year: "))
    if(leap(year)):
        print(year,"is a leap year")
    else:
        print(year, "is not a leap year")
main()

In: Computer Science

Fibonacci (C++) Generate 1st n fibonacci numbers: std::vector<int> v = {1, 1, 2, 3, 5, 8,...

Fibonacci (C++)

Generate 1st n fibonacci numbers:

std::vector<int> v = {1, 1, 2, 3, 5, 8, 13, 21};
auto w = fibonacci(8);

Note: NO LOOPS ALLOWED

Thanks!

In: Computer Science

For Each question the starter code is listed below Make shure complete in simple Python 1)Write...

For Each question the starter code is listed below Make shure complete in simple Python

1)Write a function that removes all occurrences of a given letter from a string.
def remove_letter(theLetter, theStri


2)Write a function that reverses its string argument.
def reverse(astring):

3)Write a function that implements a substitution cipher. In a substitution cipher one letter is substituted for another to garble the message. For example A -> Q, B -> T, C -> G etc. Your function should take two parameters, the message you want to encrypt, and a string that represents the mapping of the 26 letters in the alphabet. Your function should return a string that is the encrypted version of the message.

def encrypt(message, cipher):

4)Write a function sum_of_squares(xs) that computes the sum of the squares of the numbers in the list xs.
For example, sum_of_squares([2, 3, 4]) should return 4 + 9 + 16 which is 29.
def sum_of_squares(xs):
# your code here


5)Create a list containing 100 random integers between 0 and 1000 (use iteration, append, and the random module). Write a function called average that will take the list as a parameter and return the average. Then print the average out, calling your function.


6)The function sumEven should return the sum of only the even numbers contained in the list, lst.
Example
list_of_nums = [1, 5, 4, 8, 5, 3, 2]
x = sum_evens(list_of_nums)
print(x) #prints 14
The function unique_count returns the number of unique items in its parameter, lst, which is a list.
For example, if given the list [3, 3, 3, 5, 3], unique_count would return 2, because there are only two unique items in the list: 3 and 5.
def unique_count(lst):




In: Computer Science

Q#1 Write a C++ program that reads n integer values and stores them in an array...

Q#1 Write a C++ program that reads n integer values and stores them in an array of maximum 20 integers. Read from the user a valid value of n (n should not exceed 20). After reading the n array elements find the maximum and minimum elements. Q#2 Write a C++ program that reads 10 integer values and stores them in an array. The program should find and display the average of the array elements and how many elements are below the average. Q#3 Write a C++ program to read 10 temperatures in Celsius and to store the temperatures in an array of integers, then it should convert the temperatures to Fahrenheit and store the new values rounded to the nearest integer in another array . The program should display both temperatures in a table form. F = 9/5 x C + 32 where F is temp in Fahrenheit and C temperature in Celsius

In: Computer Science

Write a JAVA program to modify the insert and remove of a binary search tree to...

Write a JAVA program to modify the insert and remove of a binary search tree to become an AVL tree.

In: Computer Science

What is the defining characteristic of a transient server and how does it affect application design?

What is the defining characteristic of a transient server and how does it affect application design?

In: Computer Science

In JAVA, students will create a linked list structure that will be used to support a...

In JAVA, students will create a linked list structure that will be used to support a role playing game. The linked list will represent the main character inventory. The setting is a main character archeologist that is traveling around the jungle in search of an ancient tomb. The user can add items in inventory by priority as they travel around (pickup, buy, find), drop items when their bag is full, and use items (eat, spend, use), view their inventory as a whole or by category, request the number of items in inventory, and request to see values for specific inventory items. The categories for items are food, coins, archeology tools, artifacts, and documents. Each item should have an item number (unique integer value in priority order), category (string or integer), a description (string), and a value (integer). The program will use the linked list structure to allow the user to do the functions mentioned above; add (beginning/end), remove (from end), insert (based on ID number), delete (based on ID number), print inventory, print inventory by category, tell if the inventory is empty, tell how many items are in inventory, tell how many items in each category, and search for an item by name or ID and return its value. The code must validate the user input for valid choices and valid input type and throw exceptions that result in an appropriate message to the user. The code must also throw exceptions for trying to retrieve/print a node from an empty list. Please help ASAP

In: Computer Science

Do you need a laptop for a computer science internship? Or do they provide you with...

Do you need a laptop for a computer science internship? Or do they provide you with everything? Would having your own laptop be preferred? are you allowed to use your own laptop?

In: Computer Science

The following questions relate to implementations of unbounded arrays. Read both parts before answering either of...

The following questions relate to implementations of unbounded arrays. Read both parts before answering either of them.
i. Describe an implementation of an unbounded array that has amortised cost of O(1) on both pushBack and popBack operations. In your description make sure you say how and when the necessary allocations and deallocation operations are performed.

ii. Use amortised analysis to demonstrate that pushBack and popBack can be performed on the structure you described in part (i) above at an amortised cost of O(1).

In: Computer Science