Questions
Discuss the processes involved with security assessments. What types of analysis is performed with this assessment?

Discuss the processes involved with security assessments. What types of analysis is performed with this assessment?

In: Computer Science

Translate the following C program into MIPS assembly language, allocate registers as you need, but document...

  1. Translate the following C program into MIPS assembly language, allocate registers as you need, but document the allocation.

int A[10]; // assume initialized elsewhere

int sum = 0;

int I = 0;

while (i<0) { sum += A[i++]; sum+= 2 ;}

plz do not copy from other answer, thx.

In: Computer Science

What are the major technical reviews and audits affecting software and system, the System Engineering team...

What are the major technical reviews and audits affecting software and system, the System Engineering team is responsible? Discuss any two

No screenshot

In: Computer Science

---------------- Exercise 2: String Permutations ---------------- Create a program that takes a string from the command...

----------------

Exercise 2: String Permutations

----------------

Create a program that takes a string from the command line and prints every permutation of that string. You may assume the string will contain all unique characters. You may print the permutations in any order, as long as you print them all.

----------------

Output:

----------------

$>./prog dog
d
do
dog
dg
dgo
o
od
odg
og
ogd
g
gd
gdo
go
god

----------------

I need help on this exercise that requires recursion only. I need main.cpp, makefile, Executive.cpp, and Executive.h files for this exercise, and I have no idea how to code this recursive exercise. So, will someone help me on this exercise?

In: Computer Science

What potential security problems do you see in the increasing use of e-banking in business? What...

What potential security problems do you see in the increasing use of e-banking in business? What might be done to solve such problems? provide examples. *

In: Computer Science

Assembly language - please post with output Question: Using the AddTwo program from class lecture as...

Assembly language - please post with output

Question:
Using the AddTwo program from class lecture as a reference, write a program that calculates the following expression, using registers: A = (A + B) - (C + D). Assign integer values to the EAX, EBX, ECX, and EDX registers.

In: Computer Science

2. Write a description of Senior Management in an Organization. What are the different roles and...

2. Write a description of Senior Management in an Organization. What are the different roles and responsibilities of senior management?

In: Computer Science

Visual Basic Make a directory and copy some files from desktop to the created directory

Visual Basic

Make a directory and copy some files from desktop to the created directory

In: Computer Science

How do you make a prediction from a decision tree using confusionMatrix function in rstudio?

How do you make a prediction from a decision tree using confusionMatrix function in rstudio?

In: Computer Science

In python and comments your code : Exercise 1 1.Write a function waiting for two matrices...

In python and comments your code :

Exercise 1

1.Write a function waiting for two matrices and returning their addition, −1 if it is not not possible.
2. Write a function associated with a matrix and a scalar and returning the produced matrix.
3. Write a function accompanying an n × m matrix and a vector n and returning the vector produced by each other, −1 if this is not possible.
4. Write a function accompanying two n × m and m × k matrices and returning the product matrix, −1 if this is not possible.
5.Write a function waiting for a vector (column or row) and returning its transpose.

Exercise 2

1.Write a function waiting for a 2 × 2 matrix and calculating its determinant.
2. Write a function waiting for a matrix A of size n × m and two integers i and j and rendering a matrix (n − 1) × (m − 1), copy the matrix A without row i and column j .
3. Write a determining function of a square matrix by expanding on a line.

In: Computer Science

I need a paragraph on what the Gherkin language is. What is it used for? How...

I need a paragraph on what the Gherkin language is. What is it used for? How do we use it? What are the good and bad things about it?

In: Computer Science

A friend of yours is new to computing, and he has learned that you are pursuing...

A friend of yours is new to computing, and he has learned that you are pursuing a CIS degree. He asked you about the meaning of a program, the key differences between the generations of programming, and how the open-source software (OSS) comes into play. How would you answer these questions?

In: Computer Science

c++ The input items are given in one line and each item is separated by white...

c++

The input items are given in one line and each item is separated by white spaces (blank-space and tab).

how can I implement?

and

input:

34 peach 7

output:

number: 34 7

string: peach

How can I separate the numbers and characters that I type at once?

In: Computer Science

Could you please write an article on Software Engineering Trends in about 300 words? Please, also...

Could you please write an article on Software Engineering Trends in about 300 words? Please, also provide appropriate references.

In: Computer Science

Select the item below that best describes a buffer overflow and how is it used against...

Select the item below that best describes a buffer overflow and how is it used against a web server? a. A buffer overflow occurs when more data is sent to an input buffer field than its size. This can be used to overwrite the stack with malicious code and a return pointer to the malicious code. b. A buffer overflow is caused over a network when there is a mismatch in the processing rates between the two entities involved in the communication process. c. A buffer overflow occurs when rows of data are accessed directly in a database table that are larger than the defined row size for the table. d. Most of the time a buffer overflow occurs when a bug is released accidentally in a proprietary operating system.

In: Computer Science