Questions
* The course name Ethics in information Technology* 1-Using your research skills, find the meaning of...

* The course name Ethics in information Technology*

1-Using your research skills, find the meaning of the following terms, which constitute important parts of trustworthy software:

-Security

-Reliability

-Privacy

2-List your references. (You should have at least 3 references)

In: Computer Science

With a technique called randomized encryption. Applying this technique to AES, we need to have an...

With a technique called randomized encryption. Applying this technique to AES, we need to have an initialization vector (IV). Say we have a message m with 128 bits, show how to encrypt m with secured AES Cipher block chaining CBC mode showing all steps.

In: Computer Science

Write program#1 upload .java file. #1 Write a java program that prompts the user for input...

Write program#1 upload .java file. #1 Write a java program that prompts the user for input using the Scanner class. First to enter their first name. Then prompts the user to enter their last name. Then prompts the user to enter their city. Then prompts the user to enter their state. Then prompts the user to enter their zip code. Concatenate first name and last name into full_name. Using String Class is optional. Use the String Class to replace zip code "0" with "N", replace "7" with "J". Use the String Class to make all the values upper case. Use the String Class to determine the length of full_name. Print on first line full_name and length of full_name. Print all on second line mailing address, including zip_string?

In: Computer Science

Write a SPIM program to find weather two numbers are relatively prime. Two integers are said...

Write a SPIM program to find weather two numbers are relatively prime. Two integers are said to be relatively prime if there is no integer greater than one that divides them both. Sample I/O: Enter the first number: 14 Enter the second number: 15 The entered numbers are relatively prime. Sample I/O: Enter the first number: 12 Enter the second number: 15 The entered numbers are not relatively prime.

In: Computer Science

Do the following with OpenSSL: Create a 2048 bit RSA private key. Convert this private key...

Do the following with OpenSSL:

  1. Create a 2048 bit RSA private key.
  2. Convert this private key into a text format so it shows the following information:
  • modulus
  • public exponent (e)
  • private exponent (d)
  • the primes (p and q)

Use the appropriate command that generates this information and saves it in key.txt file.

  1. Save the message "Hello from (your UID)" in a plaintext file message.txt. Using openssl's rsautl option to sign this message with your private key (key.txt). Save this signed message as the file signed.txt. Use this link for reference.
  2. Using openssl's rsautl option encrypt the message.txt file using your private key generated in Step#1 above. Save the encrypted message as encrypted.txt.
  3. Assemble all the files of key.txt, signed.txt, message.txt and encrypted.txt and all procedure screenshots of above work into a single file to upload for submission.

In: Computer Science

Internet of Things (IoT). Please explain IoT (please use a reference).

Internet of Things (IoT).

Please explain IoT (please use a reference).

In: Computer Science

Define a function drawCircle. This function should expect a Turtle object, the coordinates of the circle’s...

Define a function drawCircle. This function should expect a Turtle object, the coordinates of the circle’s center point, and the circle’s radius as arguments. The function should draw the specified circle. The algorithm should draw the circle’s circumference by turning 3 degrees and moving a given distance 120 times. Calculate the distance moved with the formula 2.0 × π × radius ÷ 120.0.

Define a function main that will draw a circle with the following parameters when the program is run:

  • X = 50
  • Y = 75
  • Radius = 100

In: Computer Science

Create a set of use cases for the following system: A video store (AVS) runs a...

Create a set of use cases for the following system: A video store (AVS) runs a series of fairly standard video stores. Before a video can be put on the shelf , it must be catalogued and entered into the video database. Every customer must have a valid AVS customer card in order to rent a video. Customers rent videos for 3 days at a time. Every time a customer rents a video the system must ensure that the customer doesn't have any overdue videos. If so the overdue videos must be returned and overdue fee paid before the customer can rent any more videos. Likewise if the customer has returned overdue videos , but has not paid the overdue fee, the fee must be paid before any new videos can be rented. Every morning the store manager prints a report that lists overdue videos, if a video is 2 or more days overdue then the manager calls the customer to remind them to return the video. If a video is returned in damaged condition the manager removes it from the video database and may sometimes charge the customer.

Please help me! CREATE USE CASE DIAGRAM for the situation in exercise F – Use MS Word to draw it using Insert and Shapes menu) – 1p. Consider that for a customer to have a valid video store card the customer must create an account. Also consider that as a step after renting a video (or videos) the customer must pay for the rental(s). The assumption is that a customer pays only using credit card

In: Computer Science

Write a MIPS program that will ask the user to enter two numbers at the console...

Write a MIPS program that will ask the user to enter two numbers at the console and compute xy

In: Computer Science

9. The protocol that ensures packets of information are transferred to the correct network device. Question...

9. The protocol that ensures packets of information are transferred to the correct network device.

Question options:

routing

internet

packet

transmission control

Question 10 0 / 1 point

Which of the following is a disadvantage of a mobile network.

Question options:

limited mobility

high cost

security

expanded throughput

Question 11 0 / 1 point

The data communication process is described by the following:

Question options:

computer-router-medium-router-computer

computer-medium-modem-medium-computer

computer-modem-medium-modem-computer

computer-medium-router-medium-computer

In: Computer Science

1. A company that wants to send data over the Internet will use an encryption program...

1. A company that wants to send data over the Internet will use an encryption program to ensure data security. All data will be transmitted as four-digit integers. The application should read a four-digit integer entered by the user and encrypt it as follows:  Replace each digit with the remainder of the new value divided by 10 by adding 6 to the digit. Then replace the number in the first digit with the third, and the number in the second digit with the fourth. Print the encrypted integer on the screen.  Write a separate application where an encrypted four-digit integer is entered and decrypted (reversing the encryption scheme) and finds the original number. 2. Create a class called Employee that contains three instance variables (First Name (String), Last Name (String), Monthly Salary (double)). Create a constructor that initializes these variables. Define set and get methods for each variable. If the monthly salary is not positive, do not set the salary. Create a separate test class called EmployeeTest that will use the Employee class. By running this class, create two employees (Employee object) and print the annual salary of each employee (object). Then set the new salary by giving each employee a 10% raise and display each employee's annual salary on the screen again.

Note: code should be written in Java language.

In: Computer Science

Explain how the software can influence positively on business strategies and what are the main software...

Explain how the software can influence positively on business strategies and what are the main software required in any organization with an example?

In: Computer Science

In the decimal system (base 10), a natural number is represented as a sequence dndn−1 ....

In the decimal system (base 10), a natural number is represented as a sequence dndn−1 . . . d0 of (decimal) digits, each of which is in the range 0..9. The value of the number is d0 ×100 +d1 ×101 +···+ dn ×10n. Similarly, in the binary system (base 2), a natural number is represented as a sequence bnbn−1 · · · b0 of (binary) digits, each of which is 0 or 1. The value of the number is b0 ×20 +b1 ×21 +···+bn ×2n. For example, the value of the number whose binary representation is 101is: 1×20+0×21+1×22 =1+0+4=5.

Without using any built-in functions for converting numbers, write a function that takes as input the binary representation of a positive integer n and returns its decimal representation.

In: Computer Science

How to find max non-intersecting subset of circles ? (Given center coordinate and radius of each...

How to find max non-intersecting subset of circles ?
(Given center coordinate and radius of each circle)
Need algorithm that better than O(N2)

In: Computer Science

In.java Write a program that repeatedly asks the user to enter their password until they enter...

In.java

Write a program that repeatedly asks the user to enter their password until they enter the correct one. However, after 5 failed attempts, the program "locks out" the user. We will show that with an error message.
Assume the password is HOC2141 (case sensitive).
Note that there is a special case that is not shown below. To identify it, think of all possible scenarios of input for this program.

----------- Sample run 1:
Enter your password: Blake
Wrong
Enter your password: hoc2341
Wrong
Enter your password: hoc2141
Wrong
Enter your password: HOC2141
Correct! You're in!
Bye 

----------- Sample run 2:
Enter your password: HOC2141
Correct! You're in!
Bye
 
----------- Sample run 3:
Enter your password: asdf
Wrong
Enter your password: ffgdf
Wrong
Enter your password: asdxcv
Wrong
Enter your password: 1276
Wrong
Enter your password: HOCK
Wrong
You are locked out!
Bye
 

In: Computer Science