* The course name Ethics in information Technology*
1-Using your research skills, find the meaning of the following terms, which constitute important parts of trustworthy software:
-Security
-Reliability
-Privacy
2-List your references. (You should have at least 3 references)
In: Computer Science
With a technique called randomized encryption. Applying this technique to AES, we need to have an initialization vector (IV). Say we have a message m with 128 bits, show how to encrypt m with secured AES Cipher block chaining CBC mode showing all steps.
In: Computer Science
Write program#1 upload .java file. #1 Write a java program that prompts the user for input using the Scanner class. First to enter their first name. Then prompts the user to enter their last name. Then prompts the user to enter their city. Then prompts the user to enter their state. Then prompts the user to enter their zip code. Concatenate first name and last name into full_name. Using String Class is optional. Use the String Class to replace zip code "0" with "N", replace "7" with "J". Use the String Class to make all the values upper case. Use the String Class to determine the length of full_name. Print on first line full_name and length of full_name. Print all on second line mailing address, including zip_string?
In: Computer Science
Write a SPIM program to find weather two numbers are relatively prime. Two integers are said to be relatively prime if there is no integer greater than one that divides them both. Sample I/O: Enter the first number: 14 Enter the second number: 15 The entered numbers are relatively prime. Sample I/O: Enter the first number: 12 Enter the second number: 15 The entered numbers are not relatively prime.
In: Computer Science
Do the following with OpenSSL:
Use the appropriate command that generates this information and saves it in key.txt file.
In: Computer Science
Internet of Things (IoT).
Please explain IoT (please use a reference).
In: Computer Science
Define a function drawCircle. This function should expect a Turtle object, the coordinates of the circle’s center point, and the circle’s radius as arguments. The function should draw the specified circle. The algorithm should draw the circle’s circumference by turning 3 degrees and moving a given distance 120 times. Calculate the distance moved with the formula 2.0 × π × radius ÷ 120.0.
Define a function main that will draw a circle with the following parameters when the program is run:
In: Computer Science
Create a set of use cases for the following system: A video store (AVS) runs a series of fairly standard video stores. Before a video can be put on the shelf , it must be catalogued and entered into the video database. Every customer must have a valid AVS customer card in order to rent a video. Customers rent videos for 3 days at a time. Every time a customer rents a video the system must ensure that the customer doesn't have any overdue videos. If so the overdue videos must be returned and overdue fee paid before the customer can rent any more videos. Likewise if the customer has returned overdue videos , but has not paid the overdue fee, the fee must be paid before any new videos can be rented. Every morning the store manager prints a report that lists overdue videos, if a video is 2 or more days overdue then the manager calls the customer to remind them to return the video. If a video is returned in damaged condition the manager removes it from the video database and may sometimes charge the customer.
Please help me! CREATE USE CASE DIAGRAM for the situation in exercise F – Use MS Word to draw it using Insert and Shapes menu) – 1p. Consider that for a customer to have a valid video store card the customer must create an account. Also consider that as a step after renting a video (or videos) the customer must pay for the rental(s). The assumption is that a customer pays only using credit card
In: Computer Science
Write a MIPS program that will ask the user to enter two numbers at the console and compute xy
In: Computer Science
9. The protocol that ensures packets of information are transferred to the correct network device.
Question options:
|
routing |
|
|
internet |
|
|
packet |
|
|
transmission control |
| Question 10 | 0 / 1 point |
Which of the following is a disadvantage of a mobile network.
Question options:
|
limited mobility |
|
|
high cost |
|
|
security |
|
|
expanded throughput |
| Question 11 | 0 / 1 point |
The data communication process is described by the following:
Question options:
|
computer-router-medium-router-computer |
|
|
computer-medium-modem-medium-computer |
|
|
computer-modem-medium-modem-computer |
|
|
computer-medium-router-medium-computer |
In: Computer Science
1. A company that wants to send data over the Internet will use an encryption program to ensure data security. All data will be transmitted as four-digit integers. The application should read a four-digit integer entered by the user and encrypt it as follows: Replace each digit with the remainder of the new value divided by 10 by adding 6 to the digit. Then replace the number in the first digit with the third, and the number in the second digit with the fourth. Print the encrypted integer on the screen. Write a separate application where an encrypted four-digit integer is entered and decrypted (reversing the encryption scheme) and finds the original number. 2. Create a class called Employee that contains three instance variables (First Name (String), Last Name (String), Monthly Salary (double)). Create a constructor that initializes these variables. Define set and get methods for each variable. If the monthly salary is not positive, do not set the salary. Create a separate test class called EmployeeTest that will use the Employee class. By running this class, create two employees (Employee object) and print the annual salary of each employee (object). Then set the new salary by giving each employee a 10% raise and display each employee's annual salary on the screen again.
Note: code should be written in Java language.
In: Computer Science
Explain how the software can influence positively on business strategies and what are the main software required in any organization with an example?
In: Computer Science
In the decimal system (base 10), a natural number is represented as a sequence dndn−1 . . . d0 of (decimal) digits, each of which is in the range 0..9. The value of the number is d0 ×100 +d1 ×101 +···+ dn ×10n. Similarly, in the binary system (base 2), a natural number is represented as a sequence bnbn−1 · · · b0 of (binary) digits, each of which is 0 or 1. The value of the number is b0 ×20 +b1 ×21 +···+bn ×2n. For example, the value of the number whose binary representation is 101is: 1×20+0×21+1×22 =1+0+4=5.
Without using any built-in functions for converting numbers, write a function that takes as input the binary representation of a positive integer n and returns its decimal representation.
In: Computer Science
How to find max non-intersecting subset of circles ?
(Given center coordinate and radius of each circle)
Need algorithm that better than O(N2)
In: Computer Science
In.java
Write a program that repeatedly asks the user to enter their
password until they enter the correct one. However, after 5 failed
attempts, the program "locks out" the user. We will show that with
an error message.
Assume the password is HOC2141 (case
sensitive).
Note that there is a special case that is not shown below. To
identify it, think of all possible scenarios of input for this
program.
----------- Sample run 1: Enter your password: Blake Wrong Enter your password: hoc2341 Wrong Enter your password: hoc2141 Wrong Enter your password: HOC2141 Correct! You're in! Bye ----------- Sample run 2: Enter your password: HOC2141 Correct! You're in! Bye ----------- Sample run 3: Enter your password: asdf Wrong Enter your password: ffgdf Wrong Enter your password: asdxcv Wrong Enter your password: 1276 Wrong Enter your password: HOCK Wrong You are locked out! Bye
In: Computer Science