Questions
Digital Forensics In detail, explain the Window’s registry. Describe its structure, its purpose, and how forensic...

Digital Forensics

In detail, explain the Window’s registry. Describe its structure, its purpose, and how forensic examiners can use it in a case. In addition, describe what metadata is and how it relates to digital forensics.

In: Computer Science

PLEASE USE PYTHON CODE 2. Find the smallest positive (real) root of x^3-3.23x^2-5.54x+9.84 = 0 by...

PLEASE USE PYTHON CODE

2. Find the smallest positive (real) root of x^3-3.23x^2-5.54x+9.84 = 0 by the method of bisection

In: Computer Science

Consider two languages A and B where A is a context free language and B is...

Consider two languages A and B where A is a context free language and B is a regular language. Show that the set difference, A-B, must also be context free.

Also show that B-A may not be context free

In: Computer Science

* The course name Ethics in information Technology* 1-Using your research skills, find the meaning of...

* The course name Ethics in information Technology*

1-Using your research skills, find the meaning of the following terms, which constitute important parts of trustworthy software:

-Security

-Reliability

-Privacy

2-List your references. (You should have at least 3 references)

In: Computer Science

With a technique called randomized encryption. Applying this technique to AES, we need to have an...

With a technique called randomized encryption. Applying this technique to AES, we need to have an initialization vector (IV). Say we have a message m with 128 bits, show how to encrypt m with secured AES Cipher block chaining CBC mode showing all steps.

In: Computer Science

Write program#1 upload .java file. #1 Write a java program that prompts the user for input...

Write program#1 upload .java file. #1 Write a java program that prompts the user for input using the Scanner class. First to enter their first name. Then prompts the user to enter their last name. Then prompts the user to enter their city. Then prompts the user to enter their state. Then prompts the user to enter their zip code. Concatenate first name and last name into full_name. Using String Class is optional. Use the String Class to replace zip code "0" with "N", replace "7" with "J". Use the String Class to make all the values upper case. Use the String Class to determine the length of full_name. Print on first line full_name and length of full_name. Print all on second line mailing address, including zip_string?

In: Computer Science

Write a SPIM program to find weather two numbers are relatively prime. Two integers are said...

Write a SPIM program to find weather two numbers are relatively prime. Two integers are said to be relatively prime if there is no integer greater than one that divides them both. Sample I/O: Enter the first number: 14 Enter the second number: 15 The entered numbers are relatively prime. Sample I/O: Enter the first number: 12 Enter the second number: 15 The entered numbers are not relatively prime.

In: Computer Science

Do the following with OpenSSL: Create a 2048 bit RSA private key. Convert this private key...

Do the following with OpenSSL:

  1. Create a 2048 bit RSA private key.
  2. Convert this private key into a text format so it shows the following information:
  • modulus
  • public exponent (e)
  • private exponent (d)
  • the primes (p and q)

Use the appropriate command that generates this information and saves it in key.txt file.

  1. Save the message "Hello from (your UID)" in a plaintext file message.txt. Using openssl's rsautl option to sign this message with your private key (key.txt). Save this signed message as the file signed.txt. Use this link for reference.
  2. Using openssl's rsautl option encrypt the message.txt file using your private key generated in Step#1 above. Save the encrypted message as encrypted.txt.
  3. Assemble all the files of key.txt, signed.txt, message.txt and encrypted.txt and all procedure screenshots of above work into a single file to upload for submission.

In: Computer Science

Internet of Things (IoT). Please explain IoT (please use a reference).

Internet of Things (IoT).

Please explain IoT (please use a reference).

In: Computer Science

Define a function drawCircle. This function should expect a Turtle object, the coordinates of the circle’s...

Define a function drawCircle. This function should expect a Turtle object, the coordinates of the circle’s center point, and the circle’s radius as arguments. The function should draw the specified circle. The algorithm should draw the circle’s circumference by turning 3 degrees and moving a given distance 120 times. Calculate the distance moved with the formula 2.0 × π × radius ÷ 120.0.

Define a function main that will draw a circle with the following parameters when the program is run:

  • X = 50
  • Y = 75
  • Radius = 100

In: Computer Science

Create a set of use cases for the following system: A video store (AVS) runs a...

Create a set of use cases for the following system: A video store (AVS) runs a series of fairly standard video stores. Before a video can be put on the shelf , it must be catalogued and entered into the video database. Every customer must have a valid AVS customer card in order to rent a video. Customers rent videos for 3 days at a time. Every time a customer rents a video the system must ensure that the customer doesn't have any overdue videos. If so the overdue videos must be returned and overdue fee paid before the customer can rent any more videos. Likewise if the customer has returned overdue videos , but has not paid the overdue fee, the fee must be paid before any new videos can be rented. Every morning the store manager prints a report that lists overdue videos, if a video is 2 or more days overdue then the manager calls the customer to remind them to return the video. If a video is returned in damaged condition the manager removes it from the video database and may sometimes charge the customer.

Please help me! CREATE USE CASE DIAGRAM for the situation in exercise F – Use MS Word to draw it using Insert and Shapes menu) – 1p. Consider that for a customer to have a valid video store card the customer must create an account. Also consider that as a step after renting a video (or videos) the customer must pay for the rental(s). The assumption is that a customer pays only using credit card

In: Computer Science

Write a MIPS program that will ask the user to enter two numbers at the console...

Write a MIPS program that will ask the user to enter two numbers at the console and compute xy

In: Computer Science

9. The protocol that ensures packets of information are transferred to the correct network device. Question...

9. The protocol that ensures packets of information are transferred to the correct network device.

Question options:

routing

internet

packet

transmission control

Question 10 0 / 1 point

Which of the following is a disadvantage of a mobile network.

Question options:

limited mobility

high cost

security

expanded throughput

Question 11 0 / 1 point

The data communication process is described by the following:

Question options:

computer-router-medium-router-computer

computer-medium-modem-medium-computer

computer-modem-medium-modem-computer

computer-medium-router-medium-computer

In: Computer Science

1. A company that wants to send data over the Internet will use an encryption program...

1. A company that wants to send data over the Internet will use an encryption program to ensure data security. All data will be transmitted as four-digit integers. The application should read a four-digit integer entered by the user and encrypt it as follows:  Replace each digit with the remainder of the new value divided by 10 by adding 6 to the digit. Then replace the number in the first digit with the third, and the number in the second digit with the fourth. Print the encrypted integer on the screen.  Write a separate application where an encrypted four-digit integer is entered and decrypted (reversing the encryption scheme) and finds the original number. 2. Create a class called Employee that contains three instance variables (First Name (String), Last Name (String), Monthly Salary (double)). Create a constructor that initializes these variables. Define set and get methods for each variable. If the monthly salary is not positive, do not set the salary. Create a separate test class called EmployeeTest that will use the Employee class. By running this class, create two employees (Employee object) and print the annual salary of each employee (object). Then set the new salary by giving each employee a 10% raise and display each employee's annual salary on the screen again.

Note: code should be written in Java language.

In: Computer Science

Explain how the software can influence positively on business strategies and what are the main software...

Explain how the software can influence positively on business strategies and what are the main software required in any organization with an example?

In: Computer Science