Questions
You are going to secure messages sent between A and B, confidentially is not an issue...

You are going to secure messages sent between A and B, confidentially is not an issue but
integrity. The number of messages will be high so the algorithm needs to be computationally
efficient. Describe a solution for this including algorithms to be used and management of
keys.
Kindly answer this question in the field of Applied Computer Security

In: Computer Science

Several statements regarding MAC protocols are give below. Indicate the true statements. All packets are assumed...

Several statements regarding MAC protocols are give below. Indicate the true statements. All packets are assumed to be of fixed size and take exactly one unit of time to transmit.
  
1) In Ethernet protocol, nodes that encountered collision to their transmissions back off for random amount of times based on their frame types.

2) In Aloha protocol, nodes transmit when they sense the channel to be idle.

3) In slotted Aloha, a node's transmission is successful if there is no transmission by other nodes in the time unit prior its transmission and in the time unit during its transmission.

4) In Ethernet protocol, a node encountering a busy channel, transmits after the channel is sensed to be idle without using any random backoff.

5) In Aloha protocol, a node's transmission is successful if there is no transmission by other nodes in the time unit prior its transmission and in the time unit during its transmission.

6) In Aloha and slotted Aloha, a node retransmits its frame immediately after encountering collision to keep the channel busy.

7) In Aloha protocol, nodes are assumed to detection collision.

8) Master-slave protocol is useful when there are multiple peer devices that communicate infrequently.

9) In slotted Aloha, nodes begin to transmit only at certain time instances.

10) In Token Ring, loss of the token is a single point of failure.

In: Computer Science

In this programming challenge you are to create two Python programs: randomwrite.py and randomread.py. One program,...

In this programming challenge you are to create two Python programs: randomwrite.py and randomread.py. One program, randomwrite.py, is to write a set of random numbers to a file. The second program, randomread.py, is to read a set of random numbers from a file, counts how many were read, displays the random numbers, and displays the total count of random numbers.

Random Number File Writer (randomwrite.py)

Create a program called randomwrite.py that writes a series of random integers to a file. The program is to request from the user how many random numbers to generate, the lower bound of the random numbers’ range, and the upper bound of the random numbers’ range. Each random integer value is to be on a separate line and is to be in the range of the inputted lower bound through the inputted upper bound. The file that the random numbers are written to is to be called randomnum.txt.

The user input is to be safe from crashes from invalid input. The user must enter a positive number for all required input (quantity of random numbers to generate, the lower bound of the random numbers’ range, and the upper bound of the random numbers’ range). If invalid input is received the user is to be given feedback and provided with the ability to enter a value again. A positive number is not zero and not negative. The program must not crash if an error occurs during a file operation. Use exception handling.

These are the same requirements for this program:

  • The program should accept user input for the quantity of random numbers to generate.
  • The inputted number should be a positive integer.
  • The program should accept user input for the lower bound of the random numbers’ range.
  • The inputted number should be positive integer.
  • The program should accept user input for the upper bound of the random numbers’ range.
  • The inputted number should be positive integer.
  • User input may not cause the program to crash. Exceptions from invalid user input must be handled gracefully. The user is to be given feedback about invalid input and given the opportunity to supply the input without needing to run the program again.
  • The program should generate the user supplied amount of random integer numbers between the user supplied lower and upper bound range.
  • The random integers should be written to a file called called randomnum.txt with each random integer being on a separate line.

Example:

How many random numbers do you want? 10
What is the lowest the random number should be: 1
What is the highest the random number should be: 10
The random numbers were written to randomnum.txt

Program 2: Random Number File Reader (randomread.py)

Create a program called randomread.py that reads a series of random numbers from a file called randomnum.txt, counts how many there are, displays the random numbers, and displays the count.

The output to the user is to be labeled and nicely formatted. Prior to displaying the random numbers display the string List of random numbers in randomnum.txt: Each random number is to be displayed on a separate line. The count displayed to the user is to be preceded with the string Random number count:.

Example:

List of random numbers in randomnum.txt:
5
45
32
15

Random number count: 4

The program must not crash if an error occurs during a file operation. Use exception handling. For example, if randomread.py is run and there is no randomnum.txt file the program should handle the exception that occurs when attempting to open the file.

In: Computer Science

For this assignment, I'm going to give a series of problem statements and you need to...

For this assignment, I'm going to give a series of problem statements and you need to state whether the problem would be more appropriately solved with a linear or logistic regression. You also have to give a short defense of why this is the correct regression for each one (only need a sentence or two for each).

  1. I have a dataset of soil sample attributes (acidity, density, clay content, etc.) and whether Kentucky bluegrass successfully grew in the soil. I want to know if I will be able to grow it in my yard.
  2. I have a dataset of highway speed limits and the amount of fatal accidents that happen on those highways annually. I'd like to know how many lives I could save if I lowered the speed limit by 5 MPH.
  3. I've been doing testing on my website, trying to determine how much I can charge for my widgets by changing the price several times and tracking whether users buy the product. I want to know the odds someone will buy my widgets if the price is $45.
  4. I've been tracking (and varying) my daily calorie intake and tracking weight change. I'd like to know how much weight I would expect to lose if I decreased my intake by 500 calories/day.
  5. I have a dataset I created around my lemonade stand that I use to supplement my income. I've been tracking weather and temperature and how many glassed of lemonade I sold that day. Now I want to determine how many glasses I should be prepared to sell each day this week by looking at the weather report.

In: Computer Science

ARITHMETIC INSTRUCTIONS a) ADD with register/memory       ADD r [or] ADD M b) ADD immediate.      ...

ARITHMETIC INSTRUCTIONS

a) ADD with register/memory

      ADD r [or] ADD M

b) ADD immediate.

      ADI 8 bit data

c) ADD with carry

      ADC r [or] ADC M

Exercise 1: Write Assembly Language Program to add any 3 numbers.

Exercise 2: Write Assembly Language Program to add the value 05H with value stored in register C.

In: Computer Science

Consider the situation where entity E1 and E2 are connected by a one-to-one relationship R. Choose...

Consider the situation where entity E1 and E2 are connected by a one-to-one relationship R. Choose all the TWO correct answers from the following list so the chosen answers can describe how to transform E1, E2 and R into a relational schema diagram _________________________.

  1. create a table T1 for E1 and create a table T2 for E2.
  2. create a table T for either E1 or E2, but no need to create two tables as described in answer (a).
  3. create only one table T12 which contains both E1 and E2.
  4. create a table TR for R to describe the one-to-one relationship between E1 and E2.
  5. no need to create a table for R, but have to append a foreign key in T1 which points to T2.
  6. no need to create a table for R, but have to append a foreign key in T2 which points to T1.
  7. no need to create a table for R, but have to append a foreign key in both T1 and T2, which points to each other.
  8. no need to create a table for R, and a foreign key can be appended into either T1 or T2.
  9. no need to create a table for R, but where to append the foreign key depends on the details of the one-to-one relationship.

In: Computer Science

We've now had an introduction to several different models: Linear regression, logistic regression, k-means, hierarchical clustering,...

We've now had an introduction to several different models: Linear regression, logistic regression, k-means, hierarchical clustering, GMM, Naive Bayes, and decision trees.

For this assignment, I would like you to choose three models from the above list and describe two problems that each of the models could potentially be used to solve. You can do one big post with all three models and six solvable problems or do three separate posts if you prefer.  

Short Explanation of Decision Trees

Decision Trees

In: Computer Science

****NOTE YOU MUST USE SYSTEM CALL I/O, meaning STANDARD I/O IS NOT ALLOWED THIS MEANS THAT...

****NOTE YOU MUST USE SYSTEM CALL I/O, meaning STANDARD I/O IS NOT ALLOWED THIS MEANS THAT YOU CANT USE fopen, fclose , etc

*****You are ONLY ALLOWED TO USE SYSTEM CALL I/O such as read, write, open and close (System I/O functions)

Write a C program using system call I/O to

a) open an existing text file passed to your program as a command-line argument, then

b) display the content of the file,

c) ask the user what information he/she wants to append

d) receive the info from the user via keyboard

e) append the info received in d) to the end of the file

f) display the updated content of the file.

In: Computer Science

Data Structures on Java Basic Linked List exercises a. Suppose x is a linked-list node and...

Data Structures on Java

Basic Linked List exercises

a. Suppose x is a linked-list node and not the last node on the list.

What is the effect of the following code fragment?

x.next = x.next.next

b. Singly Linked List has two private instance variables first and last as that point to the first and the last nodes in the list, respectively. Write a fragment of code that removes the last node in a linked list whose first node is first. Is there any advantage of keeping the last pointer in a linked list implementation? Explain.

In: Computer Science

BEFORE YOU START: Before working on this assignment you should have completed Assignment 1. PROGRAM STATEMENT...

BEFORE YOU START: Before working on this assignment you should have completed Assignment 1. PROGRAM STATEMENT AND REQUIREMENTS:

You will implement in Java the WIFI troubleshooting program you created in Assignment 1 with the following additional conditions: At the end of the program, you will ask if the client wants to purchase a regular router for $50 or a super high-speed router for $200, adding the cost to the total amount the client needs to pay. Once your program calculates the final bill amount, it needs to ask if the client is a member of the military. If so, your program should reduce by 10% the total amount the client needs to pay. Finally, your program must print on the screen the final bill amount to pay, together with the amount reduced for a military discount if applicable (e.g. if the total amount for a military client was $220, your program must show something like this: "Your total bill is $198. This includes a $22 military discount").

Note:

Make sure to format all number outputs so only 2 decimals are shown.

Add all necessary comments to your code, including the header comment and body comments explaining your code.

Test your program several times and paste the testing output show in the console as a comment at the bottom of your source code in the driver/main class program file.

Correctly name your classes, methods, and variables.

Suggestion: Add the steps to the flow chart you created in Assignment 1 and use it to help you plan your program. You may include the updated flow chart in your submission, but it is not required.

In: Computer Science

You MUST use VECTORS in this lab. Do NOT use ARRAYS. Write code in C++ with...

You MUST use VECTORS in this lab. Do NOT use ARRAYS.

Write code in C++ with //comments . Please include a screen shot of the output

Part 1: Largest and Smallest Vector Values

Specifications:

Write a program that generates 10 random integers between 50 and 100 (inclusive) and puts them into a vector. The program should display the largest and smallest values stored in the vector.

Create 3 functions in addition to your main function.

  • One function should generate the random numbers and store them in the vector.
  • A second function should find the largest number in the vector.
  • The third function should find the smallest number in the vector.

Your main function should call these functions and display the vector, the largest value and the smallest value.

In: Computer Science

Consider a hierarchy where a savings account is a type of account. Which type of hierarchy...

  1. Consider a hierarchy where a savings account is a type of account. Which type of hierarchy is it? If a system contains this hierarchy and the system includes information only about your savings account, how many objects are there in the system?

In: Computer Science

Miles to Kilometers ASSIGNMENT: Write a program to convert miles to kilometers. Put the entire program...

Miles to Kilometers

ASSIGNMENT:

Write a program to convert miles to kilometers. Put the entire program in a sentinel-controlled loop that runs until the user enters a negative number. Use both a pre-test sentinel-controlled loop and a post-test sentinel-controlled loop in the program.

There are 1.6 kilometers in 1.0 mile. Store the value of 1.6 in a constant and use the constant in the calculations.

There is 1 blank line after the descriptions, and 2 blanks lines between the pre-test and the post-test parts of the program.

Use singular/plural decisions for both miles and kilometers.

There is no validation.

Example Run #1:
(bold type is what is entered by the user)

*** Using a pre-test (while) loop ***
*** This requires the initial prompt and get before the loop,
*** and the loop itself must end with a re-prompt and re-get,
*** but it doesn't require a decision inside the loop.
*************************************************************

Enter the number of miles (enter a negative number to quit): 1.0
1.0 mile is 1.6 kilometers.
Enter the number of miles (enter a negative number to quit): -1

*** Using a post-test (do) loop ***
*** This requires a decision inside the loop to see
*** if the process and output should be done,
*** but the prompt is only written once.
*************************************************************

Enter the number of miles (enter a negative number to quit): 0.625
0.6 miles is 1.0 kilometer.
Enter the number of miles (enter a negative number to quit): 5.5
5.5 miles is x.x kilometers.
Enter the number of miles (enter a negative number to quit): -1

The example run shows EXACTLY how your program input and output will look.

C Programming NO FLOATS

In: Computer Science

Draft a Corporate Policy on how patching will be implemented on the Windows Operating Environment. Be...

Draft a Corporate Policy on how patching will be implemented on the Windows Operating Environment. Be sure to include the Servers, Clients, and any associated devices (i.e printers). The policy should be as detailed as possible. Please type it not write it and take a picture, it is hard to read it

In: Computer Science

Assume that the Student class is part of a generalization/specialization hierarchy, with University Person as a...

  1. Assume that the Student class is part of a generalization/specialization hierarchy, with University Person as a general class. What attributes would Student inherit from University Person? What are attributes are unique to the Student class, which all University Persons would not have?

In: Computer Science