You are going to secure messages sent between A and B,
confidentially is not an issue but
integrity. The number of messages will be high so the algorithm
needs to be computationally
efficient. Describe a solution for this including algorithms to be
used and management of
keys.
Kindly answer this question in the field of Applied Computer
Security
In: Computer Science
Several statements regarding MAC protocols are give below.
Indicate the true statements. All packets are assumed to be of
fixed size and take exactly one unit of time to transmit.
1) In Ethernet protocol, nodes that encountered collision to their
transmissions back off for random amount of times based on their
frame types.
2) In Aloha protocol, nodes transmit when they sense the channel to be idle.
3) In slotted Aloha, a node's transmission is successful if there is no transmission by other nodes in the time unit prior its transmission and in the time unit during its transmission.
4) In Ethernet protocol, a node encountering a busy channel, transmits after the channel is sensed to be idle without using any random backoff.
5) In Aloha protocol, a node's transmission is successful if there is no transmission by other nodes in the time unit prior its transmission and in the time unit during its transmission.
6) In Aloha and slotted Aloha, a node retransmits its frame immediately after encountering collision to keep the channel busy.
7) In Aloha protocol, nodes are assumed to detection collision.
8) Master-slave protocol is useful when there are multiple peer devices that communicate infrequently.
9) In slotted Aloha, nodes begin to transmit only at certain time instances.
10) In Token Ring, loss of the token is a single point of failure.
In: Computer Science
In this programming challenge you are to create two Python programs: randomwrite.py and randomread.py. One program, randomwrite.py, is to write a set of random numbers to a file. The second program, randomread.py, is to read a set of random numbers from a file, counts how many were read, displays the random numbers, and displays the total count of random numbers.
Random Number File Writer (randomwrite.py)
Create a program called randomwrite.py that writes a series of random integers to a file. The program is to request from the user how many random numbers to generate, the lower bound of the random numbers’ range, and the upper bound of the random numbers’ range. Each random integer value is to be on a separate line and is to be in the range of the inputted lower bound through the inputted upper bound. The file that the random numbers are written to is to be called randomnum.txt.
The user input is to be safe from crashes from invalid input. The user must enter a positive number for all required input (quantity of random numbers to generate, the lower bound of the random numbers’ range, and the upper bound of the random numbers’ range). If invalid input is received the user is to be given feedback and provided with the ability to enter a value again. A positive number is not zero and not negative. The program must not crash if an error occurs during a file operation. Use exception handling.
These are the same requirements for this program:
Example:
How many random numbers do you want? 10
What is the lowest the random number should be: 1
What is the highest the random number should be: 10
The random numbers were written to randomnum.txt
Program 2: Random Number File Reader (randomread.py)
Create a program called randomread.py that reads a series of random numbers from a file called randomnum.txt, counts how many there are, displays the random numbers, and displays the count.
The output to the user is to be labeled and nicely formatted. Prior to displaying the random numbers display the string List of random numbers in randomnum.txt: Each random number is to be displayed on a separate line. The count displayed to the user is to be preceded with the string Random number count:.
Example:
List of random numbers in randomnum.txt:
5
45
32
15
Random number count: 4
The program must not crash if an error occurs during a file operation. Use exception handling. For example, if randomread.py is run and there is no randomnum.txt file the program should handle the exception that occurs when attempting to open the file.
In: Computer Science
For this assignment, I'm going to give a series of problem statements and you need to state whether the problem would be more appropriately solved with a linear or logistic regression. You also have to give a short defense of why this is the correct regression for each one (only need a sentence or two for each).
In: Computer Science
ARITHMETIC INSTRUCTIONS
a) ADD with register/memory
ADD r [or] ADD M
b) ADD immediate.
ADI 8 bit data
c) ADD with carry
ADC r [or] ADC M
Exercise 1: Write Assembly Language Program to add any 3 numbers.
Exercise 2: Write Assembly Language Program to add the value 05H with value stored in register C.
In: Computer Science
Consider the situation where entity E1 and E2 are connected by a one-to-one relationship R. Choose all the TWO correct answers from the following list so the chosen answers can describe how to transform E1, E2 and R into a relational schema diagram _________________________.
In: Computer Science
We've now had an introduction to several different models: Linear regression, logistic regression, k-means, hierarchical clustering, GMM, Naive Bayes, and decision trees.
For this assignment, I would like you to choose three models from the above list and describe two problems that each of the models could potentially be used to solve. You can do one big post with all three models and six solvable problems or do three separate posts if you prefer.
Short Explanation of Decision Trees
Decision Trees
In: Computer Science
****NOTE YOU MUST USE SYSTEM CALL I/O, meaning STANDARD I/O IS NOT ALLOWED THIS MEANS THAT YOU CANT USE fopen, fclose , etc
*****You are ONLY ALLOWED TO USE SYSTEM CALL I/O such as read, write, open and close (System I/O functions)
Write a C program using system call I/O to
a) open an existing text file passed to your program as a command-line argument, then
b) display the content of the file,
c) ask the user what information he/she wants to append
d) receive the info from the user via keyboard
e) append the info received in d) to the end of the file
f) display the updated content of the file.
In: Computer Science
Data Structures on Java
Basic Linked List exercises
a. Suppose x is a linked-list node and not the last node on the list.
What is the effect of the following code fragment?
x.next = x.next.next
b. Singly Linked List has two private instance variables first and last as that point to the first and the last nodes in the list, respectively. Write a fragment of code that removes the last node in a linked list whose first node is first. Is there any advantage of keeping the last pointer in a linked list implementation? Explain.
In: Computer Science
BEFORE YOU START: Before working on this assignment you should have completed Assignment 1. PROGRAM STATEMENT AND REQUIREMENTS:
You will implement in Java the WIFI troubleshooting program you created in Assignment 1 with the following additional conditions: At the end of the program, you will ask if the client wants to purchase a regular router for $50 or a super high-speed router for $200, adding the cost to the total amount the client needs to pay. Once your program calculates the final bill amount, it needs to ask if the client is a member of the military. If so, your program should reduce by 10% the total amount the client needs to pay. Finally, your program must print on the screen the final bill amount to pay, together with the amount reduced for a military discount if applicable (e.g. if the total amount for a military client was $220, your program must show something like this: "Your total bill is $198. This includes a $22 military discount").
Note:
Make sure to format all number outputs so only 2 decimals are shown.
Add all necessary comments to your code, including the header comment and body comments explaining your code.
Test your program several times and paste the testing output show in the console as a comment at the bottom of your source code in the driver/main class program file.
Correctly name your classes, methods, and variables.
Suggestion: Add the steps to the flow chart you created in Assignment 1 and use it to help you plan your program. You may include the updated flow chart in your submission, but it is not required.
In: Computer Science
You MUST use VECTORS in this lab. Do NOT use ARRAYS.
Write code in C++ with //comments . Please include a screen shot of the output
Part 1: Largest and Smallest Vector Values
Specifications:
Write a program that generates 10 random integers between 50 and 100 (inclusive) and puts them into a vector. The program should display the largest and smallest values stored in the vector.
Create 3 functions in addition to your main function.
Your main function should call these functions and display the vector, the largest value and the smallest value.
In: Computer Science
In: Computer Science
Miles to Kilometers
ASSIGNMENT:
Write a program to convert miles to kilometers. Put the entire program in a sentinel-controlled loop that runs until the user enters a negative number. Use both a pre-test sentinel-controlled loop and a post-test sentinel-controlled loop in the program.
There are 1.6 kilometers in 1.0 mile. Store the value of 1.6 in a constant and use the constant in the calculations.
There is 1 blank line after the descriptions, and 2 blanks lines between the pre-test and the post-test parts of the program.
Use singular/plural decisions for both miles and kilometers.
There is no validation.
Example Run #1:
(bold type is what is entered by the user)
*** Using a pre-test (while) loop ***
*** This requires the initial prompt and get before the loop,
*** and the loop itself must end with a re-prompt and re-get,
*** but it doesn't require a decision inside the loop.
*************************************************************
Enter the number of miles (enter a negative number to quit):
1.0
1.0 mile is 1.6 kilometers.
Enter the number of miles (enter a negative number to quit):
-1
*** Using a post-test (do) loop ***
*** This requires a decision inside the loop to see
*** if the process and output should be done,
*** but the prompt is only written once.
*************************************************************
Enter the number of miles (enter a negative number to quit):
0.625
0.6 miles is 1.0 kilometer.
Enter the number of miles (enter a negative number to quit):
5.5
5.5 miles is x.x kilometers.
Enter the number of miles (enter a negative number to quit):
-1
The example run shows EXACTLY how your program input and output will look.
C Programming NO FLOATS
In: Computer Science
Draft a Corporate Policy on how patching will be implemented on the Windows Operating Environment. Be sure to include the Servers, Clients, and any associated devices (i.e printers). The policy should be as detailed as possible. Please type it not write it and take a picture, it is hard to read it
In: Computer Science
In: Computer Science