Questions
1. Some Operating systems that were designed with a security mindset are GemSOS, Multics, Scomp There...

1. Some Operating systems that were designed with a security mindset are

  1. GemSOS, Multics, Scomp
  2. There has no such thing
  3. Windows, Mac, Linux
  4. Does, Minx

2. A protection state consists of

  1. Access control matrix
  2. subjects and objects
  3. System boundary and security perimeter
  4. Subjects, objects and the operations that subjects can perform on objects

3. What is the difference between secrecy and integrity?

  1. secrecy is concerned with unauthorized observation of information while integrity is concerned with unauthorized modification of information.
  2. Secrecy protects government classified information while integrity protects corporate information
  3. There is no difference
  4. Secrecy is concerned with unauthorized collection of information while integrity is concerned with unauthorized creation of information

4. Mandatory access control can be applied along with discretionary access and it is meant to do the followings

  1. Build a system for limited purpose
  2. Protect user from accidental modification or leakage of their own data in addition to preventing malicious program from making modification
  3. Build a military system
  4. Build a universally secure system

5. What is Operating System?

  1. The user interface with PC and Mac
  2. Processes and data in a computer system
  3. Software that provides access to various hardware resources in a computer system

6. The three components of referent monitor are

  1. TCB, Operating System, Interfaces
  2. Interface, Authorization module, Policy store
  3. Application, TCB, Security
  4. Interface, Files, Implementation

In: Computer Science

assume a program in unix that have a multiple system calls how to show the list...

assume a program in unix that have a multiple system calls

how to show the list of system calls used in the program?

In: Computer Science

Write a program that repeatedly generates a random integer in the range [1, 100], one integer...

Write a program that repeatedly generates a random integer in the range [1, 100], one integer at a time, and displays the generated numbers on the screen according to the following rules:

  • If the second number generated is greater than the first number, they are displayed on the screen in the order of their input and while the next random number generated is greater than the previous one, the random number is displayed on the screen and the program continues. As soon as the number generated is less than or equal to the previous one, the program terminates. For example, if the first 6 random numbers generated are 1, 5, 32, 68, 89, and 11, the output of the program would be:

1

5

32

68

89

  • If the second number generated is less than the first number, they are displayed on the screen in the order of their input and while the next random number generated is less than the previous one, the random number is displayed on the screen and the program continues. As soon as the number generated is greater than or equal to the previous one, the program terminates. For example, if the first 3 random numbers generated are 45, 31, and 31, the output of the program would be:

45

31

  • If the second number generated is equal to the first number, the program terminates and no message is displayed on the screen.

IN C++ ONLY PLEASE

In: Computer Science

Write a program fragment (not a complete program) which will perform the following task: The int...

Write a program fragment (not a complete program) which will perform the following task:

The int variable m currently contains the number of minutes a basketball player played in their last game.

Use an IF statement(s) to print out an appropriate message based on the following:

If m is from 35 to 48, print the message "very tired"

If m is from 10 to 34, print the message "little tired"

If m is from 1 to 9, print the message "played at least"

If m is 0, print the message "bench warmer"

If m is not in the range from 0 to 48, print the message "invalid data"

In: Computer Science

Language: Python Function name : sort_by_rating Parameters : file (.csv file), category (string), order (boolean) Returns:...

Language: Python

Function name : sort_by_rating
Parameters : file (.csv file), category (string), order (boolean)
Returns: None
Description : You want to see what order the items of a particular category in your file would be in if you sorted them by rating. Given a file, a category of clothing, and an order boolean (True for ascending order, False for descending order), create a function that writes a file called “sorted_items.csv” that includes all of the items in the specified category in sorted order by ranking.
The format of the file should look like this:

item name

rating

item name 1

rating 1

item name 2

rating 2

...

...

(NOTE: there will be a header row at the top of each .csv file)

Note: If your input file contains no items in the specified category, your “sorted_items.csv” file should still be created and have the header row. Also, your written files should end in a new line character
Hint : You can use the built-in Python .sort() method on a list of tuples. The tuples will get sorted by the first item in each tuple. Example:
>>> list_of_tups = [(5, "cats"), (6, "kittens"), (1, "lizards")] >>> list_of_tups.sort()
>>> print(list_of_tups)
[(1, 'lizards'), (5, 'cats'), (6, 'kittens')]

Test cases:

>>> sort_by_rating("uniqlo.csv","tops",True)

In: Computer Science

Build a Max Heap using the following: A= {20, 15, 10, 14, 8, 6, 9}

Build a Max Heap using the following: A= {20, 15, 10, 14, 8, 6, 9}

In: Computer Science

Provide the basic goal of Software Architectural evolution in the software design process. Also, discuss three...

Provide the basic goal of Software Architectural evolution in the software design process. Also, discuss three stages of software development stages where architectural evaluation can be applied.

NO HANDWRITING PLEASE... THANK YOU.

In: Computer Science

Suppose both the sender and receiver are in the same local area network. If the sender...

Suppose both the sender and receiver are in the same local area network. If the sender has the receiver's IP address only, but not the MAC address, how does ARP (Address Resolution Protocol) find out the receiver's MAC address?

In: Computer Science

The following sequence of operations essentially leaves a queue unchanged. Group of answer choices enqueue followed...

The following sequence of operations essentially leaves a queue unchanged.

Group of answer choices

enqueue followed by dequeue

dequeue followed by enqueue

two enqueues followed by two dequeues

two isEmptys followed by two isFulls

A standard linked list provides a good implementation of a "Deque".

Group of answer choices

True

False

The main thread of a Java program cannot generate additional threads.

Group of answer choices

True

False

The text's link-based queue is being used and holds an empty queue. We can say:

Group of answer choices

at this point in time an invocation of the enqueue method would throw an exception.

at this point in time an invocation of the dequeue method would throw an exception.

the value of front is -1.

In: Computer Science

C++ program that runs on Visual Basic that computes the total cost of books you want...

C++ program that runs on Visual Basic that computes the total cost of books you want to order from an online bookstore. It does so by first asking how many books are in your shopping cart and then based on that number, it repeatedly asks you to enter the cost of each item. It then calls two functions: one for computing the taxes and another for computing the delivery charges. The function which computes delivery charges works as follows: It adds a 5% delivery charge for standard delivery if the total is below $1,000, and an additional 10% charge if you want an expedited next day delivery. The tax and delivery charges are added to the bill and the total cost is displayed.

In: Computer Science

•Describe security problems inherent to the TCP/IP protocol suite..

•Describe security problems inherent to the TCP/IP protocol suite..

In: Computer Science

What is the purpose of the XDC file? Simulate the behavioral code Map the I/O from...

  1. What is the purpose of the XDC file?

  1. Simulate the behavioral code
  2. Map the I/O from VHDL to Basys3 Board
  3. Edit the Basys3 Board device type
  4. Run the synthesis

  1. What is the purpose of declaring a “signal”?

  1. Which file contains the list of input combinations used to simulate a circuit in Xilinx Vivado?  

  1. XDC
  2. Design
  3. Testbench

  1. What is the purpose of using ieee.std_logic_unsigned.alL or ieee.std_logic_signed.all in lab4 and lab6 testbench2?

In: Computer Science

Question 4 n Which of the following combine content or functionality from existing web services, websites...

Question 4 n

Which of the following combine content or functionality from existing web services, websites and RSS feeds to serve a new purpose?

Question 4 options:,

Blogs

Mashups

XML

MySQL

Question 5 (1 point)

Which of the following can be used to add location information (longitude, latitude, etc.) to websites, images RSS feeds, Videos and more?

Question 5 options:

RSS

XML

Blogs

Geotagging

Question 6 (1 point)

Which of the following are mini applications designed to run either as stand-alone appliations or as add-on features in web pages?

Question 6 options:

Widgets

XML

RSS

Blogs

Question 7 (1 point)

Which of the following is a 3D virtual world social networking program where users create avatars that they use to meet other users with similar interests, conduct business, participate in group activities, or take classes?

Question 7 options:

Facebook

Three Space

Second Life

Linked In

Question 8 (1 point)

Which of the following provide applications with access to external services and databases?

Question 8 options:

API

XML

Mashups

JavaScript

Question 9 (1 point)

Which of the following is a markup language that allows you to label data based on its meaning?

Question 9 options:

XHTML

CSS

JavaScript

XML

In: Computer Science

Please read carefully. Using the minimum number of digits in 2’s complement notation, perform 25 –...

Please read carefully. Using the minimum number of digits in 2’s complement notation, perform 25 – 18 (subtraction by preserving addition). Show all the significant steps in your work by indicating the starting values, sign conversion and the addition operation aligning all numbers including the carry values in each position using the Courier New font. Indicate the final value as a decimal.

In: Computer Science

What would you do if you encountered a database that violated referential integrity? How would you...

What would you do if you encountered a database that violated referential integrity? How would you address the problem? When forming your answer be sure to include at least one of the three main types of referential actions (cascade, restrict, set null).

In: Computer Science