Questions
Please describe this( Encryption technique -abstract and introduction) below Research paper in your Word ​Abstract In...

Please describe this( Encryption technique -abstract and introduction) below Research paper in your Word

​Abstract

In network communication system, exchange of data mostly occurs on networked computers and devices, mobile phones and other internet based smart electronic gadgets. Importance of network security is increasing day by day for various network and software applications in human life. Many of the human activities are automatic and in future more areas will come as part of networking system. So most of the end-devices will come to the internet and connect, it is important to ensure the security of data being transmitted. The data and network encryption algorithms play a huge role to ensure the security of data in transmission. In this paper, we provide a theoretical overview of various encryption techniques, namely those that range from changes in the position of a letter or word to word transformations and transposition. These not only provide security when sending messages, but also security for passwords that are used to decipher and to encrypt. The conclusions in this study examine the current theoretical framework,
and propose the usage of methods to prevent online security breaches

​ Introduction
Encryption simply means the translation of data blocks into a secret code which is considered the most effective way to ensure data security. To read a secret file one must have access to a secret key that enables to decrypt it. Unsecured data where no encryption algorithms were used travels through different networks are open to many types of attacks and can be read, changed or forged by any attacker who has access to that data or network. To prevent such attacks encryption and decryption techniques are employed. Encryption algorithms are used by many software and network applications, but most of them are not free from cyber-attacks. Now a days encryption techniques uses algorithms with a “key” to encrypt data into digital secret code and then decrypting it by restoring it to its original data. It is important to protect things like biometric information, email data, medical records, corporate information, personal data, legal documents, transactions details from unauthorized access. Encryption techniques uses a fixed length parameter or key for data transformation. There are mainly two types of algorithms used to encrypt data, asymmetric encryption and symmetric encryption. Many research and analysis of different encryption algorithms such as DES, 3DES, AES, Blowfish, Twofish, Serpent, RC2, RC5, are going on which helps to identify the pros and cons of algorithms in various platforms and application areas. Today's most widely used encryption algorithms fall into two categories: symmetric and asymmetric. Symmetric-key ciphers, also referred to as "secret key," use a single key, sometimes referred to as a shared secret because the system doing the encryption must share it with any entity it intends to be able to decrypt the encrypted data. The most widely used symmetric-key cipher is the ​Advanced Encryption Standard (AES​), which was designed to protect government classified information.
Symmetric-key ​encryption is usually much faster than asymmetric encryption, but the sender must exchange the key used to encrypt the data with the recipient before the recipient can perform decryption on the cipher text. The need to securely distribute and manage large numbers of keys means most cryptographic processes use a symmetric algorithm to efficiently encrypt data, but they use an asymmetric algorithm to securely exchange the secret key. All securely transmitted live traffic today is encrypted using symmetric encryption algorithms for example such as live telephone conversation, streaming video transmission, high speed data link. Blowfish, AES, RC4,DES, RC5, and RC6 are examples of symmetric encryption. The most widely used symmetric algorithm is AES-128, AES-192, and AES-256. In asymmetric​ key encryption, different keys are used for encrypting and decrypting a message. Asymmetric cryptography, also known as public key cryptography, uses two different but mathematically linked keys, one public and one private. The public key can be shared with everyone, whereas the private key must be kept secret. The RSA encryption algorithm is the most widely used public key algorithm, partly because both the public and the private keys can encrypt a message; the opposite key from the one used to encrypt a message is used to decrypt it. This Attribute provides a method of assuring not only confidentiality, but also the integrity, authenticity and non reputability of electronic communications and data at rest through the use of digital signatures. Diffie-Hellman, RSA, ECC, ElGamal, DSA. The following are the major asymmetric encryption algorithms used for encrypting or digitally signing data.

In: Computer Science

Question Four: (Word count 300 words) A- Conduct a research for any issue you chose in...

Question Four: (Word count 300 words)
A- Conduct a research for any issue you chose in real life, shortly describe the issue of your choice and explain which type of data will be collected and why? Also apply two of the investigating methods in collecting the data and mention the advantages and disadvantages of the two tools with examples of your chosen issue.
B- Conduct a career audit for yourself whether in your current job or in a future job and apply your personal marketing plan.

In: Operations Management

Pythpn #Exercise 1 #Ask the user for a three letter word using the prompt: three letter...

Pythpn

#Exercise 1
#Ask the user for a three letter word using the prompt: three letter word? (include a space after the ?)
#Display the entire word
#Display the word vertically, one letter at a time using print statements and the string index
#For example, if the user enters baa, the output should be (ignore # signs):
#baa
#b
#a
#a

#Exercise 2
#Ask the user for a number using the prompt: first number? (include a space after the ?)
#Ask the user for a number using the prompt: second number? (include a space after the ?)
#Convert both numbers to integers
#Calculate the product of the two numbers
#Convert the two numbers and the product to strings using the str() function
#Display the following on screen using a print statement and the + concatenator.(note the spacing esp no space before the .)
#The product of [first number] times [second number] is [product].
#For example, if the user entered 2 and 3, the final output should be:
#The product of 2 times 3 is 6.

#Exercise 3
#Ask the user for a first name using the prompt: first name? (include a space after the ?)
#Ask the user for a last name using the prompt: last name? (include a space after the ?)
#Ask the user for a middle inital using the prompt: middle initial? (include a space after the ?)
#Display the user entered full name in the following format [first name] {middle inital]. [last nmae] (note the .)
#For example, if the user entered Malu Roldan H in response to the input statements, the output should be:
#Malu H. Roldan
#Next, display the user's initials one letter at a time vertically. For example, for Malu H. Roldan,
#the output should be (ignore # signs):
#M
#H
#R

#Exercise 4
#Ask the user for a six letter cheer using the prompt: six letter cheer? (include a space after the ?)
#Display the entire cheer with an exclamation point after it (e.g. if user enters boohoo, display boohoo!)
#Display the cheer vertically, one letter at a time ending with an exclamation point in the last line
#For example, for user entry boohoo, display (ignore # signs):
#b
#o
#o
#h
#o
#o
#!

#Exercise 5
#a Ask the user for a birth year using the prompt: birthyear? (include a space after the ?)
#b Convert the user input to an integer
#c Subtract the user entered birthyear from 2019
#d Convert the result of the previous line and the user entry to strings using the str() function
#e Display the following using the + concatenator in a print statement (note the punctuation and spacing):
#f It has been [converted result of line 5c]! years since your birthyear in [converted user entry]!
#g Hence, if user entered 2010, display:
#h It has been 9! years since your birthyear in 2010
#i Next, display the words: You were born in the year:
#j Display the converted user entered birthyear vertically, one digit at a time.
#k For example, for 2010 display (ignore the # signs):
#2
#0
#1
#0

In: Computer Science

Read page 322 in the textbook. Answer the following discussion questions thoroughly. One word or one...

Read page 322 in the textbook.

Answer the following discussion questions thoroughly. One word or one sentence answers are never enough.

10-14    What challenges are managers of health-care organizations facing?

10-15    How would the way health-care organization managers manage be different in a team-based model?

10-16    Explain how roles, norms, status systems, and group cohesiveness might influence the success of a team-based model.

10-17    What are some reasons you think a team-based model has led to improved patient outcomes and reduced costs?

In: Operations Management

Select a research paper topic and develop an abstract. Write 150 word topic proposal for your...

Select a research paper topic and develop an abstract.

Write 150 word topic proposal for your final project.

Your topic needs to focus on a critical challenge in cybersecurity facing National Security Professionals. This challenge can come from technology, policy, international relations, economics, or any of the fields where the digital world brings its effects to bear. Think about recent cybersecurity incidents and events. What research question comes to mind when you think of cybersecurity challenges?

Your topic proposals need to be clear and precise. Use bulleted points to clearly state the topic and address the parameters in at least one or two sentences.

In: Computer Science

Answer the following questions. Please type using a word processing program and bring a printed copy...

Answer the following questions. Please type using a word processing program and bring a printed copy to class. Write as much or as little as you feel necessary to answer each question to the best of your ability. You may use all available resources to complete this case – e.g., lecture slides, notes, your book, and the Accounting Standards Codification. Collaboration with others in your group is allowed to the extent that it is helpful. How you work together is up to you – however, I encourage everyone in the group to take at least some part for every question. Please turn in only one finished assignment for each group. Use appropriate citations where relevant and according to your professional judgment. For questions requiring use of the codification, please use the following style:

1) Cite the ASC down to the Paragraph. For example, (ASC 330-10-05-01)

2) Copy-paste the paragraph you cite from the codification into the word document.

3) Interpret the codification paragraph into ‘plain English’ as best you can. In other words, how would you explain the appropriate accounting treatment to a colleague, boss, or business partner who has a basic understanding of accounting? You may (and are encouraged to) use debits and credits or t-accounts to illustrate the accounting if appropriate.

After a decade or so in mining, you decide to change jobs because you wanted to do nothing with anything related to tax or tax accounting ever again and in a regulated industry, there was too much of this. A few years later, however, the controller comes to you with a comment letter from the SEC which expresses concern about how your company reports its current and deferred income tax accounts in its financial reports. You look as white as a sheet because you hoped to never do tax accounting again. Find and interpret the appropriate ASC guidance for how to initially measure deferred taxes. (You may need to cite more than one ASC paragraph.)

In: Accounting

In an approximately 500-word response, address the following issues/questions: Cash is the lifeblood of any business,...

In an approximately 500-word response, address the following issues/questions:

Cash is the lifeblood of any business, and without it survival is very unlikely.

  • Do you agree or disagree?
  • Explain what information a statement of cash flows provides to supplement a statement of financial position and an income statement.
  • Why is there still some controversy surrounding published statements of cash flows?
  • How important are such statements in terms of the financial reporting requirements within YOUR country?

In: Accounting

unix Delete the second character from every line in a file Delete the last word from...

unix

  1. Delete the second character from every line in a file
  2. Delete the last word from every line in a file.
  3. Swap the first and second letter of every line in a file.
  4. Swap the first and last characters of every line in a file.
  5. For each line that begins with a single space, replace the space with a tab. Lines that begin with 2 or more spaces should not be effected.
  6. Finds dates in the form mm/dd/yy and replaces them with the form mm/dd/20yy. In other words puts 20 in front of a 2 digit year. 4 digit years should not be changed.
  7. Move lines 3 through 5 after line 8 (so the output lines would be in order 1,2,6,7,8,3,4,5,9,10,....)
  8. Given a line with a UNIX path specified, print the base file name only. So for example, "/home/users/james" would print "james"
  9. Given a line with a UNIX path specified, print the directory part only. So for example, "/home/users/james" would print "home/users"

In: Computer Science

WALMART ANALYSIS Prepare a 1250 – 1500 word analysis of Walmart. Your case analysis will need...

WALMART ANALYSIS

Prepare a 1250 – 1500 word analysis of Walmart. Your case analysis will need to examine the following elements (failure to include any of the following will result in a less than satisfactory score):
General Environmental Analysis
Technological Trends
Demographic Trends
Economic Trends
Political/Legal Trends
Sociocultural Trends
Global Trends
Physical Environment Trends
Industry Analysis (External)
Competitor Analysis (External)
Internal Analysis
SWOT
Strategy Formulation
Strategic Action Plan
The goal is to place yourself in an executive leadership role within the organization described in the case. In that role, you are responsible for aiding in the development of a long-term strategic plan for the company. Thus, the need to examine all of the elements described above. The case study will highlight some important points regarding the organization’s operating structure, strengths, and/or competitive challenges. The purpose of your analysis is to develop a strategy to guarantee long-term, sustainable, growth, competitive advantage, and sustainability. This will require some additional research in the academic database for supporting materials.

In: Operations Management

== Match the vocabulary word to its definition. Question 4 options: Tube carrying urine from the...

==

Match the vocabulary word to its definition.

Question 4 options:

Tube carrying urine from the renal pelvis of the kidney to the bladder.

Also known as vasopressin

A blood constituent that is excreted in the urine only when its plasma concentration exceeds a certain value.

Converts angiotensinogen into andiotensin and results in the secretion of aldosterone.

5

Fixed urine specific gravity of 1.010.

Urine with a consistently high specific gravity.

a solution that has passed under pressure through the semipermeable membrane.

Urine with a consistently low specific gravity

Increases blood pressure by stimulating vascular smooth muscle cell contraction.

Area of the kidney that collects urine from the calyces and conveys the urine to the ureters.

1.

Angiotensin II

2.

Antidiuretic Hormone

3.

Hypersthenuria

4.

Hyposthenuria

5.

Isosethenuria

6.

Renal pelvis

7.

Renin

8.

Ultrafiltrate

9.

Ureter

10.

Threshold substance

Put the following in the order they occur in making urine

Question 3 options:

1

counter current process

2

reabsorption of water in the collecting duct due to ADH

3

glomerular filtration

4

blood flow to the glomerulus

In: Biology