- Students must develop the code required to create a square two-dimensional array just large enough to store a given string in encrypted form using the given encryption algorithm. The character used after the end of the encrypted string is the ASCII delete key, set as final UNPRINTABLE_CHAR_VALUE. After this value is stored, the encryption process fills the remaining elements with random values
- Students must develop the code to decrypt a given square two-dimensional array and using the given encryption algorithm
- Students must develop other supporting methods as specified (below) to manage the encryption operations*
- Students will also document all classes and methods using the Javadoc commenting process; comments are not required to be exactly the same as found in the supporting document (below) but they should be semantically equivalent
- Students will upload the EncryptionClass.java file to this assignment; any other uploaded files will result in a reduction of the project grade, and in some cases, may cause a complete loss of credit
- Assignment Specification (Javadoc output for the project):
p1_package
Class EncryptionClass
FileIoToolsForEncryptionClass.java
import
java.io.FileNotFoundException;
import java.io.FileReader;
import java.io.FileWriter;
import java.io.IOException;
public class
EncryptionClass
{/**
* Constant for maximum input char
limit
*/
private final int MAX_INPUT_CHARS = 256;
/**
* Constant for unprintable char value used
as message end char
*/
private final int UNPRINTABLE_CHAR_VALUE = 127;
// ASCII for delete key
/**
* Constant for minus sign used in
getAnInt
*/
private final char MINUS_SIGN = '-';
/**
* Class Global FileReader variable so
methods can be used
*/
private FileReader fileIn;
/**
* Downloads encrypted data to file
* <p>
* Note: No action taken if array is
empty
* @param fileName String object holding
file name to use
*/
void downloadData( String fileName )
{FileWriter
toFile;
int rowIndex, colIndex;
if( arrSide > 0
)
{
try
{
toFile = new FileWriter( fileName );
toFile.write( "" + arrSide + "\r\n" );
for( rowIndex = 0; rowIndex < arrSide; rowIndex++ )
{
for( colIndex = 0; colIndex < arrSide; colIndex++ )
{
if( encryptedArr[ rowIndex ][ colIndex ] < 100 )
{
toFile.write( "0" );
}
toFile.write(" "+ encryptedArr[ rowIndex ][ colIndex ] + " "
);
}
toFile.write( "\r\n" );
}
toFile.flush();
toFile.close();
}
catch( IOException ioe )
{
ioe.printStackTrace();
}
}
}
/**
* gets an integer from the input
stream
*
* @param maxLength maximum length of
characters
* input to capture the integer
*
* @return integer captured from file
*/
private int getAnInt( int maxLength )
{
int inCharInt;
int index = 0;
String strBuffer =
"";
int intValue;
boolean negativeFlag =
false;
try
{
inCharInt = fileIn.read();
// clear space up to number
while( index < maxLength && !charInString(
(char)inCharInt,
"0123456789+-" ) )
{
inCharInt =
fileIn.read();
index++;
}
if( inCharInt == MINUS_SIGN )
{
negativeFlag = true;
inCharInt = fileIn.read();
}
while( charInString( (char)inCharInt, "0123456789" ) )
{
strBuffer += (char)( inCharInt );
index++;
inCharInt = fileIn.read();
}
}
catch( IOException ioe
)
{
System.out.println( "INPUT ERROR: Failure to capture character"
);
strBuffer = "";
}
intValue =
Integer.parseInt( strBuffer );
if( negativeFlag )
{
intValue *= -1;
}
return intValue;
}
/**
* Uploads data from file holding a square
array
*
* @param fileName String object holding
file name
*/
void uploadData( String fileName )
{
int rowIndex,
colIndex;
try
{
// Open FileReader
fileIn = new FileReader( fileName );
// get side length
arrSide = getAnInt( MAX_INPUT_CHARS
);
encryptedArr = new int[ arrSide ][ arrSide ];
for( rowIndex = 0; rowIndex < arrSide; rowIndex++ )
{
for( colIndex = 0; colIndex < arrSide; colIndex++ )
{
encryptedArr[ rowIndex ][ colIndex ]
= getAnInt( MAX_INPUT_CHARS );
}
}
fileIn.close();
}
// for opening
file
catch(
FileNotFoundException fnfe )
{
fnfe.printStackTrace();
}
// for closing
file
catch (IOException
ioe)
{
ioe.printStackTrace();
}
}
}
In: Computer Science
Is it more important to speak well, or to listen well?
Explain why, and include at two strategies or examples to support
your response
In: Operations Management
Using the seven primary characteristics that capture an organization’s culture, list each and what you see Macomb Community College doing in each from a student view, to create the organization’s culture. Please be sure to give examples. and these the characteristics.
1- Innovation and risk taking, 2- Attention to detail, 3- Outcome orientation, 4- People orientation, 5- Team orientation, 6- Aggressiveness, 7- Stability,
In: Operations Management
Linux
1. Give a command line (one command) for displaying the files lab1, lab2, lab3, and lab4. Can you give another command lines that do the same thing by making use of the file name similarities? What is the command line for displaying the files lab1.c, lab2.c, lab3.c, and lab4.c? (Hint: use shell metacharacters.)
2. How to determine the number of users who are logged on to Linux server system at this time? What command did you use to discover this?
3. Determine the name of the operating system that the Linux server runs. What command did you use to discover this
4. What are special files in UNIX? What are character special files and block special files? Run the ls /dev | wc -w command to find the number of special files that the linux server system has.
5. What is the inode number of the root directory on the linux server? Give the commands that you used to find the inode number.
In: Computer Science
Q/ Draw the flow diagram of Stop-and-Wait protocol in the following scenario
In: Electrical Engineering
Read the Case Study below and answer the questions that follow
Microsoft Xbox 360
When Microsoft rushed its video game console, Xbox, to market in November 2005 it had a one-year advantage over Sony and Nintendo. By 2007 they had sold over 11.6 million units at prices between $279 and $479 … depending on the configuration.
Unresolved issues plagued the project from the beginning. When Journalists and reviewers were invited to try the game in 2005, before it became available on store shelves, they encountered problems when connecting it to the internet (N’Gai, 2007). Shortly after the game was introduced to the public, users complained that the console damaged game disks and that these disks could no longer be used (Cliff, 2007). In 2005 Microsoft recalled the power cords concerned that they posed a fire hazard (Wolverton and Takanashi, 2007). Then in December 2006, in an apparent response to these and other issues, Microsoft extended the warranty from 90 days to one year.
But problems persisted. Blogs and forums complained about the “Red Ring of Death” referring to a string of three lights that illuminate on the console when a serious problem is detected. One survey found that the return rate was 33 percent (Cliff, E, 2007)
Then in July 2007, Robbie Bach, president of Microsoft’s Entertainment and Device Division, said that “In the past few months, we have been having to make Xbox 360 console repairs at a rate too high for
our liking” (Associated Press, 2007) (Mintz, 2007). Shortly thereafter, Microsoft announced an extension of the warranty from one to three years at an expected cost of $1 billion. This represented about $100 for every Xbox sold since its introduction in 2005.
Later in the same month Microsoft announced that its top gaming executive, Peter Moore, was leaving the company, but they denied that his departure was related to the Xbox’s engineering problems (Wingfield, 2007)).
Lessons Learned
Perhaps the dominant lesson here is the trap called “conservatism” in which new data is largely ignored to protect the status quo. Here, in the face of a continuous stream of product returns and customer complaints, those who were responsible for the project were unwilling to acknowledge that the problem was serious; that customer satisfaction and loyalty was deteriorating rapidly; that the product needed to be redesigned; and that customer satisfaction needed to be addressed.
The sunk cost trap also played its part. In the sunk cost trap, a course of action is not abandoned because considerable time or money has already been spent on the project, and those in charge are reluctant to abandon the project or take steps to delay the project in any way. For the Xbox, considerable investment in the product had already been made, sales were strong, and since the division had yet to turn a profit, there was pressure to continue at any cost. Returning to earlier stages of design, issuing a recall for the defective units, and replacing them with new units was apparently not a realistic option.
Question 1
1.2. “For the Xbox, considerable investment in the product had already been made, sales were strong, and since the division had yet to turn a profit, there was pressure to continue at any cost. Returning to earlier stages of design, issuing a recall for the defective units, and replacing them with new units was apparently not a realistic option.”
It is clear that Microsoft had to deliver the project on schedule; hence they could not recall the defective units. Identify and briefly explain the theory that relates to extract above.
1.3. Successful completion of a project requires finishing the scope of work within budget and a certain time frame whilst managing resource utilization, meeting quality expectations and managing risks. All this must be done while assuring customer satisfaction. Discuss how Microsoft could have managed project constraints to successfully deliver the Xbox 360 project.
In: Operations Management
ITT-270 IPv6 Stateful Autoconfig, Static and Default Routing, OSPF Guide
Directions:This assignment will configure IPv6. To complete this assignment, follow the guidelines provided below. At the end of this document you will find the related assignment questions; submit only the completed questions portion to your instructor. Note: At various points you will be required to obtain a screen capture; add this directly into the document following the related question.
Objectives
Guidelines
For this assignment, the network will look like this. The routers are Cisco 2911 models and the switches are Cisco 2960 models.
(Todd, 2016)
There will be no need to create any connections or devices for this assignment.
Capture the screen (screenshot 1) and place it with the related question below.
Capture the screen (screenshot 2) and place it with the related question below.
Capture the screen (screenshot 3) and place it with the related question below.
Before continuing, answer question 1 below.
Capture the screen (screenshot 4, 5 and 6) for each router and place them with the related questions below.
Capture the screen (screenshot 7) and place it with the related question below.
Capture the screen (screenshot 8) and place it with the related question below.
Before continuing, answer question 2 below.
Capture the screen (screenshot 9) and place it with the related question below.
Capture the screen (screenshot 10) and place it with the related question below.
Before continuing, answer questions 3 and 4 below.
Capture the screen (screenshot 11) and place it with the related question below.
Capture the screen (screenshot 12) and place it with the related question below.
Before continuing, answer question 5 below.
Capture the screen (screenshot 13) and place it with the related question below.
Capture the screen (screenshot 14) and place it with the related question below.
Capture the screen (screenshot 15) and place it with the related question below.
Before continuing, answer question 6 below.
Note: Now, it’s time to practice with OSPFv3. Unfortunately, because OSPF has automagic routing, the routing that was set before needs to be removed. Of course, one could just close the app and re-open it, but practice instead.
Before continuing, answer question 7 below.
Before continuing, answer question 8 below.
Finish this assignment by completing question 9 below.
ITT-270 Stateful Autoconfig, Static and Default Routing, OSPF – Questions
Complete the following questions as required by the prompts within the guidelines above.
A |
B |
C |
D |
E |
|
A |
--- |
||||
B |
--- |
||||
C |
--- |
||||
D |
--- |
||||
E |
--- |
A |
|
B |
|
C |
|
D |
|
E |
In: Computer Science
scenario analysis is the most commonly used technique for analysing risk.By citing a project that you are famillar with, undertake risk assessment of at least 10 identified risks using the table provided by lersan and gray (2017).
In: Operations Management
A survey of the mean number of cents off that coupons give was conducted by randomly surveying one coupon per page from the coupon sections of a recent San Jose Mercury News. The following data were collected: 20¢; 75¢; 50¢; 65¢; 30¢; 55¢; 40¢; 40¢; 30¢; 55¢; $1.50; 40¢; 65¢; 40¢. Assume the underlying distribution is approximately normal. You wish to conduct a hypothesis test (α = 0.05 level) to determine if the mean cents off for coupons is less than 50¢.
In: Math
You borrow $29,000 to buy a car. You plan to payoff the car within 6 years and the APR on the car loan is 2.99%. Using an excel to create an amortization for this car payment for 72 months. Please print out your excel and turn it in for 6 points extra credit on the test. You need to turn in your own work.
Month | Beginning Balance | Monthly Payment | Interest Paid | Principal Paid | Ending Balance |
1 2 3 ... 72 |
|||||
Total |
In: Finance
1) What responsibility do treasury professionals typically have in regards to budgets?
a. Treasury professionals use budgets primarily for planning and variance analysis.
b. Treasury professionals need to assess the impact budgets have on debt covenants but not credit ratings.
c. Treasury professionals use budgets as an input to their work but are not responsible for the budgeting process.
d. Budgets may require treasury professionals to change how they handle short-term assets to maintain overall liquidity.
In: Finance
C++
Write a program that reads a line of text, changes each uppercase letter to lowercase, and places each letter both in a queue and onto a stack. The program should then verify whether the line of text is a palindrome (a set of letters or numbers that is the same whether read forward or backward). Please use a Queue Class and Stack class.
In: Computer Science
In Robert Sternberg's model (p 332-333) he talks about passion, intimacy and commitment. He appears to make the assumption that the highest level in the triangle is marriage. If we apply his theory and use our knowledge of development to date: What is love? How might we explain the relationship of people who live together? Why might they make this choice? What about casual dating? Where does that fit into the model? Same-sex partners? Single parents? What about married couples? Can a couple attain the level that Sternberg believes is the ideal? How? Can it be sustained? In what ways do you think that gender differences influence intimacy? In what ways does our early developmental experience of relationships influence later relationships? (attachment) Any other thoughts you have about the world of relationships.
In: Psychology
literature review on emotional intelligence and life satisfaction with citations and references
In: Psychology
Describe the various types of time-series and associative forecasting models. Which types of organizations are each of these most applicable to and why?
In: Operations Management