Questions
- Students must develop the code required to create a square two-dimensional array just large enough...

- Students must develop the code required to create a square two-dimensional array just large enough to store a given string in encrypted form using the given encryption algorithm. The character used after the end of the encrypted string is the ASCII delete key, set as final UNPRINTABLE_CHAR_VALUE. After this value is stored, the encryption process fills the remaining elements with random values

- Students must develop the code to decrypt a given square two-dimensional array and using the given encryption algorithm

- Students must develop other supporting methods as specified (below) to manage the encryption operations*

- Students will also document all classes and methods using the Javadoc commenting process; comments are not required to be exactly the same as found in the supporting document (below) but they should be semantically equivalent

- Students will upload the EncryptionClass.java file to this assignment; any other uploaded files will result in a reduction of the project grade, and in some cases, may cause a complete loss of credit

- Assignment Specification (Javadoc output for the project):

p1_package

Class EncryptionClass

  • java.lang.Object
    • p1_package.EncryptionClass

FileIoToolsForEncryptionClass.java

import java.io.FileNotFoundException;
import java.io.FileReader;
import java.io.FileWriter;
import java.io.IOException;

public class EncryptionClass
   {/**
     * Constant for maximum input char limit
     */
    private final int MAX_INPUT_CHARS = 256;
  
    /**
     * Constant for unprintable char value used as message end char
     */
    private final int UNPRINTABLE_CHAR_VALUE = 127; // ASCII for delete key

    /**
     * Constant for minus sign used in getAnInt
     */
    private final char MINUS_SIGN = '-';
  
    /**
     * Class Global FileReader variable so methods can be used
     */
    private FileReader fileIn;
  
    /**
     * Downloads encrypted data to file
     * <p>
     * Note: No action taken if array is empty
     * @param fileName String object holding file name to use
     */
    void downloadData( String fileName )
       {FileWriter toFile;     
        int rowIndex, colIndex;     
        if( arrSide > 0 )
           {
            try
               {
                toFile = new FileWriter( fileName );
                toFile.write( "" + arrSide + "\r\n" );
                for( rowIndex = 0; rowIndex < arrSide; rowIndex++ )
                   {
                    for( colIndex = 0; colIndex < arrSide; colIndex++ )
                       {
                        if( encryptedArr[ rowIndex ][ colIndex ] < 100 )
                           {
                            toFile.write( "0" );
                           }              
                        toFile.write(" "+ encryptedArr[ rowIndex ][ colIndex ] + " " );
                       }
                    toFile.write( "\r\n" );
                   }
         
                toFile.flush();
                toFile.close();
               }
            catch( IOException ioe )
               {
                ioe.printStackTrace();
               }
           }
       }

    /**
     * gets an integer from the input stream
     *
     * @param maxLength maximum length of characters
     * input to capture the integer
     *
     * @return integer captured from file
     */
    private int getAnInt( int maxLength )
       {
        int inCharInt;
        int index = 0;
        String strBuffer = "";
        int intValue;
        boolean negativeFlag = false;

        try
           {
            inCharInt = fileIn.read();

            // clear space up to number
            while( index < maxLength && !charInString( (char)inCharInt,
                                                           "0123456789+-" ) )
               {
                inCharInt = fileIn.read();              
                index++;
               }    
            if( inCharInt == MINUS_SIGN )
               {
                negativeFlag = true;
                inCharInt = fileIn.read();
               }

            while( charInString( (char)inCharInt, "0123456789" ) )
               {
                strBuffer += (char)( inCharInt );

                index++;
             
                inCharInt = fileIn.read();
               }          
           }
     
        catch( IOException ioe )
           {
            System.out.println( "INPUT ERROR: Failure to capture character" );
            strBuffer = "";
           }
        
        intValue = Integer.parseInt( strBuffer );
     
        if( negativeFlag )
           {
            intValue *= -1;
           }
     
        return intValue;
       }

    /**
     * Uploads data from file holding a square array
     *
     * @param fileName String object holding file name
     */
    void uploadData( String fileName )
       {
        int rowIndex, colIndex;
    
        try
           {
            // Open FileReader
            fileIn = new FileReader( fileName );
      
            // get side length
            arrSide = getAnInt( MAX_INPUT_CHARS );         
    
            encryptedArr = new int[ arrSide ][ arrSide ];
          
            for( rowIndex = 0; rowIndex < arrSide; rowIndex++ )
               {
                for( colIndex = 0; colIndex < arrSide; colIndex++ )
                   {
                    encryptedArr[ rowIndex ][ colIndex ]
                                                  = getAnInt( MAX_INPUT_CHARS );
                   }
               }
          
            fileIn.close();
           }
    
        // for opening file
        catch( FileNotFoundException fnfe )
           {
            fnfe.printStackTrace();
           }
      
        // for closing file
        catch (IOException ioe)
           {
            ioe.printStackTrace();
           }
       }   
   }  

In: Computer Science

Is it more important to speak well, or to listen well? Explain why, and include at...

Is it more important to speak well, or to listen well?


Explain why, and include at two strategies or examples to support your response

In: Operations Management

Using the seven primary characteristics that capture an organization’s culture, list each and what you see...

Using the seven primary characteristics that capture an organization’s culture, list each and what you see Macomb Community College doing in each from a student view, to create the organization’s culture. Please be sure to give examples. and these the characteristics.

1- Innovation and risk taking, 2- Attention to detail, 3- Outcome orientation, 4- People orientation, 5- Team orientation, 6- Aggressiveness, 7- Stability,

In: Operations Management

Linux 1. Give a command line (one command) for displaying the files lab1, lab2, lab3, and...

Linux

1. Give a command line (one command) for displaying the files lab1, lab2, lab3, and lab4. Can you give another command lines that do the same thing by making use of the file name similarities? What is the command line for displaying the files lab1.c, lab2.c, lab3.c, and lab4.c? (Hint: use shell metacharacters.)

2. How to determine the number of users who are logged on to Linux server system at this time? What command did you use to discover this?

3. Determine the name of the operating system that the Linux server runs. What command did you use to discover this

4. What are special files in UNIX? What are character special files and block special files? Run the ls /dev | wc -w command to find the number of special files that the linux server system has.

5. What is the inode number of the root directory on the linux server? Give the commands that you used to find the inode number.

In: Computer Science

Q/ Draw the flow diagram of Stop-and-Wait protocol in the following scenario Frame 0 is sent,...

Q/ Draw the flow diagram of Stop-and-Wait protocol in the following scenario

  • Frame 0 is sent, and acknowledged.
  • Frame 1 is sent, but the acknowledgment is lost.
  • Frame 1 is resent and acknowledged.
  • Frame 0 is sent, but lost.
  • Frame 0 is resent, and acknowledged.

In: Electrical Engineering

Read the Case Study below and answer the questions that follow Microsoft Xbox 360 When Microsoft...

Read the Case Study below and answer the questions that follow

Microsoft Xbox 360

When Microsoft rushed its video game console, Xbox, to market in November 2005 it had a one-year advantage over Sony and Nintendo. By 2007 they had sold over 11.6 million units at prices between $279 and $479 … depending on the configuration.

Unresolved issues plagued the project from the beginning. When Journalists and reviewers were invited to try the game in 2005, before it became available on store shelves, they encountered problems when connecting it to the internet (N’Gai, 2007). Shortly after the game was introduced to the public, users complained that the console damaged game disks and that these disks could no longer be used (Cliff, 2007). In 2005 Microsoft recalled the power cords concerned that they posed a fire hazard (Wolverton and Takanashi, 2007). Then in December 2006, in an apparent response to these and other issues, Microsoft extended the warranty from 90 days to one year.

But problems persisted. Blogs and forums complained about the “Red Ring of Death” referring to a string of three lights that illuminate on the console when a serious problem is detected. One survey found that the return rate was 33 percent (Cliff, E, 2007)

Then in July 2007, Robbie Bach, president of Microsoft’s Entertainment and Device Division, said that “In the past few months, we have been having to make Xbox 360 console repairs at a rate too high for

our liking” (Associated Press, 2007) (Mintz, 2007). Shortly thereafter, Microsoft announced an extension of the warranty from one to three years at an expected cost of $1 billion. This represented about $100 for every Xbox sold since its introduction in 2005.

Later in the same month Microsoft announced that its top gaming executive, Peter Moore, was leaving the company, but they denied that his departure was related to the Xbox’s engineering problems (Wingfield, 2007)).

Lessons Learned

Perhaps the dominant lesson here is the trap called “conservatism” in which new data is largely ignored to protect the status quo. Here, in the face of a continuous stream of product returns and customer complaints, those who were responsible for the project were unwilling to acknowledge that the problem was serious; that customer satisfaction and loyalty was deteriorating rapidly; that the product needed to be redesigned; and that customer satisfaction needed to be addressed.

The sunk cost trap also played its part. In the sunk cost trap, a course of action is not abandoned because considerable time or money has already been spent on the project, and those in charge are reluctant to abandon the project or take steps to delay the project in any way. For the Xbox, considerable investment in the product had already been made, sales were strong, and since the division had yet to turn a profit, there was pressure to continue at any cost. Returning to earlier stages of design, issuing a recall for the defective units, and replacing them with new units was apparently not a realistic option.

Question 1

  1. Identify the problems that Microsoft encountered when it launched its Xbox 360 console.

1.2. “For the Xbox, considerable investment in the product had already been made, sales were strong, and since the division had yet to turn a profit, there was pressure to continue at any cost. Returning to earlier stages of design, issuing a recall for the defective units, and replacing them with new units was apparently not a realistic option.”

It is clear that Microsoft had to deliver the project on schedule; hence they could not recall the defective units. Identify and briefly explain the theory that relates to extract above.

1.3. Successful completion of a project requires finishing the scope of work within budget and a certain time frame whilst managing resource utilization, meeting quality expectations and managing risks. All this must be done while assuring customer satisfaction. Discuss how Microsoft could have managed project constraints to successfully deliver the Xbox 360 project.

In: Operations Management

ITT-270 IPv6 Stateful Autoconfig, Static and Default Routing, OSPF Guide Directions:This assignment will configure IPv6. To...

ITT-270 IPv6 Stateful Autoconfig, Static and Default Routing, OSPF Guide

Directions:This assignment will configure IPv6. To complete this assignment, follow the guidelines provided below. At the end of this document you will find the related assignment questions; submit only the completed questions portion to your instructor. Note: At various points you will be required to obtain a screen capture; add this directly into the document following the related question.

Objectives

  • Manual and stateful autoconfiguration
  • Static and default routing
  • OSPF v3

Guidelines

For this assignment, the network will look like this.  The routers are Cisco 2911 models and the switches are Cisco 2960 models.

(Todd, 2016)

There will be no need to create any connections or devices for this assignment.

  1. Login to the C router and configure the Outside address as 2001:db8:3c4d:1::/64by typing the following commands:  
    1. Ipv6 unicast-routing
    2. Int gi0/0
    3. Ipv6 address 2001:db8:3c4d:1::1/64
  2. Now, the inside address needs to be 2001:db8:3c4d:2::/64. Complete this by typing the following commands:  
    1. Int gi0/1
    2. Ipv6 address 2001:db8:3c4d:2::1/64
    3. CTRL+Z
  3. Verify by typing the following command:
    1. Show ipv6 route

Capture the screen (screenshot 1) and place it with the related question below.  

  1. Continue by typing the following command:
    1. show ipv6 int brief

Capture the screen (screenshot 2) and place it with the related question below.  

  1. Login to router A and set it to autoconfig ipv6 by typing the following commandsin Global Configuration mode:  
    1. ipv6 unicast-routing
    2. int gi0/0
    3. ipv6 address autoconfig
    4. No shut
    5. CTRL+Z
  2. Confirm by typing the following command:  
    1. sh ipv6 int brief

Capture the screen (screenshot 3) and place it with the related question below.  

Before continuing, answer question 1 below.  

  1. Complete this for router B, D, and E.  

Capture the screen (screenshot 4, 5 and 6) for each router and place them with the related questions below.  

  1. Setup static and default routing.  On router A configure a static route to the 2001:db8:3c4d:2::/64 by typing the following commands:
    1. config t
    2. ipv6 route 2001:db8:3c4d:2::/64 gi0/0
    3. do show running-config

Capture the screen (screenshot 7) and place it with the related question below.

  1. Continue by typing the following command:  
    1. show ipv6 route

Capture the screen (screenshot 8) and place it with the related question below.  

Before continuing, answer question 2 below.

  1. On router B, configure a default route by typing the following commands:   
    1. conf t
    2. ipv6 route ::/0 gi0/0
      1. (there is a space after route)
    3. do show running-config

Capture the screen (screenshot 9) and place it with the related question below.  

  1. Continue by typing the following command on Router B:  
    1. show ipv6 route

Capture the screen (screenshot 10) and place it with the related question below.  

Before continuing, answer questions 3 and 4 below.  

  1. On router D, create a static route the other way by typing the following commands in Global Configuration mode:  
    1. ipv6 route 2001:db8:3c4d:1::/64 gi0/0
    2. do show running-config

Capture the screen (screenshot 11) and place it with the related question below.  

  1. Continue by typing the following command:  
    1. show ipv6 route

Capture the screen (screenshot 12) and place it with the related question below.  

  1. On router E, do the same.

Before continuing, answer question 5 below.  

  1. On Router E, run the following command:
    1. show running-config

Capture the screen (screenshot 13) and place it with the related question below.  

  1. Continue by typing the following command:  
    1. show ipv6 route

Capture the screen (screenshot 14) and place it with the related question below.  

  1. Ping from router D to router A. First, we need to find out what autoconfig address exists on router A (should being with 2001). Type the following command:
    1. sh ipv6 int brief
  2. On router D
    1. Ping <IP ADDRESS>

Capture the screen (screenshot 15) and place it with the related question below.  

Before continuing, answer question 6 below.  

Note: Now, it’s time to practice with OSPFv3. Unfortunately, because OSPF has automagic routing, the routing that was set before needs to be removed. Of course, one could just close the app and re-open it, but practice instead.  

  1. On router A type the following command:
    1. no ipv6 route 2001:db8:3c4d:2::/64 gi0/0
  2. On router B type the following command:
    1. no ipv6 route ::/0 gi0/0
  3. On router D type the following command:
    1. no ipv6 route 2001:db8:3c4d:1::/64 gi0/0
  4. On router E type the following command:
    1. no ipv6 route 2001:db8:3c4d:1::/64 gi0/0
  5. We aren’t doing this for router C.

Before continuing, answer question 7 below.  

  1. IRL, if IPv4 is not configured, RIDs need to be created for each router. On router A, define ospf 1 with RID 1.1.1.1 by typing the following commands:  
    1. ipv6 router ospf 1
    2. router-id 1.1.1.1
  2. Now, assign ospf 1 to the outside interface by typing the following commands:
    1. int gi0/0
    2. ipv6 ospf 1 area 0
    3. CTRL+Z
  3. Verify by typing the following commands:  
    1. sh ipv6 route
    2. sh ipv6 route ospf
    3. sh ipv6 int gi0/0
    4. sh ipv6 neighbor
  4. On router B, define ospf1 with RID 2.2.2.2, then assign OSPF 1 to f0/0 by typing the following commands:  
    1. ipv6 router ospf 1
    2. router-id 2.2.2.2
    3. int gi0/0
    4. ipv6 ospf 1 area 0
    5. CTRL+Z
  5. Verify by typing the following commands:  
    1. sh ipv6 route
    2. sh ipv6 route ospf
    3. sh ipv6 int gi0/0
    4. sh ipv6 neighbor
  6. Complete the same with routers C, D, & E, changing the “Router-id #.#.#.#” to be 3.3.3.3, 4.4.4.4, & 5.5.5.5, respectively.  On Router C, make sure that you issue the ipv6 ospf 1 area 0on both interfaces (gi0/0 & gi0/1).

Before continuing, answer question 8 below.  

  1. In order to confirm the ping, determine the ipv6 addresses for each router. These should all begin with 2001.  Do not use the FE80addresses as they are link-local addresses.  

Finish this assignment by completing question 9 below.

ITT-270 Stateful Autoconfig, Static and Default Routing, OSPF – Questions

Complete the following questions as required by the prompts within the guidelines above.  

  1. What does no shut do?

  1. Why are we creating a static route here? Why not a dynamic route?

  1. In this context, what is the difference between static and default routes?

  1. Will both routers ping gi0/1 on router C?

  1. What’s the command here?
  1. Can everybody ping everybody else? Fill out the chart.

A

B

C

D

E

A

---

B

---

C

---

D

---

E

---

  1. Why?

  1. What commands will you use for each router?  
  1. Fill out the table.

A

B

C

D

E

In: Computer Science

scenario analysis is the most commonly used technique for analysing risk.By citing a project that you...

scenario analysis is the most commonly used technique for analysing risk.By citing a project that you are famillar with, undertake risk assessment of at least 10 identified risks using the table provided by lersan and gray (2017).

In: Operations Management

A survey of the mean number of cents off that coupons give was conducted by randomly...

A survey of the mean number of cents off that coupons give was conducted by randomly surveying one coupon per page from the coupon sections of a recent San Jose Mercury News. The following data were collected: 20¢; 75¢; 50¢; 65¢; 30¢; 55¢; 40¢; 40¢; 30¢; 55¢; $1.50; 40¢; 65¢; 40¢. Assume the underlying distribution is approximately normal. You wish to conduct a hypothesis test (α = 0.05 level) to determine if the mean cents off for coupons is less than 50¢.

  1. State the null and alternate hypotheses clearly.
  2. Conduct the hypothesis test based on the test statistic and critical value(s). Clearly indicate each.
  3. What is the p-value? Use the p-value to conduct the same test
  4. Report your conclusion in words, in the context of the problem.
  5. What is the power of the for an alternative hypothesis value of 49¢?

In: Math

You borrow $29,000 to buy a car. You plan to payoff the car within 6 years...

You borrow $29,000 to buy a car. You plan to payoff the car within 6 years and the APR on the car loan is 2.99%. Using an excel to create an amortization for this car payment for 72 months. Please print out your excel and turn it in for 6 points extra credit on the test. You need to turn in your own work.

Month Beginning Balance Monthly Payment Interest Paid Principal Paid Ending Balance

1

2

3

...

72

Total

In: Finance

1) What responsibility do treasury professionals typically have in regards to budgets? a. Treasury professionals use...

1) What responsibility do treasury professionals typically have in regards to budgets?

a. Treasury professionals use budgets primarily for planning and variance analysis.

b. Treasury professionals need to assess the impact budgets have on debt covenants but not credit ratings.

c. Treasury professionals use budgets as an input to their work but are not responsible for the budgeting process.

d. Budgets may require treasury professionals to change how they handle short-term assets to maintain overall liquidity.

In: Finance

C++ Write a program that reads a line of text, changes each uppercase letter to lowercase,...

C++

Write a program that reads a line of text, changes each uppercase letter to lowercase, and places each letter both in a queue and onto a stack. The program should then verify whether the line of text is a palindrome (a set of letters or numbers that is the same whether read forward or backward). Please use a Queue Class and Stack class.

In: Computer Science

In Robert Sternberg's model (p 332-333) he talks about passion, intimacy and commitment. He appears to...

In Robert Sternberg's model (p 332-333) he talks about passion, intimacy and commitment. He appears to make the assumption that the highest level in the triangle is marriage. If we apply his theory and use our knowledge of development to date: What is love? How might we explain the relationship of people who live together? Why might they make this choice? What about casual dating? Where does that fit into the model? Same-sex partners? Single parents? What about married couples? Can a couple attain the level that Sternberg believes is the ideal? How? Can it be sustained? In what ways do you think that gender differences influence intimacy? In what ways does our early developmental experience of relationships influence later relationships? (attachment) Any other thoughts you have about the world of relationships.

In: Psychology

literature review on emotional intelligence and life satisfaction with citations and references

literature review on emotional intelligence and life satisfaction with citations and references

In: Psychology

Describe the various types of time-series and associative forecasting models. Which types of organizations are each...

Describe the various types of time-series and associative forecasting models. Which types of organizations are each of these most applicable to and why?

In: Operations Management