Categories
Computer Science

Message digest function (md5)

For this assignment, you will be working as a fictitious security officer. You understand that it is important to secure any data passed through the network, and because all the data is top secret, you will have to select an algorithm to encrypt the data at rest and through transit. It is important to keep the data secure at all times. Research at least two different ciphers from the list below in the assignment. You are encouraged to research in the Ashford library as well as from your text.
In this paper,
Explain each of the following encryption algorithms:
Challenge-Handshake Authentication Protocol (CHAP)
Diffie-Hellman Key Exchange
Digital Signature Algorithm (DSA)
Elliptic Curve Cryptography (ECC)
Extensible Authentication Protocol (EAP)
Message Digest Function (MD5)
Rivest, Shamir, Adleman (RSA)
Secure Hashing Algorithm (SHA)
Evaluate how the encryption algorithms can be used to secure your company data.
The Encryption Algorithms paper
Must be two to four double-spaced pages

Categories
Computer Science

Next, you need to define the variables, string activity, double for minutes, localdate date; for the date.

Create a FitnessTracker class that includes data fields for a fitness activity, the number of minutes spent participating, and the date. The class includes methods to get each field. In addition, create a default constructor that automatically sets the activity to running, the minutes to 0, and the date to January 1 of the current year. Save the file as FitnessTracker.java. Create an application that demonstrates each method works correctly, and save it as TestFitnessTracker.java.
Create an additional overloaded constructor for the FitnessTracker class you created in Exercise 3a. This constructor receives parameters for each of the data fields and assigns them appropriately. Add any needed statements to the TestFitnessTracker application to ensure that the overloaded constructor works correctly, save it, and then test it.
Modify the FitnessTracker class so that the default constructor calls the three-parameter constructor. Save the class as FitnessTracker2.java. Create an application to test the new version of the class, and name it TestFitnessTracker2.java.
The solution requires (4) files. Two class files (very similar) and two test programs.
In the class file you’ll need to import the time methods, java.time.*;. Next, you need to define the variables, String Activity, double for minutes, LocalDate date; for the date. Then define the default constructor for the activity Running, minutes = 0; and date = LocalDate.of(2022,1,1);.
Then you need to define the FitnessTracker method (String a, double m, LocalDate d) { body of method, you can nail this.}.
Then you’ll need three methods, getActivity(), getMinutes(), and public LocalDate getDate().
In the main program, instantiate an object: FitnessTracker exercise = new FitnessTracker();
Then print the values from the default constructor object System.out.println(exercise.getActivity() + ” “……);
Then you need another exercise,
LocalDate date = LocalDate.of(2022, 8, 5); // gets the date
FitnessTracker exercise2 = new FitnessTracker(“Bicycling”, 65.55, date);
Then print the results.

Categories
Computer Science

Modify the fitnesstracker class so that the default constructor calls the three-parameter constructor.

Create a FitnessTracker class that includes data fields for a fitness activity, the number of minutes spent participating, and the date. The class includes methods to get each field. In addition, create a default constructor that automatically sets the activity to running, the minutes to 0, and the date to January 1 of the current year. Save the file as FitnessTracker.java. Create an application that demonstrates each method works correctly, and save it as TestFitnessTracker.java.
Create an additional overloaded constructor for the FitnessTracker class you created in Exercise 3a. This constructor receives parameters for each of the data fields and assigns them appropriately. Add any needed statements to the TestFitnessTracker application to ensure that the overloaded constructor works correctly, save it, and then test it.
Modify the FitnessTracker class so that the default constructor calls the three-parameter constructor. Save the class as FitnessTracker2.java. Create an application to test the new version of the class, and name it TestFitnessTracker2.java.
The solution requires (4) files. Two class files (very similar) and two test programs.
In the class file you’ll need to import the time methods, java.time.*;. Next, you need to define the variables, String Activity, double for minutes, LocalDate date; for the date. Then define the default constructor for the activity Running, minutes = 0; and date = LocalDate.of(2022,1,1);.
Then you need to define the FitnessTracker method (String a, double m, LocalDate d) { body of method, you can nail this.}.
Then you’ll need three methods, getActivity(), getMinutes(), and public LocalDate getDate().
In the main program, instantiate an object: FitnessTracker exercise = new FitnessTracker();
Then print the values from the default constructor object System.out.println(exercise.getActivity() + ” “……);
Then you need another exercise,
LocalDate date = LocalDate.of(2022, 8, 5); // gets the date
FitnessTracker exercise2 = new FitnessTracker(“Bicycling”, 65.55, date);
Then print the results.

Categories
Computer Science

For example, you could

create one table and one figure based on a topic of your choosing that relates to public health, demographics, and geography. For example, you could
compare cancer rates for particular groups (age, ethnicity, income, etc) in two or more locations in the United States. Create the table first, then represent the same data using a figure (bar chart, pie
chart, etc). You can choose any figure you think is most appropriate to the data in your table.

Categories
Computer Science

Mention the difference between

Answer the following questions. Your answers should not be more than 2
A4-sheets per question. Ensure that answer to each question is written on
separate sheets. Please write the answers neatly. Answers which violate the
above guidelines will not be evaluated. Please give independent answers,
while discussion is okay. Copying shall be dealt with strictly.
1 a) Compare the various formats of representing numbers in computers.
Discuss briefly with the help of examples. Mention which is the most
popular number representation and why do you think so? (10 marks)
b) What do you mean by precision of representing a floating point number
in the IEEE standard? Explain with a small example. (5 marks)
2 Write a 2 page note on your notion of the subject “Computer Science”.
Subdivide the answer into the following 5 sections:
i) A brief summary on the topic. Mention the difference between
Computer Sc and Computer Engg.
ii) Mathematical Foundations and Concepts required.
iii) Relationship to rest of Engineering.
iv) Applications in the modern day.
v) Where do you think CS is heading to?
(5 x 3=15 marks)
3. Recall that as a Computer Scientist, each problem that you would like to
solve using a computer program is a function from a domain to a range. The
domain is used to model the set of inputs to the program and the range is the
set of outputs expected from the program. For example, for the sorting
problem, the domain is the set of number sequences, and the range is the set
of sorted number sequences. As a special case for this question let us
consider the domain to be the set of {0,1}-sequences, and the range to be the
set {0,1}. How many functions exist between the given domain and range?
Given our axiom that computer programs evaluates functions, the next
question is, how many C-programs exist? What can you conclude from the
answers to the above two questions?
(15 marks)
4. Good Processor, Bad Processor: Suppose that n processors in a space
ship have been subjected to cosmic radiation. Fewer than half of them were
corrupted. We call the corrupted chips “bad”. The uncorrupted chips are
called “good”. Your mission is to identify a chip that you are sure is good.
You can use the chips to test each other: choose two chips T and S and use T
to test S. If T (the tester) is good, then it will correctly report whether S (the
subject) is good or bad. If T is bad, however, it will answer any way it
wishes. Think of a bad chip as answering adversarily about S, which is to
say, it will give whatever answer is least helpful to your testing strategy. In
other words, imagine that an intelligent adversary is determining the
behavior of the bad tester—an adversary who has access to and understands
your algorithm, and is choosing each bad tester’s answer in such a way that
your algorithm takes as long as possible.
Design an algorithm that uses as few tests as possible to find one good chip.
Show that your algorithm is correct and find its worst-case running time
(i.e., number of tests). A single test is the operation of querying one
processor about the “goodness” of a different processor.

Categories
Computer Science

4- operational scenarios & subpoints

Filling out a part of a design document
parts:
4- operational scenarios & subpoints
5- detailed design & subpoints
attached below is the SRS form that the design document largely features. The design document is the one that needs to be completed though. Does not have to be perfect but some sort of professional

Categories
Computer Science

Submit your work.

Assignment 5.1 MS PowerPoint Module 1: Creating and Editing Presentations with Pictures.
PowerPoint Module 1: Creating and Editing Presentations with Pictures.
Open your textbook on page PPT 1-1 and follow the step-by steps (red balls) from page PPT1-1 to PPT 1-68.
After you completed all steps, your document should look exactly like this above.
Submit your work.
PP Module 1.JPG

Categories
Computer Science

B) explain how the bottom-up design approach differs from the top-down design approach.

Instructions
Part 1
A) Complete Exercise 10.6 on page 325 in the Connolly text. Include a comprehensive explanation of each phase.
B) Explain how the bottom-up design approach differs from the top-down design approach. Which approach do you believe should be used to design a simple database with a relatively small number of attributes and why?
Include the questions with your answers.
The submission should demonstrate your understanding of the assigned material.
The submission should be in the order of 1,000+ words in length.
The content must be original and include supporting sentences using the terms, concepts, and theories from the assigned readings and other material (optional). The submission must paraphrase the referenced material, and restrict the use of direct quotes (copy and paste) to less than 15% of the submission (the grade will be impacted if this limit is exceeded).
There are writing guidelines in the syllabus – use good judgment, and the submission must be well organized. Provide citations and references in APA style.
Name your document Ubogu_Assignment4.
Part 2
Complete the Independent Challenge 3 exercise on page Access 160 in Module 6: Improving Queries. Do not perform the Print in step d, g, and m. You must download and use the LakeHomes-6.accdb file provided below.
LakeHomes-6.accdb (https://myclassroom.apus.edu/d2l/common/dialogs/quickLink/quickLink.d2l?ou=67280&type=coursefile&fileId=Friedrichsen+Access+2016+Data+Files%2fModule+6%2fLakeHomes-6.accdb)
Name the completed Access database “Ubogu_LakeHomes-6.accdb”
Screenshots of the textbook have been attached to the files.
NOTE- YOU WILL BE UPLOADING TWO DIFFERENT FILES

Categories
Computer Science

This order is about computer shell scripting on a linux server.

Please see attached document of instructions. This order is about computer shell scripting on a Linux server.

Categories
Computer Science

Reviewing the concept of change windows, pick the best day and time for a regular weekly change window for a 9-to-5 business.

Reviewing the concept of Change Windows, pick the best day and time for a regular weekly change window for a 9-to-5 business. Making sure to think about why this is a good time and justify it in your post.
Write 10 sentences ab
out this topic.
Aligned Objectives
• Identify physical and logical network components
• Identify and describe the services and tools used in network operations
• Describe the processes involved in running a datacenter