multi-threading cs assignment
Discussion-4
Evaluate the history of cryptography from its origins. Analyze how cryptography was used and describe how it grew within history.
3 pages, APA, No PLagarism
The Meat Lady Dilemma
Mrs Parker owns and operates a meat shop that processes and packages parcels of minced meat that is being sold to schools in the US. Her scales are all calibrated to perform measurement in pounds, however when the parcels are packaged, they need to be labelled in ounces. Mrs Parker has established that 1 pound is equivalent to 16 ounces. In each production cycle, 250 packs of meat are processed and the weight in pounds varies for each package. Mrs Parker is also interested in knowing the total costs, the total revenue and the total profit of each production run, given that the costs to produce and package an ounce of meat is US $0.25 and that the selling price of an ounce of meat is US $0.55. Because you are a budding Software Engineer, she has sought your assistance in creating a software solution that can be used within the business establishment.
Required: A. Specifically identify the type of control structure which is needed to process the meat in each production run and provide a reason for your choice (4 marks)
B. Your solution needs to represent the meat packages which are to be processed, how would you represent this appropriately in your program and what has guided your choice? (4 marks)
C. Construct a C# program that will solve Mrs Parker’s dilemma by making use of the choices made above.
i. Implementation of the control structure to process the meat (2 marks)
ii. Implementation of the meat packages to be processed (2 marks)
iii. Calculation of costs, revenues, and profits (6 marks)
iv. Appropriate program outputs displayed to the user
Hexadecimal Calculator using Swift
Implement a hexadecimal calculator for iOS. Requirements:
• The calculator should support 4 basic arithmetic operations: + – * and /
• The calculator will operate on hexadecimal numbers, not decimal numbers
• The calculator only needs to operate on unsigned integers (i.e. UInt). You do not need to consider negative numbers or fractions.
• The calculator should support the 16-digit hexadecimal numbers (i.e. The range of the numbers is from 0 to FFFF FFFF FFFF FFFF). Prevent the user from entering a number that is greater than FFFF FFFF FFFF FFFF.
• The calculator should handle overflow and underflow gracefully. The app must not crash.
• The calculator should handle division-by-zero error gracefully. The app must not crash.
• The calculator should be able to support most of the devices and orientations. If it does not support the old devices earlier than iPhone 6, it is okay.
Hint:
• To convert a string to a hex number, use “radix: 16” as an argument.
For example: var s:String?
s = “1A”
var intHex:UInt = 0
intHex = UInt(s!, radix: 16)!
print(intHex)
// shows 26
intHex = 90
s = String(intHex, radix: 16).uppercased()
print(s!)
// shows 5A
• It is recommended that you use a UI label instead of a text field, so that the user will not type directly by using a keyboard. You will need to provide a button for each digit.
• Strings may be concatenated by using + operator.
E.g. var s1 = “1234” var s2 = “5”
print(s1 + s2)
// shows 12345
You may want to do string concatenation in the action of each digit button.
• To prevent the user from entering a number exceeding the size of 16 digits, you may verify the length of the string associated with the UI label.
• To handle overflow and underflow, use &+, &-, and &* instead of +, -, and *.
• To support different devices and orientations, use stack view, scroll view, or both.
• Design your algorithm first!
Think about the status of the calculator: when to take the first operand, when to take the second operand, when to append digits to the current number, and when to refresh the current number, etc. The functionality of your hex calculator worth 60% of the credit, while the appearance of the user interface worth 40%. When you submit the assignment, please compress the entire project folder into a single zip file, and upload it to D2L. In addition, please provide 4 to 5 screenshots of your app in different devices and orientations. If your app doesn’t work on every device/orientation, please specify why.
Discussion 6 – Info Tech Import Plan Response to peers
Please write a post for the two documents with 150 words each substantive. A substantive post will do at least two of the following:
- Ask an interesting, thoughtful question pertaining to the topic
- Answer a question (in detail) posted by another student or the instructor
- Provide extensive additional information on the topic
- Explain, define, or analyze the topic in detail
- Share an applicable personal experience
- Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
- Make an argument concerning the topic.
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.
Artificial Intelligence
Part a)
1) Discuss the difficulties in measuring the intelligence of machines.
Required: 200+ words
2) Explore the AI-related products and services of Nuance Inc. (nuance.com). Explore the Dragon voice recognition product.
Required: 200+ words
Part b)
1) Discuss the process that generates the power of AI and discuss the differences between machine learning and deep learning.
Required: 150+ words
Checklist:
Part ‘A’ and Part ‘B’ answers should to be attached as two separate documents.
Both part ‘A’ and ‘B’ must adhere to APA formatting guidelines
At least two references for each part
Plagiarism report for both.
Assignment Portfolio (Subject —- Digital Forensic Evidence)
Assignment 1 ) —– Portfolio Assignments
Preface
Listed below are areas of concentration for MSDF-630 202 Portfolio Assignment. Keep in mind that the portfolio research concentration is an essential segment of the course. Two research topics are created for you, and I hope that your professional effort will be represented in this project. Portfolio projects consist of the following three unique phases:
- Profile.
- Research Question 1
Investigation of Alabi, Time as Alibi and Location as Alibi.
- Research Question 2.
Cybercrime Law, Computer-Integrity Crime, Fraud, and Abuse.
Portfolio Project
Profile: Required
Group 1. Research Question 1
Group 2. Research Question 2
Group 3. Research Question 1
Group 4. Research Question 2
- Each student Must submit two (2) successful completed documents (here):
- Profile
- Collaborative Group Assignment.
Phase 1: Student Professional Profile
- Portfolio
- Full-Name
- Profile
- Status: Graduate or Post-graduate
- Academic areas concentration
- Current Professional Career Path
- Professional Career Path Completion Upon successful completion of your studies at the University of the Cumberlands.
- Research Question 1.
Investigation of Alabi, Time as Alibi and Location as Alibi.
Preamble
Alibi is a Latin acronym, meaning somewhere else and someone other than the culprit. A scenario that identifies the perpetrator of a crime to be someone or somewhere else other than where the crime took place. Criminal activities involving location, login and logout time, illegal behaviors, can be easily tracked by use computer and internet technologies.
- Offenders and their Alabi are often naive and ignore the fact that telephone companies always keep records of the number dialed, the time and duration of the call, and caller’s number.
- Offenders and their Alabi are oblivious and unaware of the fact that credit card corporations keep records of the dates, times, and locations of all purchases, banks keep track of the dates, times, and locations of all deposits and withdrawals, and dates, times, and locations reside on computers for an indefinite period. Customers receive a report each month with detailed information in the form of a bill and financial statement.
- Offenders and their Alabi are often neglectful of the fact that when an e-mail message is sent, the time and originating internet protocol (IP) addresses are noted in the header and log files that contain information of the past and current activities.
Forensic investigator must be vigilant at all times and try to acknowledge and recognize criminal Modus Operandi (MO) motive, intent, and ability to manipulate and change contents of the conclusive evidence and create false Alibi to amplify deceitful schemes. During the investigation of an alibi, the first step is to secure access to the data and information on the computer workstations, file servers, protocol, and network system.
BOOTP is the computer network designed to control and monitor which computers and specific internet protocol (IP) addresses. The BOOTP is a networking protocol used to automatically assign an IP address to network devices from a configuration server. Furthermore, BOOTP is often configured to synchronize their clocks regularly with exactly accurate time satellites and create a log in case of any discrepancies.
Dynamic host configurations protocol (DHCP) server is designed to automatically assign IP address and other information to each host on the network, communicate efficiently with other endpoints. Furthermore, the DHCP system allows anyone to change their clocks and does not keep logs of time changes. A DHCP server enables computers to automatically request IP addresses and networking parameters from the internet service provider (ISP), reducing the need for a network administrator and a user to assign IP addresses to all network devices manually.
Situation 1: Investigation of the Victim, Alibi, and Conspirator.
Alibi defense does not play an essential role in a conspiracy theory. Conspiracy is an agreement between two lawless persons to commit a crime, and one of the parties must agree to engage in an overt act in furtherance of the crime.
Research Question 1:1. Develop a measurable research framework relative to the user computer and internet technologies, criminal Modus Operandi, (MO) motive, intent, conspiracy theory, and dynamic host configurations protocol (DHCP) server to amplify conclusive evidence in court.
Research Question 1:2. To what extent are the significant differences between the Victim and the suspect?
Research Question 1:3. To what extent are the significant differences between the suspect and Alibi
Research Question 1:4. To what extent are the significant differences between Alibi and conspirators?
Situation 2. The Alibi can exercise the constitutional right to remain silent, granting the alibi opportunity to reposition the witness other than the crime scene.
Research Question 1.5. Develop a measurable research framework allowing the forensic investigator to use computer and internet technologies, criminal modus operandi (MO), motive, intent and, bootstrap protocol (BOOTP) to gather data and information on more than one crime scene for the same case.
Situation 3: A Judge can be suspicion of the alibi evidence. The burden of proof often rests on the prosecutor, who must prove that the suspected Alibi is guilty beyond a reasonable doubt. The add-on burden of proof is on the forensic investigator who visited the crime scene.
Research Question 1:6 Develop a measurable research framework relative to criminal modus Operandi (MO) motive, intent, to help forensic investigator’s attempt to bring the suspected criminal to justice, only if the person was guilty.
Research Question 2.
Cybercrime Law, Computer-Integrity Crime, Fraud, and Abuse.
Preamble.
Integrity of evidence, cyber-crime, fraud, and abuse are prefaced on the assumption that computer and internet technologies are designed to make life easier for a public and private organization, the judicial system, and forensic investigators; it has, unfortunately, made life incredibly challenging and enduring in all levels of forensic investigation. Cyber-crime, fraud, abuse, are open-ended criminal operations, allowing unauthorized users to obtain information from various sources against a target organization. Naturally, criminals are endowed with extraordinary skills and expertise to break into any organization’s secured network center. Most criminal are have access automated freeware tools available on computer and Internet and breaks into the organization’s secured network system, data, assets, resources, to make forensic investigation exceedingly tricky. Most organizations and the global community are actively using computer and internet technologies to build four walls around security data storage centers, creating an opportunity for forensic investigator’s ability to produce reliable evidence. Similarly, organizations and the global defensive approach require a proactive plan of action to guide against data breach. This section examines the primary federal statutes used to prosecute cybercrime. The focus is on the Computer Fraud and Abuse Act and the statutes criminalizing identity theft, child pornography, and copyright and trademark offenses (Casey, 2011: 86-95).
Computer Fraud and Abuse Act
The Computer Fraud and Act, Abuse is the primary source of federal law related to computer cybercrimes, and approval of the Computer Fraud and Abuse Act (CFAA) in 1986. The amendments were designed to update specific Arts provisions in light of advancements in computer and internet technologies and to address loopholes that existed in earlier versions of the Act. Criminals gaining unauthorized access to a computer, disseminating malware, launching denial of service attacks, trafficking passwords, and using computers and the internet to commit fraud. Criminals are sophisticated and can intentionally use the computer and internet technologies without authorization.
Research Question 2:1. Develop a measurable research framework of hos computer fraud and Abuse Act (CFAA) can play a role during the forensic investigation and impact on conclusive evidence in court.
Research Question 2:2. To what extent can the computer fraud and Abuse Act (CFAA) of 1986 empowers forensic investigation to bring cyber-crime, fraud, and abuse to justice.
Situation 1.
Naturally, criminals often retain extraordinary skills and expertise to break into any
organization’s secured network center. The criminal fully utilizes automated freeware
tools available on computers and the Internet and breaks into the organization’s secured network system, data, assets, resources, and makes forensic investigation exceedingly.
- These extraordinary skills, expertise, and availability of automated freeware tools are creating a considerable obstacle against the forensic investigation process. We are the nation of law.
Question 2:3. Develop a measurable research framework of amendment items needed to strengthen the computer fraud and Abuse Act (CFAA), and expand forensic investigator authority over criminal activities.
Assignment 2 ) —– Attached a document below, please take a look
Assignment 1 is Due on 12/6/2020 and Assignment 2 is due on 12/3/2020
NO PLAGIARISM
FOLLOW APA FORMAT
Need 3 Pages
need help in homework
The reading this week discusses strategy and how ERM can be integrated with an organization’s overall strategy. Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications.
CPSC 355 Assignment 3
Armv8 Assembly
Encryption:
Encryption:
1. Read keys from user input. Prompt the user to enter a character for each key. 2. Read the plain text (“data”) from the input file. The name of the input file is one of the command line argument. 3. Implement your encryption algorithm. 4. Encrypt “data” and write to a file. (The name of the file is chosen by the programmer.)
Decryption: 1. Read keys from user input. Prompt the user to enter a character for each key. 5. Read the file that encrypted data was saved and extract the encrypted “data”. The name of the encrypted file is one of the command line argument. 2. Implement your decryption algorithm. 3. Decrypt the “data” and write to a file.