Categories
Computer Science homework help

What are the common mistakes to avoid in your program when using loops? 

1. What are the common mistakes to avoid in your program when using loops?  Use examples to explain.

Categories
Computer Science homework help

Given what we have discussed about waterfall and agile development, tell me which process do you think would work better in school projects – agile or waterfall?

I have mentioned several times that you will be doing a team project this semester…lots to do in the project and lots to manage…
You have all worked on team projects in the past…and some of you (okay, most of you…okay, all of you) have expressed concerns over doing a team projects…and you have talked about the many issues and problems that go along with a team project…
But we won’t let that happen this semester!…because this semester, we have the choice of managing the project as with waterfall or agile…
For this assignment, given what we have discussed about waterfall and agile development, tell me which process do you think would work better in school projects – agile or waterfall?…explain why you think one will work better, and why you think the other will not work as well…be VERY SPECIFIC regarding SPECIFIC class projects and SPECIFIC class project tasks, and how they line up to either agile or waterfall processes…use your past experience with group projects as a reference…
DO NOT GIVE ME DEFINITIONS…
Again, when you have completed this, you should have 1 to 2 pages…if you have any questions about anything, just let me know…

Categories
Computer Science homework help

· Assuming SSB wishes to continue using only 3DES as its cryptographic system, what could SSB and Alice have done to protect against this controversy arising?

Short Research Paper #1 – Alice and Super Secure Bank
Prepare a short research paper of approximately 5 pages, double-spaced, exclusive of cover, title page, table of contents, endnotes and bibliography.  Your paper must use APA formatting with the exception that tables and figures (if used) can be inserted at the appropriate location rather than added at the end.  Submit the paper in your assignment folder as a Microsoft Word attachment (.docx or .doc format) with the following file name: yourlastnameSSB.doc
For example, a submission file would be called JonesSSB.doc
Alice, a high net worth customer, banks on-line at Super Secure Bank (SSB) and has agreed to use 3DES in communicating with SSB. One day, Alice received a statement that shows a debit of $1,000,000 from her account. On inquiring, she was told that the bank manager, Bob, transferred the money out of Alice’s account and into an account of his own in an offshore bank. When reached via long distance in the Cayman Islands, Bob produced a message from Alice, properly encrypted with the agreed upon 3DES keys, saying: “Thanks for your many years of fine service, Bob. Please transfer $1,000,000 from my account to yours as a token of my esteem and appreciation. Signed, Alice.”
Alice filed suit against Bob, SSB and the government of the Cayman Islands, claiming that the message was a forgery, sent by Bob himself and asking for damages for pain and suffering.  Bob has responded by claiming that all procedures were followed properly and that Alice is filing a nuisance suit. You have been employed by SSB as a cryptographic expert to assist in the investigation of this matter, and will produce a report for the SSB Board of Directors, which will assist them in determining how to proceed in this matter.
Your report to the Board of Directors should address the following issues:
· What can be determined from the facts as presented about whether Alice intended to make Bob a gift of $1,000,000?
· Assuming SSB wishes to continue using only 3DES as its cryptographic system, what could SSB and Alice have done to protect against this controversy arising?
· Would this controversy have arisen if SSB had been using AES rather than 3DES?
Your report should clearly address these issues, with sufficient detail and background to allow the “cryptographically challenged” Board of Directors to understand the issues involved and formulate plans for how to approach the immediate issue with Alice, and to continue business in the future, assuming that they want to continue using 3DES.
Please Note: It is not required in this paper to provide a detailed explanation of the 3DES encryption algorithm.

Categories
Computer Science homework help

List and briefly define three newer nonvolatile solid-state memory technologies.

Question 1
Application of Amdahl’s Law:
Answer the following two questions and show your work:
What is the overall speedup if you make 15% of a program 85 times faster?
What is the overall speedup if you make 85% of a program 15 times faster
Question 2
Consider a dynamic RAM that must be given a refresh cycle 64 times per ms. Each refresh operation requires 150 ns; a memory cycle requires 250 ns.
What percentage of the memory’s total operating time must be given to refreshes? Explain your answer and show your calculations.
Question 3
List and briefly define three newer nonvolatile solid-state memory technologies.
Question 4
What is the difference between DRAM and SRAM in terms of application? What is the difference between DRAM and SRAM in terms of characteristics such as speed, size, and cost?

Categories
Computer Science homework help

What is the significance of cache memory on computer performance?

What is the significance of cache memory on computer performance?
Explain how the principle of locality affects caching?
What does associativity mean in the context of caches?

Categories
Computer Science homework help

When a device interrupt occurs, how does the processor determine which device issued the interrupt?

Assignment Content
Question 1
In virtually all systems that include DMA modules, DMA to main memory is given higher priority than CPU access to main memory. Why?
Question 2
When a device interrupt occurs, how does the processor determine which device issued the interrupt?
Question 3
A system is based on an 8-bit microprocessor and has two I/O devices.
The I/O con- trollers for this system use separate control and status registers.
Both devices handle data on a 1-byte-at-a-time basis.
The first device has two status lines and three control lines.
The second device has three status lines and four control lines.

How many 8-bit I/O control module registers do we need for status reading and control of each device?
***Explain your reasoning and show your mathematical calculations on how you derived your answer

Question 4
A system is based on an 8-bit microprocessor and has two I/O devices.
The I/O con- trollers for this system use separate control and status registers.
Both devices handle data on a 1-byte-at-a-time basis.
The first device has two status lines and three control lines.
The second device has three status lines and four control lines.

What is the total number of needed control module registers given that the first device is an output-only device?
***Explain your reasoning and show your mathematical calculations on how you derived your answer
Question 5
A system is based on an 8-bit microprocessor and has two I/O devices.
The I/O con- trollers for this system use separate control and status registers.
Both devices handle data on a 1-byte-at-a-time basis.
The first device has two status lines and three control lines.
The second device has three status lines and four control lines.

How many distinct addresses are needed to control the two devices?
***Explain your reasoning and show your mathematical calculations on how you derived your answer
Question 6
Consider a microprocessor that has a block I/O transfer instruction such as that found on the Z8000.
Following its first execution, such an instruction takes five clock cycles to re-execute.
However, if we employ a nonblocking I/O instruction, it takes a total of 20 clock cycles for fetching and execution.

Calculate the increase in speed with the block I/O instruction when transferring blocks of 128 bytes.
**Explain your reasoning and show your mathematical calculations on how you derived your answer

Question 7

What is the difference between memory-mapped I/O and isolated I/O?

Categories
Computer Science homework help

Discuss at least two unique circumstances that an organization may face while testing software.

Discuss at least two unique circumstances that an organization may face while testing software. Respond to two peers by discussing a suitable testing method to use for each situation.

Categories
Computer Science homework help

What is your approved research question from the Brainstorming Research Question HW assignment?

Assignment Content
STOP!  Have you watched the two, past assigned, short videos on APA 7 Title Page and References Page? If not, you must do that first, because this submission requires both.
In class today, you were asked to find your first research article that explores your approved research question. (DO NOT ATTEMPT THIS ASSIGNMENT UNLESS YOU HAVE COMPLETED THE PREVIOUS ASSIGNMENT and gained approval: Brainstorming and Research Question.)
For this assignment, I want you to create a single, APA 7-compliant, Word document. To earn full credit, you must do the following:

Page 1 = 20 pts: Proper APA 7 Title Page (watch the video and see p. 31 in the Foundations text to help you create a perfect title page)
Page 2 = 60 pts (breakdown below): Simply answer the following questions
(1) What is your approved research question from the Brainstorming Research Question HW assignment? (5 pts)
(2) What is the title of the research article you found? (5 pts)
(3) Does the article contain the methodology the researchers used to conduct the study/research? To get full credit, you must (a) name the methodology, (b) cut and paste the paragraph from the article that details the methodology, AND (c) highlight indicator words. (30 pts)
(4) Does the article contain findings or results of the research? To get full credit, you must (a) cut and paste excerpts from the article that detail the findings (go to Discussion section or at times Conclusion), AND (b) highlight specific words that detail the findings. (20 pts)
Page 3 = 20 pts: Create a proper APA 7 References Page with your ONE research article (refer to the video and see pp. 33-34 for the FORMAT you must use to create your reference and p. 32 for a perfect sample of what a References Page looks like.)

Categories
Computer Science homework help

How can you adapt the principles for your hospital case?

Business Case: Local Hospital’s data center
Companies spend billions on security each year, yet why is this still an issue? It’s almost 2019 and still, most applications are horribly insecure and security best practices are not followed. Applications are designed for functionality, not security because security is seen as difficult and time-consuming, often blamed for adding delays to product launches and revenue-generating activities. Assume; you are an IT manager at the regional Hospital and answer the following questions.
Where the Local Hospital’s parameters are:  600 patients a day, and 250 full-time employees. The hospital has a data cent with all IT assets (Databases, Servers, Data storage, Network devices) to support the Hospital’s Business operations.
Source: https://xypro.com/enterprise-identity-access-management/risk-management-in-the-real-world-today-tomorrow-and-beyond/Links to an external site.Links to an external site.
QUESTION 1: There is a need for a new posture for cybersecurity in a networked world where your hospital is part of it.  What are principles used by some of the world’s leading cybersecurity teams at global companies to archive this goal?
How can you adapt the principles for your hospital case?
Resource: https://www.mckinsey.com/~/media/McKinsey/McKinsey%20Solutions/Cyber%20Solutions/Perspectives%20on%20transforming%20cybersecurity/Transforming%20cybersecurity_March2019.ashxLinks to an external site.Links to an external site.
QUESTION 2: Companies should assess threats and develop controls for the most critical assets.
If the threats against tour Hospital IT System are
Manipulation of software
Unauthorized installation of software
Misuse of information systems
Denial of service
What would be controls that you should apply to mitigate above listed risks?
Resurce : https://www.mckinsey.com/~/media/McKinsey/McKinsey%20Solutions/Cyber%20Solutions/Perspectives%20on%20transforming%20cybersecurity/Transforming%20cybersecurity_March2019.ashxLinks to an external site.Links to an external site.
QUESTION 3: As an IT manager, you were tasked to develop an information security and risk management (ISRM) strategy which requires a multiphase approach. What are the phases that would should follow to provide recognizable results and value to the Hospital?
Resources: https://www.isaca.org/resources/isaca-journal/past-issues/2010/developing-an-information-security-and-risk-management-strategy

Categories
Computer Science homework help

What type of Multifactor authentication (MFA) you would recommend for the customers to access data in the cloud? 

Pink Sky  Entertainment is an online music sales company. The company has been keeping thousands of Movie Soundtracks, Videos, and Pictures from movies and resale them via their online store.
Here are the current databases under Pink Sky   Datacenter  (on-premises).
Databases for customers to reach
Database 1: Movie Soundtracks
Database 2: Videos
Database 3: Pictures
Databases for Employees (workforce members) to reach
Database 4: HR
Database 5: Payroll
Database 6: Heath insurance
Please address the Pink Sky   Entertainment Company manager’s expectations and requirements.
Question 1: Pink Sky Entertainment products  ( Databases  1, 2, and 3) will be moved to the cloud:  How you can address the security concerns in terms of Authentication and Credentials of the user? What type of Multifactor authentication (MFA) you would recommend for the customers to access data in the cloud?  The options for MFA. Please refer to the given CSA security guidance document Section 12.1.3.
Question 2: Pink Sky   Entertainment Company managers would like to have online customers access various sections of the website (Movie Soundtrack, Videos, and  Pictures)  by having only one account. Pink Sky   Entertainment has many products like videos from movie clips, pictures of movie stars in addition to sound files.  They would like to let customers access their accounts from one central dashboard, enhancing their user experience. When shifting between each one (for example from the music section to the pictures section), the site should re-authenticate customers with the same credentials. What is your Identity as a Service solution for this case?
Question 3: Pink Sky  Entertainment Company managers would like to have customers be able to login into their system using their Facebook account credentials. Pink Sky   Entertainment IT system should use Facebook account credentials to identify the customer. What is your Identity as a Service solution for this case?