Application title: Mobile Phone Purchase

  

Application title:  Mobile Phone Purchase

Purpose:  This windows application calculates the cost for a mobile phone from the Mobile Phone Store.

Program 

Procedures:  From a windows application, a buyer selects a mobile telephone for purchase. The buyer also can elect to buy a charger for the particular phone. A buyer is either in the store or is buying over the internet. The program calculates the cost of the phone and charger purchased.

Algorithms, Processing, and conditions:

1. The consumer enters their last name, street address, and zip code. If buying over the internet, the buyer also enters an email address.

2. The buyer selects a phone from a list of phones.

3. The user can select the type of charger from the list of chargers.

4. Based on the phone and charger selected, the program calculates the total cost.

5. The total cost for a store purchase must include 7.75% sales tax. No sales tax is included for internet sales.

6. An internet sale generates a shipping charge of $28.00.

7. The types of phones an their costs are: Blasstur 451: $279.81; Elecque 9801: $193.71; Gainlet 3: $328,44; Nomadic 2900: $253.72; Querta 332: $479.36.

8. Three types of chargers are available: Auto: $63.92; Mobile: $42.66; Desktop: $27.31.

9. Write a comma-delimited text file to record each sale. The text file should contain the user last name, zip code, phone choice, charger style, and total cost.

Notes and Restrictions:

1. Validate data the user enters using accepted standards.

2. In-store is the default of buyer.

3. The Email label and text box does not display unless the user is an Internet buyer. An Internet buyer must enter an email address.

Comments:

1. The picture shown in the application has been inlcuded. Its name is cell phone.jpg.

2. The program should use a three-tiered structure with presentation, business, and persistence classes.

USE CASE DEFINITION

1. The user views the opening screen

2. the user enters last name, street address, and zip code

3. The user selects a phone from the phone choice list and, if desired, a charger from the charger style list.

4. The user selects either In-store or Internet as the type of buyer. If an Internet buyer, the user must enter an email address.

5. The user clicks the Calculate Cost button.

6. The program displays the cost of the sale.

7. The program writes a record of the sale in a text file.

8. The user can click the clear form button to enter another sale.

Other notes: I need an event planning document and the entire VB project

Penetration testing

Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

  • What is penetration testing
  • Testing Stages
  • Testing Methods
  • Testing, web applications and firewalls

Cache Memory jan 21

Assignment Content

  1. Even though this class is new to you, none of you should be new to Computer Architecture as it exists in the real world…in fact, everyone who has used an iteration of computer architecture over the years and this is evidenced by the Desktop or laptop computers you own.

    For this week’s assignment, Please provide a write-up as an answer to the question below

    Why is the cache memory so important to a computer’s performance even though all systems have MAIN MEMORY (RAM)?

    As part of this assignment, make sure to answer the following sub-questions as part of your assignment

    • Explore the different types of Cache memory and how they differ from one another?
    • How the cache memory differs from the main memory (RAM) in terms of functions?
    • You should submit at least TWO FULL PAGES OF CONTENT…meaning sources, title, etc. do NOT count…be sure to include any reference material you used…

      If you have any questions about the assignment, what I am asking for or anything else, please let me know…

      Good luck…

mobile application 2

  

1. Mobile app security and vulnerabilities are increasing appearing in the media headlines. Discuss the current state of mobile app security and what steps can be introduced to improve the situation within the Mobile App Development process, the mobile platforms and within the app-store-ecosystem.

 

Article 1

Article Reviews 

You will write a 2 page review/abstract/summary on an article from a peer reviewed scholarly journal. This is to assess your ability to select and summarize the research of others, analyze and apply the research of others, and communicate professionally and effectively to their regard. However, the most important rationale for this assignment is for you to see how statistical analysis is presented. 

Instructions: 

1. Use the library system (https://www.ucumberlands.edu/library) or online catalog to locate a journal article that pertains to your research, thesis, or area of interest. The article you chose should have performed some statistical analysis of gathered data and made an inference using something other than just the average (mean). That is, they can’t just talk about averages; they must have used one of these tests: t-test, chi-square, F-test, Fischer test, ANOVA, MANOVA, ANCOVA, Mann-Whitney, correlation, regression. 

2. Read the article thoroughly. 

3. Write a 2-page summary about the article following the given guidelines. Guidelines: 1. 

Your review should include: 

a. The question/problem being researched by the author 

b. The experiment that will answer the question 

c. How they collected data 

d. Analysis of the data (Must identify the statistical test used) 

e. Their conclusion or findings

 2. Your review can be single spaced or double spaced in at least 11 pt font. 

3. You should make a bibliography to list the article you chose and practice APA format. NOTE: The APA Guidelines address specifically how the reference page is title and how articles are provided! Note: It is not called Bibliography. 

4. Graphs or visual representations are not needed for this assignment. 

5. A title page is not required, but you may include one if you want to practice APA style. If you have a title page, your submission is 4 pages. If you do not  have a title page, your submission is 3 pages. Do not go over. There are points associated with following the directions.

 6. Your grade on these assignments will be based on the rubric below. 

FOLLOW THESE GUIDELINES.

Algorithms Coding assignment.(4 problems- 2 Theory and 2 coding questions)

 Problem 1: Knapsack Variant  (Pseudocode)
                  Consider the following version of Knapsack. Given are two weight limits W1 and W2, where W1 ≤ W2. Given are also n items (w1, c1),(w2, c2), . . . ,(wn, cn), where wi is the weight and ci the cost of the i-th item. We want to find a subset of these items of the highest cost, where the subset weights at least W1 and at most W2. Give an O(nW2) algorithm for this problem. (Re Block Crusher (Kattis) call that the cost (respectively weight) of a subset is the sum of the costs (respectively weights) of the items in the subset.) 

 Problem 2: Minimum Spanning Tree with Repeated Costs (Proof)
                  Consider the Minimum Cost Spanning Tree problem on an undirected graph G = (V, E) with a cost ce ≥ 0 on each edge, where the costs may not all be different. If the costs are not all distinct, there can in general be many distinct minimum-cost solutions. Suppose we are given a spanning tree T ⊆ E with the guarantee that, for every e ∈ T, e belongs to some minimum-cost spanning tree in G. Can we conclude that T itself must be a minimum-cost spanning tree in G? Give a proof or counterexample with explanation. 

Problem 3: Block Crusher (Kattis)
                 Solve the “Block Crusher”, which you can find at this web address: https://open.kattis. com/problems/blockcrusher This is a coding problem; be sure to follow the relevant instructions for testing and submitting. 

Problem 4:  Continuous Median (Kattis)
                   Solve the “Continuous Median” problem, which you can find at this web address: https: //open.kattis.com/problems/continuousmedian This is a coding problem; be sure to follow the relevant instructions for testing and submitting. An O(n 2 ) algorithm will not be fast enough to pass all the tests, and will receive at most 3 points out of 10. You need to get the running time down to o(n 2 ), and ideally, O(n log n).
Hint 1: Suppose “median” in the problem statement were replaced by “min” (or “max”). How would you solve that problem? Suppose we added the additional condition that, after even-numbered inputs, you must return the min value, and thereafter treat it as having been deleted from the data set. How would you solve it now?
Hint 2: Notice that the median element is (ignoring rounding for now) the maximum element of the bottom half of the input, and the minimum element of the top half of the input. How can you make use of that fact?
Hint 3: Choosing the right data structure is essential. 

SEED Lab – RSA Encryption and Signature Lab – Section 2, Lab Task 3.1 – 3.3

You are required to submit your code (as demonstrated in the lab manual) and running results (with comments if necessary).

An Industrial-Grade RSA System.

The RSA Corporation put out a number of public challenges with monetary rewards to factor some very large RSA moduli. RSA no longer offers such challenges, but RSA-640 was the last of these challenges that they put out in 2001 to be factored. The factorization was announced in 2005 by a team of scientists and it took 30 2.2GHz-Opteron-CPU years (in over 5 months of calendar time).

RSA-640 has 193 decimal digits (640 bits)

RSA-640 = 310741824049004372135075003588856793003734602284272754572016194882320644051808 150455634682967172328678243791627283803341547107310850191954852900733772482278 3525742386454014691736602477652346609

In the following tasks, use hexadecimal format for all numbers in your code:

Find the two prime factors and verify that they are indeed the factors of RSA-640. (Use VirtualBox and Openssl and BIGNUM library).

600 essay in 2 hours

Discuss the current methodologies used to secure wired or wireless networks via current Firewall technologies and the potential exposures that currently exist

software -3b

 

Assignment Description

Please read chapter 5 textbook and review page 42  to 46 PP slides Chapter 5, (Examples of Application Types). 

1) Transaction processing applications/systems? (Provide a couple of examples).

2) Data Processing Applications/systems? (provide a couple of examples)