Digital Logic Lab- secret key of 6 bits

It is a project for digital logic.

Project report requirements:
o A brief description of the design process you used to obtain the circuits. Be sure to point
out  why  you  chose  a  particular  design,  along  with  the  steps  you  took  to  minimize  the  
amount of hardware required. This includes
 State diagram
 State reduction
 Final (reduced) state table
o Include all design elements, such as truth tables, state diagrams, tables, etc,
o Test the device in the simulator. Include a test plan:
 Include your secret code for verification
 Example inputs, expected outputs and what happened when you tested.
 Descriptions, along with a detailed explanation of what simulations you did, what
they show, to demonstrate that the circuit works properly under “all” circumstances.
NOTE that all Logisim implementations must meet all labeling requirements, as established at the
start of the semester (see Lab 1)
Project Description
There  are  many  security  and  access  control  devices  on  the  market  that  attempt  to  prevent
unauthorized access to secured areas. One such device is a key-pad based device. To unlock the
door, you must enter a secret decimal code. For example, say a device accepts a 4-digit decimal
code, 1234. The device will unlock the door when “1234” is entered, but it will not unlock if “123”
or “123411” is entered.
For your final project, you are to design an access control system based on a sequence of 6 bits
that accepts a 1-bit at a time, either 0 or 1. This could be implemented with a 2-button keypad (o
and 1), used to enter the binary code.  
A second input functions as the Enter key, which ends the key code entry. As the key is entered,
the device outputs Enter = 0 until the input sequence terminates. If the input sequence matches the
access code, then output Enter =1  (for example LED lights up), which will unlock the door in a
full implementation. The secret code is preset: choose your own code (see below).
After two unsuccessful attempts (i.e. the secret code was not matched), the system shuts down and
won’t  accept  any  more  bits,  and  an  alarm  is  triggered.  Thus,  your  circuit  has  a  second  output
Alarm, which is set to 1 after two unsuccessful attempts.
Extra credit: Add a reset to the system that presumably only the owner could control: when the
reset key is inserted, the system is again enabled and can accept bits again. You can code the reset
as either 0 (no key) or 1 (key inserted) for this project.
Secret code:  
 Each of you has their very own secret code: no 2 people in the class can have the same
code
 Your code can NOT be a simple sequence of all 1s or all 0s, and must contain a minimum
of 2 ones and 2 zeroes

DATABASES- 16 QUESTIONS

QUESTION 5

Create the ERD to show the relationship between STORE and REGION. 

SEE IMAGE LINK: https://cnow.apps.ng.cengage.com/ilrn/books/co3ds13h/Images/image030.gif

Make sure that the file is saved as ch3_question5_Deleon.doc

————————————————————————–

QUESTION 6

Create the relational diagram to show the relationship between STORE and REGION. 

SEE IMAGE LINK: https://cnow.apps.ng.cengage.com/ilrn/books/co3ds13h/Images/image030.gif

Make sure that the file is saved as ch3_question6_Deleon.doc

————————————————————————————–

QUESTION 8

Create the ERD to show the relationships among EMPLOYEE, STORE, and REGION. 

SEE IMAGE LINK: https://cnow.apps.ng.cengage.com/ilrn/books/co3ds13h/Images/image030.gif

Make sure that the file is saved as ch3_question8_Deleon.doc

————————————————————————————–

QUESTION 9

Create the relational diagram to show the relationships among EMPLOYEE, STORE, and REGION. 

SEE IMAGE LINK: https://cnow.apps.ng.cengage.com/ilrn/books/co3ds13h/Images/image030.gif

Make sure that the file is saved as ch3_question9_Deleon.doc

————————————————————————————————-

QUESTION 11

Create the ERD to show the relationship between EMPLOYEE and JOB. 

SEE IMAGE LINK: https://cnow.apps.ng.cengage.com/ilrn/books/co3ds13h/Images/image036.jpg

Note that the database is composed of four tables that reflect these relationships: 

  • An EMPLOYEE has only one JOB_CODE, but a JOB_CODE can be held by many EMPLOYEEs. 
  • An EMPLOYEE can participate in many PLANs, and any PLAN can be assigned to many EMPLOYEEs. 

Note also that the M:N relationship has been broken down into two 1:M relationships for which the BENEFIT table serves as the composite or bridge entity.

Make sure that the file is saved as ch3_question11_Deleon.doc

———————————————————————————————

QUESTION 12

Create the relational diagram to show the relationship between EMPLOYEE and JOB. 

SEE IMAGE LINK: https://cnow.apps.ng.cengage.com/ilrn/books/co3ds13h/Images/image036.jpg

Make sure that the file is saved as ch3_question12_Deleon.doc

————————————————————————————————–

QUESTION 15

Create the ERD to show the relationships among EMPLOYEE, BENEFIT, JOB, and PLAN. 

SEE IMAGE LINK: https://cnow.apps.ng.cengage.com/ilrn/books/co3ds13h/Images/image036.jpg

Make sure that the file is saved as ch3_question15_Deleon.doc

————————————————————————————————–

QUESTION 16

Create the relational diagram to show the relationships among EMPLOYEE, BENEFIT, JOB, and PLAN. 

SEE IMAGE LINK: https://cnow.apps.ng.cengage.com/ilrn/books/co3ds13h/Images/image036.jpg

Note that the database is composed of four tables that reflect these relationships: 

  • An EMPLOYEE has only one JOB_CODE, but a JOB_CODE can be held by many EMPLOYEEs. 
  • An EMPLOYEE can participate in many PLANs, and any PLAN can be assigned to many EMPLOYEEs. 

Note also that the M:N relationship has been broken down into two 1:M relationships for which the BENEFIT table serves as the composite or bridge entity.

Make sure that the file is saved as ch3_question16_Deleon.doc

———————————————————————————————-

QUESTION 22

Create the ERD for this database. 

SEE IMAGE LINK: https://cnow.apps.ng.cengage.com/ilrn/books/co3ds13h/Images/image039.jpg

Make sure that the file is saved as ch3_question22_Deleon.doc

———————————————————————————————

QUESTION 23

Create the relational diagram for this database. 

SEE IMAGE LINK: https://cnow.apps.ng.cengage.com/ilrn/books/co3ds13h/Images/image039.jpg

Make sure that the file is saved as ch3_question23_Deleon.doc

———————————————————————————————-

QUESTION 25

Create the ERD. (Hint: Look at the table contents. You will discover that an AIRCRAFT can fly many CHARTER trips but that each CHARTER trip is flown by one AIRCRAFT, that a MODEL references many AIRCRAFT but that each AIRCRAFT references a single MODEL, and so on.) 

SEE IMAGE LINK: https://cnow.apps.ng.cengage.com/ilrn/books/co3ds13h/Images/image043.jpg

Make sure that the file is saved as ch3_question25_Deleon.doc

———————————————————————————————

QUESTION 26 

Create the relational diagram.

SEE IMAGE LINK: https://cnow.apps.ng.cengage.com/ilrn/books/co3ds13h/Images/image043.jpg

Make sure that the file is saved as ch3_question26_Deleon.doc

——————————————————————————————

QUESTION 27

Modify the ERD you created in Problem 25 to eliminate the problems created by the use of synonyms. (Hint: Modify the CHARTER table structure by eliminating the CHAR_PILOT and CHAR_COPILOT attributes; then create a composite table named CREW to link the CHARTER and EMPLOYEE tables. Some crew members, such as flight attendants, may not be pilots. That’s why the EMPLOYEE table enters into this relationship.) 

SEE IMAGE LINK: https://cnow.apps.ng.cengage.com/ilrn/books/co3ds13h/Images/image043.jpg

Make sure that the file is saved as ch3_question27_Deleon.doc

——————————————————————————————————-

QUESTION 28

Create the relational diagram for the design you revised in Problem 27. 

Make sure that the file is saved as ch3_question28_Deleon.doc

————————————————————————————————

QUESTION 29

You want to see data on charters flown by either Robert Williams (employee number 105) or Elizabeth Travis (employee number 109) as pilot or copilot, but not charters flown by both of them. Create the table that would result from applying the SELECT and PROJECT relational operators to the CHARTER table to return only the CHAR_TRIP, CHAR_PILOT, and CHAR_COPILOT attributes for charters flown by either employee 105 or employee 109. 

SEE IMAGE LINK: https://cnow.apps.ng.cengage.com/ilrn/books/co3ds13h/Images/image043.jpg

Make sure that the file is saved as ch3_question29_Deleon.doc

———————————————————————————————————-

QUESTION 30

You want to see data on charters flown by either Robert Williams (employee number 105) or Elizabeth Travis (employee number 109) as pilot or copilot, but not charters flown by both of them. Create the table that would result from applying a DIFFERENCE relational operator of your result from Problem 29 to your result from Problem 30. 

SEE IMAGE LINK: https://cnow.apps.ng.cengage.com/ilrn/books/co3ds13h/Images/image043.jpg

Make sure that the file is saved as ch3_question30_Deleon.doc

Create ERD

Create an ERD diagram using Visio with tables, keys, columns, relationships.  Primary and Foreign keys need to be identified in this diagram. 

Topic Products parents use diapers, baby formula, wipes etc. 

Database Model Draft

 

Create a database model according to the following steps:

  • Create a simple class diagram containing three classes: Vehicle, Car, and Truck. Provide two attributes for each of these three classes.
    • Create a rough sketch of a relational table that will store the objects belonging to the aforementioned three classes.
    • Ensure you have tried all three options—single table, two tables, and three tables—in your database design.
    • Enter two objects per table, corresponding to the classes.
  • Use the two-table design to recreate a Car object.
  • Repeat the preceding step to recreate a Truck object.
  • Create a simple association relationship in a separate class diagram showing Driver and Car.
    • Apply a multiplicity of 1 on the driver side and N on the Car side.
  • Add/modify your table designs to handle storing of two objects belonging to Car and two belonging to Driver.
    • Modify the multiplicity on the Driver side to N. This makes it a many-to-many multiplicity.
  • Modify your table designs to handle this multiplicity and show where and how the KEYS or IDs will have to be placed.
  • Create a class diagram corresponding to the tables you have designed. Stereotype all classes on that class diagram as < >.

    Power point presentation,

    you have been introduced to various security tools (Network Discovery, Network Scanning, DLP, Firewalls, and HIDS).  You are to take one of the five identified categories of tools and identify two specific products from different vendors.  Based on two products, please research the differences and similarities between the two products.  You should also evaluate the implementation issues you may face with each product.  Based on your research, please create a PowerPoint or a similar presentation to explain your research and your findings of the tools.  The presentation should be comparative in nature as to highlight the similarities between the two products you researched.

    The presentation must contain the following:

    • Product Background
    • Pros and Cons of each product
    • Side by Side comparison
    • Recommendation

     PowerPoint Requirements

    1. Easy to follow and understand
    2. Ratio of words to background (Essentially, not too many words on a slide.  Highlight the essentials)
    3. Graphics – Charts, Graphs, Illustrations, etc.
    4. Other – media – Audio, Video, etc.
    5. Turnitin will be completed.

    Assignment

    Research the popular Types, Pros, Cons and your company’s use of Biometric Identification devices. Remember to get permission from security. If you are not currently employed discuss what types you would recommend. 

    Instructions: Please download the Assignment 4 Biometrics Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. Once completed name your file: YourName_Assignment_4_Biometrics_Assessment.docx and submit to the appropriate assignment folder. 

    Please read through

      

    Please read through Chapter 9 very carefully. You will be instantiating client-side objects and arrays for this week’s homework assignment

    You are to create an Amazon-like Web Page that is selling whatever items you want, that are from various suppliers. Consider a standard layout like the following:

    Likely, you will need to list each of the items in your store within a form. You must have a minimum of FOUR items in your store. Just like above, you should have an image, the NAME of the product, and the PRICE of the product, for each item being sold.

    Also, you need to have under EACH of the items a button that says “Quick Look”. When the “Quick Look” button is selected, a new window (sized accordingly) should appear with the FOLLOWING information: 

    · Image

    · Product name

    · Product Description

    · Price 

    · Size

    Part 2:

    You will also need to have another button under each item that says “Check Availability”. When this button is selected a new window will appear that states the:

    · Product Name

    · How many are IN STOCK

    · Vendor Company Name

    · Vendor Shipping Address

    The second portion of the assignment will require you to have a separate array, from the product information above (refer to hint below).

    Cryptography

    discuss and explore some of the important aspects of symmetric encryption. You must use at least two scholarly resource.  Every discussion posting must be properly APA formatted. (250 words)

    Code of ethics

     IT workers have many different relationships, including those with employers, clients, suppliers, other professionals, IT users, and the society at large, and that in each relationship, an ethical IT worker acts honestly and appropriately. IT workers must set an example and enforce policies regarding the ethical use of IT. IT workers are in a unique position because they have the skills and knowledge to abuse systems and data or to allow others to do so.

    Discuss an ethical issue IT organizations face today. Have you been personally affected by an IT ethical issue? Provide examples

    Join Our Community

    subscribe to our newsletter

    Sign Up! Get rewarded with CollegeHomeworkAid, money-off vouchers & more.

    At College Homework Ai, we make the process of getting help with your homework paper easy.

    quick links

    Disclaimer

    Use of our website complies with Educational standards .

    demo-attachment-222-Group-29
    Shopping Basket