Convert the following C++ program into an x86 assembly language program. Make sure to use your “Chapter 8” understanding of advanced functions, parameter passing, and local variables. Post ONLY your ASM file here to Blackboard when complete

 #include

using namespace std;

int IsSemifauxtrifactored(int value)
{
    // Return 1 if a number’s factors/divisors from (value – 1) to 1 sum up to a quarter of the number value
    // Return 0 otherwise

    // A number is called “semifauxtrifactored” if its summed factors/divisors equal a quarter of the number itself
    // Integer division is used, so remainders on the halving can be lost
    // That’s why…

    // 7 is a semifauxtrifactored number
    // 7 divided by 4 with integer division is (7 / 4) = 1
    // 7 % 6 -> 1
    // 7 % 5 -> 2
    // 7 % 4 -> 3
    // 7 % 3 -> 1  
    // 7 % 2 -> 1  
    // 7 % 1 -> 0   FACTOR!
    // 7 is a semifauxtrifactored number since its factors (1) equal a quarter of the number (1)

    // 6 is a normal number
    // 6 divided by 4 with integer division is (6 / 4) = 1
    // 6 % 5 -> 1
    // 6 % 4 -> 2
    // 6 % 3 -> 0   FACTOR!
    // 6 % 2 -> 0   FACTOR!  
    // 6 % 1 -> 0   FACTOR!
    // 6 is a normal number since its factors (1 + 2 + 3) do not equal a quarter of the number (1)
}

int main()
{
    cout << "Enter a value: ";
    int value;
    cin >> value;
    value = IsSemifauxtrifactored(value);
    if (value == 1)
    {
 cout << "The number is semifauxtrifactored!";
    }
    else
    {
 cout << "The number is normal";
    }

    cout << endl;
    system(“PAUSE”);
} 

comparison outline

 

Software engineering tools for soft computing: MATLAB, R Tool and DTREG.  Comparison should focus on how they are able to model neural networks.  Also, pick criteria that compares things they all have in common. 

PS: The outline should look like the sample attached

DS-2

Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection? 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. 

Include an interesting meaningful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.    P lace the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be one  full sentence (no more, no less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas. Each quote must be cited in-line and at the end. 

Discussion on IRB and Protection of Human Subjects

The key proposed NPRM revision of the Common Rule’s definition of “human subject” was to include all biospecimens, regardless of identifiability. Why is this crucial? Can you give examples?

In the attached paper look for the heading “The Proposed Rule” and there you will find about NPRM.  

Need 300+ words with references and no APA format required. Check the use case properly on the question.

Wireless Security & Forensics

1) In your own words, describe the process of “validation” (per the text).

2) What are the concerns of evidence contamination? How can you protect against this issue?

3) What consent to search requirements would you have if you were asked to provide support in an investigation of a device? Please response with whatever would be necessary.

. No Plagiarism 

· Should be 400 words without References.

REFER chapter-1 to 4

!!! NEED 2  ANSWERS FOR THIS QUESTION WITH 0% PLAGIARISM !!!!

4 Questions for IT managers to be answered and analysed

You should answer 4 questions about IT technologies and its application in management and business, the important point is there must be no similarity and plagiarism  Questions must be answered two pages for each question. Questions and instruction have been attached.

ISO

 

From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?

Present your discussion post as if you were presenting to senior leaders of your company.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.