UML diagram

System Design Specifications (including System Architectural [Layered, “Physical”] Design Scheme selected; Package Diagram [populated with interrelated classes]; Database Tables; EntityRelational diagrams; Window Navigation Diagrams; Drafts of User Interfaces; and Examples of System-Response Report Forms);

graded assignment

Using a web search tool,identify cases in which private information was disclosed when computer equipment was discarded.Recent examples have included smartphones (like blackberry) that were sold without proper data cleasing and hard drives that were sold without data cleansing after the computers that were originally used in were upgraded.

Cryptography Assignment

 

In this assignment you will decipher messages that are encrypted using two of the classical ciphers. You are encouraged to do them by hand first and resort to the tool available at the link provided below or other tools you find on the Internet to automate the process.

A Substitution Cipher: What does the text say?

Exercise 1:/

IA TK MIMFL OIJK JKFLUBYUDOR ZOUNHIFS LCK TIOM SYXL GR LCK GKXBM XFM LBKWGOIFS YJKB ZBKNIZINKD TK DCYUOM FKJKB GK MKZBKDDKM IJK FY MYUGL GUL XOBKXMR DCYUOM GK AXMKM AXLXOIDLIN XFM XSKM JIBSIFIX TYYOA

Exercise 2:/

WG EGI JZZB IFZ UNURUAIZM RGT GX DGLM XMOZEWAFOB AZUNZW LB LEION DGLM XMOZEWA UMZ WZUW XONN IFZOM NOQZA COIF ACZZIEZAA ABZUJ UBBMGQOEP SFZZMOEP CGMWA CFONZ IFZOM ZUMA SUE FZUM IFZY UEW CFONZ IFZOM FZUMIA SUE RZ IFMONNZW UEW YUWZ FUBBOZM IFZ JOEW GX IFOEPA DGL YZUE IG AUD CFZE IFZD UMZ PGEZ AUD RZXGMZ IFZD PG

Exercise 3:/

LTKHNMEVKG KE CVH VRTMHEC CVKNB KN CVH WXTFM CX HAGFRKN KCE NXC EXQHCVKNB YXP FHRTN KN EZVXXF OPC KL YXP VRIHNC FHRTNHM CVH QHRNKNB XL LTKHNMEVKG YXP THRFFY VRIHNC FHRTNHM RNYCVKNB QPVRQQRM RFK

Exercise 4:/

BMBU SUWKMNMOUN LXS VXBOUBOUH TMYMBR DUQTOD UBXKRD OX FQZU GXSZ Q ITUQNKSU GUQTOD UBXKRD OX NKIIXSO EXKS BUUHN NOSUBROD OX JQOOTU GMOD HMLLMVKTOMUN QBH XYUSVXFU ODUF RSQVU UBXKRD OX VXBLUNN EXKS NMBN QBH LXSNQZU ODUF IQOMUBVU UBXKRD OX OXMT KBOMT NXFU RXXH MN QVVXFITMNDUH VDQSMOE UBXKRD OX NUU NXFU RXXH MB EXKS BUMRDJXKS TXYU UBXKRD OX FXYU EXK OX JU KNULKT QBH DUTILKT OX XODUSN LQMOD UBXKRD OX FQZU SUQT ODU ODMBRN XL RXH DXIU UBXKRD OX SUFXYU QTT QBAMXKN LUQSN VXBVUSBMBR ODU LKOKSU

You can use the tool at:

https://www.mtholyoke.edu/courses/quenell/s2003/ma139/js/count.html (Links to an external site.)Links to an external site.

WHAT to submit

For each cipher:

  1. Suggest two different ways of attacking the cipher. Make sure to indicate which attack scenario applies.
  2. Explain which of the two ways you would choose to break the cipher and why.
  3. Break the cipher and include the plaintext in your submission along with a detailed explanation of how you get the plaintext.

Also provide answers to the following questions, reflecting on your experience with this assignment:

  1. What was the most challenging part of this activity?
  2. What was the most enjoyable part of this activity?
  3. Do you think you have a good understanding of how symmetric key encryption/decryption works as a result of this activity? Why or why not?

week 1 discussion cloud computing

Write at least 500 words on fractional ownership and it’s relation to cloud computing. Use at least one example from another industry.    

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Conflict Managment Dis 5

 

Describe social bandwidth and share an experience you’ve had with this concept within your previous interactions.

Need 300 word content. Excluding references

Discussion

 Discuss the Windows Registry System Hive:  1) What information is retained in the hive?  2) Specifically, what security incident information could be gleaned from the System Hive? 

Discussion

Write a paper on the following topics:

– Who is MITRE? What are their origins? Are they still around?

– Who is NIST? What role does NIST play in cybersecurity?

The paper must be at least 300 words. It must be in APA format. You must include a title and reference page. 

p8

 

Consider the following problems, design and submit the algorithm, along with the source code, and snapshots of the running programs.

Problem 1:

Write a program that initializes an array with ten random integers and then prints out the following:

  • Every element at an even index;
  • Every even element
  • All elements in reverse order;
  • Only the first and last elements;
  • The minimum and maximum element
  • The sum of all elements
  • The alternating sum of all elements, where the alternating sum contains all elements at even index added, and the elements at odd index subtracted.

Problem 2:

Write a program that reads a sequence of input values and displays a bar chart of the values in data, using asterisks, like this:

*********************
*************************
*********
**************************

You may assume that all values are positive. First figure out the maximum value in data. That value’s bar should be drawn with 40 asterisks. Shorter bars should use proportionally fewer asterisks. Improve your program by adding caption to your bar. Prompt the user for the captions and data values. The output should look like this:

Egypt *********************

France *************************

Norway *********

Germany **************************

Problem 3:

Design and implement an application that reads a sequence of up to 25 pairs of names and postal (ZIP) codes for individuals. Store the data in an object designed to store a first name (string), last name (string), and postal code (integer). Assume each line of input will contain two strings followed by an integer value, each separated by a tab character. Then, after the input has been read in, print the list in an appropriate format to the screen.

Problem 4:

A theater seating chart is implemented as a two-dimensional array of ticket prices like presented below. Write a program that prompts the users to pick either a seat or a price. Mark sold seats by changing the price to zero. When a user specifies a seat, make sure it is available. When a user specifies a price, find any seat with that price. Verify that the price is among those offered by the theater.

10 10 10 10 10 10 10 10 10 10
10 10 10 10 10 10 10 10 10 10
10 10 10 10 10 10 10 10 10 10
10 10 20 20 20 20 20 20 10 10
10 10 20 20 20 20 20 20 10 10
10 10 20 20 20 20 20 20 10 10
20 20 30 30 40 40 30 30 20 20
20 30 30 40 50 50 40 30 30 20
30 40 50 50 50 50 50 50 40 30

Problem 5: 2D Array Operations 

Write a program that creates a two-dimensional array initialized with test data. Use any primitive data type that you wish. The program should have the following methods:

  • getTotal. This method should accept a two-dimensional array as its argument and return the total of all the values in the array.
  • getAverage. This method should accept a two-dimensional array as its argument and return the average of all the values in the array.
  • getRowTotal. This method should accept a two-dimensional array as its first argument and an integer as its second argument. The second argument should be the subscript of a row in the array. The method should return the total of the values in the specified row.
  • getColumnTotal. This method should accept a two-dimensional array as its first argument and an integer as its second argument. The second argument should be the subscript of a column in the array. The method should return the total of the values in the specified column.
  • getHighestInRow. This method should accept a two-dimensional array as its first argument and an integer as its second argument. The second argument should be the subscript of a row in the array. The method should return the highest value in the specified row of the array.
  • getLowestInRow. This method should accept a two-dimensional array as its first argument and an integer as its second argument. The second argument should be the subscript of a row in the array. The method should return the lowest value in the specified row of the array.

Demonstrate each of the methods in this program.

Submission

You are required to submit the following files for this assignment by clicking the Submit Assignment button above.

  • You should create one Java file for each problem and save them all in one folder. Compress the folder as a .zip file and submit it here. Please name your .zip file as P8-Last Name-First Nam.zip. For example, P8-Smith-John.zip
  • A Word document containing the algorithms and the screenshots of the running programs for all of the five problems. Please name your Word document as P8-Last Name-First Name.docx or .doc. For example, P8-Smith-John.docx.