Other Programming & Computer Science Answers

Questions: 1 727

Answers by our Experts: 1 357

Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Search & Filtering

Describe the basic elements of an instruction cycle and the role of interrupts



Identify the infrastructural requirements and security issues that must be addressed when adopting mobile commerce as another channel of business transaction.                

 


Locate where cookies are stored on your computer. (They are probably in a folder entitled “Cookies” within your browser program.) List the top 10 cookies you find and write a brief report describing the kinds of sites that placed the cookies. 

What purpose do you think the cookies serve? Also, what do you believe are the major advantages and disadvantages of cookies? In your opinion, do the advantages outweigh the disadvantages, or vice versa? Motivate your viewpoint. 


Discuss the relative advantages of point-to-point interconnection compared to bus interconnection


Q1. Upper case ASCII letters A to Z are represented by the denary numbers 65 to 90; lower case ASCII letters a to z are represented by the denary numbers 97 to 122. The decimal value is converted to 7-bit binary. To encrypt any letter its 7-bit binary value is combined with a 7-bit secret key using bitwise XOR. A 3-letter word has been encrypted one letter at a time. The encrypted word is OQv. If the secret key is 0111000 what was the original (plaintext) message? 


Q3. Use the RSA cipher to decrypt the word TfG. The public key is N=221, e=5. Decrypt a single letter at a time. You may use an Excel spreadsheet but for full marks you must explain each step of your calculation.


Q4. Alice's RSA public key [N:e] is stored in binary as [1111010011000111:00001011]. Eve wants to find Alice's private key by factorising N. (a) What are the factors of N and what is Alice's private key?


Describe the comparison between WHMIS, HAZCOM 2012 and GHS Hazard Classification and Communication System? 


 

4. Formal description of the MIB

For this part, we will offer you a simplified MIB in the Appendix. According to an informal description, you must format this MIB in accordance with the SMI-v2 standard. Pay particular attention to how a table should be described, and to the DESCRIPTION field of each object.

- Name the module containing the MIB using the following format: studentName-StudentID-MIB,

- Choose the OID (Object Identifier) ​​of each element,

- Define a coherent tree structure,

- Use the ASN.1 syntax for the types of the elements.

-Write the complete MIB in text format using the SMI-v2 standard

 

5. Appendix

A-The elements to consider for the design of the MIB are:

1- Percentage of free CPU "freeCPULoad"

2- Percentage of unallocated memory "freeMemoryLoad"

3- If the workstation is an "isWebServer" web server

4- The operating system version "version"



Give the expected results of the following "R" commands. ( you need not copy the question in your answer sheet; just write the "R" output).


R command


1. > a = 5;a



2. > x=5

> y=2

> x/y



3 . > x = c ( True, False, 0,6)

>!x


4 . > x = 1:7; x



5. > x = matrix (1:12, 4, 3); x



LATEST TUTORIALS
New on Blog
APPROVED BY CLIENTS