Categories
Computer Science

This is a elm programming project. the question is very vague. but helpful links

This is a elm programming project. the question is very vague. but helpful links are provided. please follow them.

Categories
Computer Science

Assignment 4/5 Note that in part c of the algorithm it should be “otherwise add

Assignment 4/5
Note that in part c of the algorithm it should be “otherwise add the size of f to the total sum”

Categories
Computer Science

Write a program and flowchart, and include a snippet of your program running. Yo

Write a program and flowchart, and include a snippet of your program running.
You need to purchase some items at Hansen’s Discount Supermarket. You have a list of items but you know that when you get to the store you will most likely purchase other things. After you have selected your products at the store, you get up to the self-checkout and the scanner is broken. The manager approaches you because he knows that you are a knowledgeable programmer to help him design a small program quickly that will manually total items purchased and calculate the tax and final total of all sales. See below for the specific specifications.
You must use at least two different arrays
A character array to store the welcome message (note: when creating your flowchart you will need to declare this message with the string data type as a variable and assign the message). Use the puts() function to display the message to the screen.
An array with a float datatype to store the prices of the items
Prompt the user to enter how many items they have to total. Use a for() statement to fill the array using the value the user entered as the end point of the loop.
Use an accumulating total statement to compute the total sales
There is a constraint – if the price of any one item is greater than $10.00 it is considered invalid, you must use a repetitive statement to display a message and force the user to enter a value less than $10.00
You need to create a function to compute the final total using a sales tax of 6% (.06)
Review the output screenshot to see what should be displayed to the user after execution.
Submission instructions: upload the .c source file, a screenshot of the C output screen, and .fprg Flowgorithm flowchart file for grading using the instructions down below.

Categories
Computer Science

Just follow the directions I will upload. I will also post the formatted of how

Just follow the directions I will upload. I will also post the formatted of how it needs to look! please follow the formatting or I will ask you to revise it. Thank you!

Categories
Computer Science

I need to create a simple mine walker. I will link support files and instruction

I need to create a simple mine walker. I will link support files and instructions. Do not work about the README.md I can take care of that. I will also attach snippets of example panel and what it should look like.

Categories
Computer Science

You have been given a non-malicious crackme. In order to learn the correct passw

You have been given a non-malicious crackme. In order to learn the correct password, you must analyze the binary. If you have the correct password, executing the executable should tell you as much.
You have been assigned a “group id” (GROUP ID: 2486565) to use which adds some randomization to the process. You will have to provide the binary both your group id and a password guess. You may use any tools that you like and can reference any materials that would normally be available to you in the real world. You MAY NOT communicate in any way with another person or group (except for your instructor) during the course of this final exam!
You may solve this using static or dynamic analysis. There is no wrong way to get to the answer.
Each group will submit a report on the results of their analysis and answer the following questions:
Which packer was used with this crackme? How do you know?
Detail the steps you used to unpack the binary.
Which anti-debugging techniques did you encounter and how did you bypass them?
What was your given group id? What is the correct password?
*Tips from my professor are attached in a .txt file*
IDA Pro will likely be necessary

Categories
Computer Science

You have been given a non-malicious crackme. In order to learn the correct passw

You have been given a non-malicious crackme. In order to learn the correct password, you must analyze the binary. If you have the correct password, executing the executable should tell you as much.
You have been assigned a “group id” (GROUP ID: 2486565) to use which adds some randomization to the process. You will have to provide the binary both your group id and a password guess. You may use any tools that you like and can reference any materials that would normally be available to you in the real world. You MAY NOT communicate in any way with another person or group (except for your instructor) during the course of this final exam!
You may solve this using static or dynamic analysis. There is no wrong way to get to the answer.
Each group will submit a report on the results of their analysis and answer the following questions:
Which packer was used with this crackme? How do you know?
Detail the steps you used to unpack the binary.
Which anti-debugging techniques did you encounter and how did you bypass them?
What was your given group id? What is the correct password?
*Tips from my professor are attached in a .txt file*
IDA Pro will likely be necessary

Categories
Computer Science

answer 5 questions. show work. From the textbook Understanding Cryptography 1) G

answer 5 questions. show work. From the textbook Understanding Cryptography
1) Given an RSA signature scheme with the public key (n = 9797,e = 131),
which of the following signatures are valid?
1. (x = 123,sig(x) = 6292)
2. (x = 4333,sig(x) = 4768)
3. (x = 4333,sig(x) = 1424)
2) In an RSA digital signature scheme, Bob signs messages xi and sends them
together with the signatures si and her public key to Alice. Bob’s public key is the
pair (n,e); her private key is d.
Oscar can perform man-in-the-middle attacks, i.e., he can replace Bob’s public
key by his own on the channel. His goal is to alter messages and provide these with
a digital signature which will check out correctly on Alice’s side. Show everything
that Oscar must do for a successful attack.
3). Given is an RSA signature scheme with EMSA-PSS padding as shown in
Sect. 10.2.3. Describe the verification process step-by-step that has to be performed
by the receiver of a signature that was EMSA-PSS encoded.
4)The parameters of DSA are given by p = 59,q = 29,α = 3, and Bob’s private key is d = 23. Show the process of signing (Bob) and verification (Alice) for
following hash values h(x) and ephemeral keys kE:
1. h(x) = 17,kE = 25
2. h(x) = 2,kE = 13
3. h(x) = 21,kE = 8
5)Show how DSA can be attacked if the same ephemeral key is used to sign
two different messages.

Categories
Computer Science

The readme is attached in hw9-and-hw10. I have the datarow and set already compl

The readme is attached in hw9-and-hw10. I have the datarow and set already completed, they are attached in hw9-and-hw10 as well. A GPtree from our last assignment is required, so I have that in hw8.zip, but it has to be modified for this assignment.

Categories
Computer Science

Go to Kaggle or the NYC Open Data project, and use whatever dataset you’d like.

Go to Kaggle or the NYC Open Data project, and use whatever dataset you’d like. Upload the files with intuitive file names. For example, name the files by question number OR by content. DO NOT use the order ID as the file names. Explain what each file contains.