QUESTION 20 In RC4, what is the size of array S in term of bytes? QUESTION 21 181 and 211 are assigned to p and q respectively to generate a pair of public and private keys. What is the modulus n? What is the value of the totient function ? If 37 is assigned to public key, what is the value of the private key? Choose among 3171, 3197, 7319, 8173, 9491
Q: What are some ways in which the spiral model of software development may be advantageous for both…
A: Spiral Model:- This is an important model of Software Development Life Cycle models, which is used…
Q: What are the major drawbacks of a two-tiered system? Do you have any thoughts on a multi-tiered…
A: What is the primary drawback of a two-tier architecture? A multitier client-server approach would be…
Q: Which considerations, and how they should be made, are most important when modeling…
A: introduction:Systems that heavily rely on software are those in which the design, construction,…
Q: What exactly does software engineering prototyping aim to achieve?
A: Institution: The infrastructure of the information about charities is kept up to date by the…
Q: The following action is being done by both database users and database creators:
A: Database Creators: Users are a able to save their data in an organized format and then retrieve it…
Q: Where does Model-View-Controller fit into the bigger picture of what makes up modern online…
A: MVC framework’s includes : Organising web apps using MVC. The advantage’s of MVC design Organizing…
Q: Consider a two-link network where Host A is connected to the router by a 1 Mbps link with 10 ms…
A: Given The propagation delay of sending data across the link between Host A and the router is 10ms at…
Q: What sort of computer network-related experience do you have? Describe the variations among the many…
A: A network allows computers to connect and communicate with different computers through any medium.…
Q: Which encrypted tunneling protocol could circumvent firewalls built to stop IPsec from operating?
A: Tunneling is often used in virtual private networks.
Q: What is meant when "important consideration" is mentioned? What do you make of this assertion?
A: Given: What is Critical Concern, then Consideration may come in various forms. One may take into…
Q: Use bullet points to outline the boots' features and benefits.
A: Introduction: Booting starts a PC's operation when it is turned on. A boot configuration is the…
Q: How many keys are needed to use cryptography with a shared secret key?
A: Introduction: In symmetric cryptography, a secret key (sometimes known as a "private key") is a…
Q: Why is avoiding change in complicated systems impossible? What are some illustrations of actions in…
A: As they develop, complex systems start to make mistakes. As a result, changes are required since…
Q: due to the advancements made in computer technology. How can it be shown that during the past few…
A: Computer Technology: Computer Technology refers to any electronic media and services, such as…
Q: Why? Modern computers have very amazing power. Is there any proof that computers have been widely…
A: PCs have been influential ever since they were introduced, but they are now ubiquitous; we can see…
Q: Does the development process provide any challenges for the developers?
A: Introduction: System Development Life Cycle (SDLC) should result in a high-quality system that meets…
Q: When it comes to software development, what role do design patterns play? Do you have a particular…
A: introduction: A repeatable design pattern for software engineering response to a frequent problem in…
Q: Cryptocurrencies and the blockchain are currently very hip. Outline the impact of blockchain…
A: The Solution and Justification: Explained: A decentralized ledger of all transactions inside a group…
Q: due to the advancements made in computer technology. How can it be shown that during the past few…
A: Given: This is a difficulty since today's computers are so powerful. This is the situation. What are…
Q: Compare and contrast magnetic secondary storage systems with solid-state secondary storage devices,…
A: Introduction: The information is actually stored in memory. Hard disc drives (HDD) and Solid State…
Q: What precisely is the field of computer science, and how does it vary from other academic…
A: Computer science: Computer science is a field of study that investigates the hardware and software…
Q: Given a class C network IP address 197.20.11.0 and subnet mask is 255.255.255.240. 1. How many bits…
A:
Q: In what ways does the MVC architecture improve the structure of web apps as a whole? How might the…
A: MVC Architecture: An application is a divided into three primary logical components using the…
Q: Create a Use Case diagram for the following scenario: The pharmacy at Mercy Hospital fills medical…
A: The answer is given in the below step
Q: What are the major drawbacks of a two-tiered system? Do you have any thoughts on a multi-tiered…
A: Drawbacks of two tired system Execution debases when number of clients increment. It is extremely…
Q: Why have object-oriented techniques taken off with the systems developer community?
A: System engineers must employ an object-oriented approach due to the following factors: 1.…
Q: hey is there anychance i could get this in text please so that i can put it in pycharm
A: In this question we have to write a python code to text for the operation to be executed in pycharm.…
Q: Pick a domain where an expert system might serve as a helper, give at least five rules for the…
A: Introduction: In contrast to long-term memory, which is the enormous amount of information retained…
Q: What factors should be taken into account, and how should they be handled, when creating models for…
A: Introduction: When developing models for software-intensive systems, what factors should be…
Q: So, what is SETI, and how does it benefit from the idea of distributed computing?
A: Institution: Search for Extraterrestrial Intelligence, or SETI, is what it stands for. SETI is…
Q: So, what is SETI, and how does it benefit from the idea of distributed computing?
A: Institution: SETI, or the Search for Extraterrestrial Intelligence, is a scientific term. SETI is…
Q: How much do the benefits of object-oriented analysis and design outweigh those of more conventional…
A: Introduction: OOAD, or object-oriented analysis and design, is a technical approach that makes use…
Q: Exactly exactly do we mean when we state that requirements should be exhaustive and uniform?
A: Institution: The requirement analysis phase is one of the most crucial phases in any software…
Q: The following action is being done by both database users and database creators:
A: Below are examples of systems where traditional file processing rather than a database approach…
Q: It is important to emphasize "divide and conquer," a fundamental tenet of software engineering…
A: Introduction: When people think about software engineering, they typically picture complex…
Q: import java.util.*; // Iterator, Comparator public class BinarySearchTree implements BSTInterface {…
A: Explanation of the code The given code declares an iterator, iter which is used to iterate over a…
Q: What exactly does software engineering prototyping aim to achieve?
A: Given: The charity management maintains the infrastructure of the charity information utilising the…
Q: Why have object-oriented techniques taken off with the systems developer community?
A: A computer programming paradigm known as object-oriented programming (OOP) arranges the architecture…
Q: Problems with shared memory coherence in scalable multiprocessors, and how to avoid them. In what…
A: Let's have a look what are the main problems caused due to shared memory coherence in scalable…
Q: Print "Censored" if userInput contains the word "darn", else print userInput. End with newline. Ex:…
A: The above question is solved in step 2 :-
Q: Just what are the upsides of adopting design patterns in software development? What are three…
A: Introduction: A design pattern is a generic, reusable solution to a common problem in software…
Q: Now a days, we are surrounded by lies all the time. But if we look close enough, we will always find…
A: A for loop is a repetition control structure that allows you to efficiently write a loop that needs…
Q: In Reverse Sort the words contained in words.txt in reverse dictionary order. Hint: There is a…
A: Here we have a file named words.txt that contains some words in an unordered sequence. As per the…
Q: When it comes to software development, what role do design patterns play? Do you have a particular…
A: What is Design Patterns? In software engineering, a design pattern is a general, repeatable solution…
Q: It's important to think about what this phrase means. What do you think about this from the…
A: The same is true for software: it's simple to learn how to hack away at an issue, but creating a…
Q: The interns who appear to be violating numerous security rules are approached by the CISO and…
A: Definition: Security is one of the most crucial components for many organisations. Every…
Q: All of the concurrent approaches that are being explained here are available solely on Linux. Not so…
A: introduction: This article demonstrates how to use the Java threading technology for concurrent…
Q: Though it seems sense that an item's perceived brightness would increase as more light was reflected…
A: solution is in next step:-
Q: What factors should be taken into account, and how should they be handled, when creating models for…
A: According to the International Organization for Standardization, a software-intensive system is one…
Q: Which considerations should be made while modeling software-heavy systems?
A: Launch: It doesn't imply or negate that an application is excessively huge when it is described as…
Step by step
Solved in 2 steps with 2 images
- #Solve it with C programing Suppose, you are working as a Data Entry Operator in a company. You have created a dataset that contains the names of N employees. Then your supervisor wants you to look for a particular employee by name. (Consider, every name in the data set is unique).Now your task is to write a program which will help you to find out the name which your supervisor is looking for.If found then print a message "Matched" otherwise print "Not Matched". (N.B: Without quotation) The first line of input will take an integer (N) which indicates the number of names in the dataset. Then the second line will take N space-separated strings. The third line of input will take another string as search value. Sample input:5rabbe sharif shazzad polash tutulsharif Sample output:Matched Sample input:4jahid nishat rasel shakibmunna Sample output:Not MatchedDefine a function named get_encrypted_list (word) which takes a word as a parameter. The function returns a list of characters. The first element is the first letter from the parameter word and the rest is as a sequence of '*', each '*' representing a letter in the parameter word. Note: you can assume that the parameter word is not empty. For example: Test Result ['h', ¹*¹ **', '*'] *** guess = get_encrypted_list('hello') print (guess) print (type (guess)) guess = get_encrypted_list('succeed') ['s', '*', print (guess) **']Can commonly used operators, such the arithmetic and stream operators, be accessed quickly thanks to the usage of enumeration types? Is it conceivable to get an acceptable result by, say, exceeding the capacity of these operators? What are the pluses and minuses of this method?
- Mdt ɔɔ 9Create the matrix (M) below using as little code as possible. You should use multiple built-in functions. M= 6.0000 19.5000 33.0000 6.0000 19.5000 33.0000 9.0000 9.0000 9.0000 9.0000 9.0000 9.0000 5.0000 -1.0000 -7.0000 5.0000 -1.0000 -7.0000 6.0000 19.5000 33.0000 6.0000 19.5000 33.0000 9.0000 9.0000 9.0000 9.0000 9.0000 9.0000 5.0000 -1.0000 -7.0000 5.0000 -1.0000 -7.0000 Now within the script use MATLAB commands to make the following changes to the matrix. Include comments in your script to separate the parts. a. Change the four numbers in the center of matrix M to one. b. Divide the bottom half of the matrix by 4. c. Multiply the top half of the matrix by 4. d. Delete the last column of the matrix. e. Create a new matrix C from first, third, and fifth column of the second and fourth rows of M. f. Sort each column of C in descending order. Calculate the following equation: 45 C* + C D=-CAN YOU PLEASE RUN IT IN ONLINE GDB! C language. Write a program using pointers, which based on the adequate functions compute the sum, difference, dot product, or cross product of two vectors in Rn. Write a program using pointers, which based on the adequate functions, computes the sum, difference of multiplication of two matrices in Rm×n.John is playing a dice game. The rules are as follows. Roll two dice. Add the numbers on the dice together. Add the total to your overall score. Repeat this for three rounds. But if you roll DOUBLES, your score is instantly wiped to 0 and your game ends immediately! Create a function which takes in a matrix as input, and return John's score after his game has ended (10 points). Example: diceGame([[1, 2], [3, 4], [1, 1]])→ 10 WRITE IN PYTHON PLEASE
- Q2} Write a user-define function that add or subtracts two polynomials of any order. Use the function to add and subtract the following f₁(x)=x5-7x4+11x³-4x²-5x-2 and f₂(x)=9x²-10x+6 polynomials:Which of the following statements about cryptographic hash functions is correct: A. Cryptographic hash functions are private. B. Cryptographic hash functions are one direction function. C. It is impossible to find the input of a cryptographic function given the input value. D. Puzzle friendly is a required property of cryptographic functions in all applications. Problem 2 Which of the following statements about hash pointers is incorrect: A. A hash pointer gives you a way to retrieve the information. B. A hash pointer gives you a way to verify that the information hasn't been changed. C. In the blockchain, if an attacker tampers a block without modifying other blocks, then we cannot detect the change. D. In the blockchain, the head of the list is a regular hash‐pointer that points to the most recent data block. Problem 3 Which of the following statements about the Merkle tree is incorrect: A. Merkle tree can be considered as a binary tree of hash pointers. B. A node in a Merkle…Hello, I am having an error and cannot figure out how to solve this question. Could someone please assist? Please be advised, I am using PostgreSQL as that is what was used in class. Thus, I must use PLPGSQL Code CREATE OR REPLACE FUNCTION Moreno_03_bankTriggerFunction()RETURNS TRIGGERLANGUAGE PLPGSQLAS$$CREATE TRIGGER Wise_12_bankTriggerAFTER DELETE ON accountFOR EACH ROW EXECUTE PROCEDURE Moreno_15_bankTriggerFunction();
- This exercise is to write a Decimal to Hex function using BYTE operations. You can use a List, Dictionary or Tuple for your Hex_Map as shown below, but it's not necessary to use one. It is necessary to use Byte operations to convert the decimal to hex. The bitwise operations are also available as __dunders__. Write a function to convert a integer to hexidecimal. Do not use the Python hex function (i.e. hexnumber = hex(number)) to convert the number, instead write your own unique version (i.e. MYHEX: hexnumber = MYHEX(number)). Your function should not use any Python functions like hex, dec, oct, bin or any other Python functions or modules. Functions, like Python ORD, can be used to convert a string to a integer. The input number range is 0 to 1024. def MYHEX(number): hex_map = {10: 'A', 11: 'B', 12: 'C', 13: 'D', 14: 'E', 15: 'F'} result = '' while number: digit = number % 16 if digit > 9: result = hex_map[digit] + result else:…Write a function that sums all the numbers of the major diagonal in an nxn matrix of integers using the following header:def sumMajorDiagonal(m):The major diagonal is the diagonal that runs from the top left corner to the bottom right corner in the square matrix. Write a test program that reads a 4x4 matrix and displays the sum of all its elements on the major diagonal.Consider the provided function main in main.cpp: Write the definition of the function inputArray that prompts the user to input 20 numbers and stores the numbers into alpha. Write the definition of the function doubleArray that initializes the elements of beta to two times the corresponding elements in alpha. Make sure that you prevent the function from modifying the elements of alpha. Write the definition of the function copyAlphaBeta that stores alpha into the first five rows of matrix and beta into the last five rows of matrix. Make sure that you prevent the function from modifying the elements of alpha and beta. Write the definition of the function printArray that prints any one-dimensional array of type int. Print 15 elements per line. Write a C++ program that tests the function main and the functions discussed in the parts above. (Add additional functions, such as printing a two-dimensional array, as needed.)