+1-316-444-1378

building a unix shell

This assignment asks you to build simple Unix shell and gives you in the process an opportunity todemonstrate that you are mastering concurrency (including running external executables) and filemanipulation using the POSIX API. You may have seen similar assignments in other courses butthey are similar and not identical; make sure Read more…

DreherVinicius_1900011

    Ask the user to input the degree of the polynomial.     Based on the inputted degree, ask the user to input the different polynomial coefficients.     Generate a range X of values between  100 and 100.     Calculate polynomial P(x) for all values of range X. These results should Read more…

spouses

The assignment is a python notebook with a problem to be solved. The marking scheme is :Depth of analysis: 25% of marks.Analysis appropriate to questions: 25% of marks.Quality, clarity and organization of analysis code: 25% of marks.Answers based in analysis: 25% of marks.

MBA

FiftySeven Coffee 57C is a coffee retailer who is in a phase to further develop its current product portfolio (coffee). The current product offering has 13 attributes. 57C’s board believes that consumers are not considering all attributes as important when they buy their coffee. Moreover, the board wants to know Read more…

Twitter analysis project

Research Report – Twitter Analysis and Presentation The aim of this assignment is to collect Twitter data, summarise the data using a spreadsheet or other tool, and then write a report about that data. The purpose of the report is to investigate and discuss the use of twitter analysis by Read more…

Demonstrating the Gap

create a diagram for a better approach for compliance, based on one of the following frameworks: PCI, HIPAA, NIST, or any other accepted framework. Ideally, the network will be an Enterprise class consisting of 1000+ clients for various corporate departments, with 50-100 servers providing typical network services. The network infrastructure Read more…

Decrypt RSA

The file s81170-cipher.bin contains data encrypted using the ARIA-128-CBC method. First decrypt data in the file s81170-cipheredkey.bin. They were encrypted with RSA and can be decrypted with the function RSA_private_decrypt (). Optimal asymmetric encryption padding was used. You must therefore specify RSA_PKCS1_OAEP_PADDING as a parameter. You can work with the Read more…