Why is the looping logic important in programming? What is the difference between event-controlled loops and counting loops?

Programming Activity

Complete Chapter 6, Section 6.12 “Programming Activity 2: Using for Loops” from the textbook. Once you have completed it, please answer the following questions:

1) Why is the looping logic important in programming?

2) What is the difference between event-controlled loops and counting loops? Provide examples.

3) What advice or code can you provide to help other students with this activity?

4) Can we replace a while loop with a for loop?

Task 1: Create a new discussion topic on or before the due date in the Course Syllabus -> Course Schedule by clicking the ‘**REPLY HERE**’ post below. In your reply, you will post your response to the main topic. Your response should be a minimum of 150 words. Going over the minimum word length requirement is acceptable; however, I am not looking for 500+ words!

Why should it be important to you? Include the basic of computers and the role in which they play and the needs of an organization and/or person as it relates to your selected topic.

Cyber Security: Why should it be important to you?

Need to include the basic of computers and the role in which they play and the needs of an organization and/or person as it relates to your selected topic.

The research paper should outline the following:

What you studied
Why you looked at the problem
and how you studied the problem

You will want at minimum the following:
Problem Statement
Background
Literature Review
Discussion
Limitations of these studies
Section on Integrity and how CS relates
Conclusions and Future Study

Finally, your proposal should be formatted in APA, 12 Font or equal San Serf as allowed by your professor, double spaced.

Who was the examiner for this drive and what software was used to acquire this image? How many sectors are on this drive? What is the volume serial number for the WASHER volume?

FTK Imager

Purpose: To introduce some of the FTK Imager features which include some of the core functions related to acquiring case evidence.

Application location: Virtual Computing Lab

Preparation: Review user guide and lab video/slides (on Blackboard)

Evidence file: Washer.E01 file (located in \\144.175.196.12\Forensic Data\Washer.E01)

Questions to answer:

  1. Who was the examiner for this drive and what software was used to acquire this image?
  2. How many sectors are on this drive?
  3. What is the volume serial number for the WASHER volume?
  4. When was the [root] directory created? Provide the full timestamp.
  5. What is the file system and operating system of Partition 1?
  6. What is the purpose of the pagefile.sys file?
  7. What is the starting cluster for the pagefile.sys file?
  8. What is the Master File Table (MFT)? Why is it important?
  9. What is the MFT record number of the MFT?
  10. What is the MFT record number for the WINDOWS directory?
  11. Convert Washer.E01 into the AFF format. Password protect the image with the password “password123”. Save it on the desktop and call it <lastname>Washer. Put your last name in place of <lastname>. Insert a picture of the new file(s) using the Snipping Tool.
  12. Load the new image into FTK Imager to verify that the password is set. Insert a picture of the window asking for the password using the Snipping Tool.
  13. Mount the Washer.E01 image. Attach a picture of the hard disk drives connected to the computer showing the mounted image. Unmount the image.

 

Write a simple bit manipulation code that allows users to indicate decimal number and bit system (i.g 4/8/16/32/64) in which binary number will be outputted.

Computer Science Question

Bit Level Manipulation

Write a simple bit manipulation code that allows users to indicate decimal number and bit system (i.g 4/8/16/32/64) in which binary number will be outputted. Apart from that you have to calculate the corresponding one’s and two’s complement of the decimal number. However, the only named variables you may use are pointer variables; all others must be anonymous variables.

Pay close attention to the following aspects:

  • error checking
  • loop function
  • pointer variables
  • code efficiency(smart code), readability, documentation.

 

One-time pad (OTP) encryption is provably secure. It would be expected that an unbreak- able encryption method would be highly desirable yet it is not widely used. Describe what makes OTP hard to use in practice.

Cryptographic Tools

Question 1

One-time pad (OTP) encryption is provably secure. It would be expected that an unbreak- able encryption method would be highly desirable yet it is not widely used. Describe what makes OTP hard to use in practice.

Question 2

Comparing secret-key and public-key encryption, what is the main advantage that the latter offers over the former?

Question 3

The definition of a Shift Cipher can be expressed as follows:

Def. Let x, y, k ∈ Z26 with the encryption operation as ek(x) ≡ x + k mod 26 and the decryption operation as dk(y)  y – k mod 26.

Given the provided letter encoding, what would be the encoding of the plaintext word ATTACK after applying a shift cipher with a k=17?

Question 4

Assume a hash function H(m) which is collision resistant. This particular function maps a message of arbitrary bit length into an n-bit hash value. Can we assume that for all messages

m, mj with m

m’, we have H(m)

H(mj)? You must explain your answer to receive credit.

 

(Hint: see textbook section about Secure Hash Functions.)

 

Question 5

Develop a single program using any programming language (e.g. Java, Python, C++, etc.) that:

  1. Encrypts and decrypts a message using the Cesar’s The user encrypting the message is prompted to enter a message and then a key that indicates the displacement. The user decrypting the message is prompted to enter the encrypted message and the key.
  2. (Decrypts and displays all (26) possible

 

Choose the correct option for the following statements.Which one of the following is not an input device?

GENERAL CONCEPTS ABOUT COMPUTERS & HARDWARE

Choose the correct option for the following statements.

  1. Another name for a desktop computer is________.
  2. Mainframe computer
  3. Tablet PC
  4. Personal computer
  5. Parallel computer

Which one of the following is not an input device?

  1. Scanner
  2. Mouse
  3. Keyboard
  4. Speaker

This part tells the rest of the computer system to carry out specified instructions.

  1. Arithmetic Logical Unit
  2. Control Unit
  3. Microphones
  4. Read Only Memory
  5. RAM stands for ________.
  6. Random Active Memory
  7. Random Access Memory
  8. Read Access Memory
  9. Real Access Memory ACTIVITIES Activity 1

 

Module One: ALL ABOUT COMPUTERS, INTERNET & MIRCROSOFT EDGE

Fill in the blanks with the appropriate words provided in the box.

RAM CPU CD-R CD-RW ROM

  1. ________has built-in programs from the manufacturer.
  2. ________ is recorded once but can be read several times.
  3. ________is often termed as the “brain” of a computer.
  4. Everything in ________ is deleted when the computer is switched off.

Choose TRUE or FALSE for the following statements.

  1. A Microcomputer is used for large-scale chemical analysis in laboratories.

( ) TRUE

( ) FALSE

  1. The next unit of data storage after the Petabyte (PB) is the Terabyte (TB).

( ) TRUE

( ) FALSE

  1. RAM is called temporary (or volatile) storage because everything in RAM is lost when the computer is switched off.

( ) TRUE

( ) FALSE

  1. Microcomputers are the fastest and the most powerful computers in the world.

( ) TRUE

( ) FALSE

Discuss the impact of how measures from the government to accommodate the special needs of special groups, such as curb cuts in sidewalks for wheelchair users, often have payoffs for many groups, such as parents with baby strollers, skateboard riders, travelers with wheeled luggage, and delivery people with handcarts.For this question, the answer should be atleast 250 words.

Human-Computer Interaction

  1. Discuss the impact of how measures from the government to accommodate the special needs of special groups, such as curb cuts in sidewalks for wheelchair users, often have payoffs for many groups, such as parents with baby strollers, skateboard riders, travelers with wheeled luggage, and delivery people with handcarts.For this question, the answer should be atleast 250 words.
  2. Who are researchers and designers gathering insights about the impact of mobile social tools and services from
  3. Designers wants to develop high-quality user experiences. What are the three (3) quality features?
  4. What are three broad attainable goals for interface designs that could be used for educational and professional enterprises?
  5. What are large databases of text, images, graphics, sound, video, and scientific data that are becoming easier to explore with information visualization and visual analytic tools?
  6. What provides support for rapid prototyping and interface development while aiding design consistency, supporting universal usability, and simplifying evolutionary refinement? Note:There should be no plagiarism.

 

Who are researchers and designers gathering insights about the impact of mobile social tools and services from? Designers wants to develop high-quality user experiences. What are the three (3) quality features?

ASSIGNMENT

Section 1:

1.Who are researchers and designers gathering insights about the impact of mobile social tools and services from?

2.Designers wants to develop high-quality user experiences. What are the three (3) quality features?

3.What are three broad attainable goals for interface designs that could be used for educational and professional enterprises?

4.What are large databases of text, images, graphics, sound, video, and scientific data that are becoming easier to explore with information visualization and visual analytic tools?

5.What provides support for rapid prototyping and interface development while aiding design consistency, supporting universal usability, and simplifying evolutionary refinement?

Section 2 :

1) Discuss the impact of how measures from the government to accommodate the special needs of special groups, such as curb cuts in sidewalks for wheelchair users, often have payoffs for many groups, such as parents with baby strollers, skateboard riders, travelers with wheeled luggage, and delivery people with handcarts.

 

What are the techniques in handling categorical attributes? How do continuous attributes differ from categorical attributes? What is a concept hierarchy?

Intro to data mining

Question 1:

  1. What are the techniques in handling categorical attributes?
  2. How do continuous attributes differ from categorical attributes?
  3. What is a concept hierarchy?
  4. Note the major patterns of data and how they work.

Question 2:

  1. What is K-means from a basic standpoint?
  2. What are the various types of clusters and why is the distinction important?
  3. What are the strengths and weaknesses of K-means?
  4. What is a cluster evaluation?

 

What is the definition of data mining that the author mentions? How is this different from our current understanding of data mining? What is the premise of the use case and findings?

CASE STUDY

After reviewing the case study this week by Krizanic (2020), answer the following questions in essay format.

  1. What is the definition of data mining that the author mentions? How is this different from our current understanding of data mining?
  2. What is the premise of the use case and findings?
  3. What type of tools are used in the data mining aspect of the use case and how are they used?
  4. Were the tools used appropriate for the use case? Why or why not?

In an APA7 formatted essay answer all questions above. There should be headings to each of the questions above as well. Ensure there are at least two-peer reviewed sources to support your work. The paper should be at least two pages of content (this does not include the cover page or reference page).