computer architecture march 28

  • Explain how quantum computers work.
  • How are quantum computers different from classical computer architectures that we have studied in this course? 
  • What are the principles of quantum computing?
  • Describe the logic gates found in quantum computers.
  • How can quantum computers be used in cryptography? 
  • Where can quantum computers be applied?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Science springboot maven mysql online shopping cart assignment for college

looking for professionals from Mumbai India- for doing following project 

its simple college project not required in professional way. current requirement is 

Q2: Create two web forms in your application which must contain different fields to take user input corresponding to the defined entities/tables created for the Q1. For example, regarding an online music store application, one form should ask the user to input all information related to Albums while the second form should ask the user to input all information related to the Singers. Create a SpringBoot application deployed on port 8080 which receives form data via POST request and stores the submitted data (e.g., in a JSON file) in the resource folder of your application. You must create at least two separate files for each of the two web forms submitted to receive user input. All subsequent entries by the users for forms submission should be appended in the corresponding JSON files.

Q3: Deploy another SpringBoot service on Port 8081. Expose endpoints which receive a GET request from your front-end application and returns a JSON object containing a list of objects (items/products/albums) depending on your application. These objects should correspond to your entities stored in JSON objects from Q1 and Q2. You can read files either at application start-up or on each request. Data received from the SpringBoot service should be displayed on your front-end application in a tabular form or any other appropriate format.

Q4: Please extend the SpringBoot Service from Q3 so you can fetch additional data from the second JSON file on the relevant object selection. For example, in Q3 when you have displayed all data from the Albums files, on clicking the foreign key attribute (e.g. Singer ID) , you should send Singer ID as a query or path parameters to the new controller endpoint, find relevant data and display it to the user.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Database

 Do not create new permanent tables. I must be able to run your code using the three assigned tables 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

wireshack question networking

 

ITECH1003/ITECH5003 Networking Assignment

Wireshark Capture Filter assignment

This assignment requires students to:

· Become familiar with Wireshark capture filters.

· Document the qualifiers used in capture filters.

· Construct and use capture filters to capture specific network traffic.

· Include screen shots of captured network traffic and present them with associated discussion.

Part 1 – Wireshark and traffic capture basics

Describe what the term promiscuous mode means in relation to capturing network traffic with Wireshark and similar network traffic analysers.

[ 1 mark ]

The Capture > Options dialog allows the Name Resolution of Network Layer names. Describe what this means and describe how it could be used for capturing network traffic.

[ 1 mark ]

Describe the difference between a network switch and a network hub. Then explain how switched networks limit the network traffic that is visible to Wireshark in comparison to networks that used hubs. (Note – switches are the technology used in today’s computer networks)

[ 2 marks ]

In TCP/IP networking IP addresses are used to identify specific computers (or hosts) on the network, clients use ports numbers to specify a particular instance of a client program (for example a specific tab on a web browser) and servers normally use well known port numbers  on which to listen for client requests. For instance ftp at the server uses ports 20 and 21.

From the web or any other source determine the well-known port numbers of the following server programs:

· ftp data

· ftp control

· http

· NTP

· ssh

Also find the well know port numbers for 6 other network protocols and describe the function that each protocol performs.

[ 2 marks ]

Part 2 : Capture filters 

In this section of the assignment you are required to learn the syntax for creating Wireshark Capture Filters. Then document and use capture filters to capture specific network traffic.

Discussion of Berkeley Packet Filter (BPF) syntax

The following discussion gives a brief explanation of the BPF syntax to help you get started with constructing your own capture filters.

Wireshark capture filters use the Berkeley Packet Filter (BPF) syntax to specify particular traffic. This syntax is used by the libpcap (in Unix/Linux) and Winpcap (in Windows) libraries that are used by Wireshark to capture network traffic. 

Note – WinDump is the Windows version of a Linux/Unix program called TCPDump and hence TCPDump documentation applies to capture filter syntax as used on Windows machines.

Syntax

The BPF syntax consists of one or more Primitives that specify a particular type of traffic to capture.

Some examples of simple primitives are shown below:

(i) host 192.168.12.22

(ii) host google.com

(iii) src host google.com

(iv) tcp port 80

Things to note about these primitives:

· Primitives start with one or more qualifiers (eg. host, src host, dst host etc.)

· Primitives end with an ID (eg. 192.168.12.22, google.com, 80 etc.)

Note –  If you use named IDs like google.com then you need to enable name resolution in the capture filter dialog box when specifying capture filters.

In summary a capture filter consists of one or more primitives and those primitives consist of one or more qualifiers followed by an ID.

{ <——- primitive ——> } { operator } { <- primitive -> }

dst host 192.168.12.13 && tcp port 80

The references dst, host, tcp and port are called qualifiers.

The references 192.168.12.13 and 80 are called ID’s.

The boxed example above also shows the AND operator being used to join two primitives to make a capture filter expression. The AND operator is one of the three possible operators that are allowed in capture filters, the other two are OR and  NOT.

Sources of documentation of the Berkeley Filter Syntax that you should refer to are:

Documentation that describes the BPF syntax can be found at https://www.winpcap.org/docs/docs_40_2/html/group__language.html 

There are also good cheat sheets for TCPDump (Wireshark Capture Filters) and Wireshark Display filters at: http://packetlife.net/library/cheat-sheets/

The Wireshark Users Guide (Access from Help in Wireshark)

End of discussion of BPF syntax

Documenting BPF qualifier syntax

There are three types of BPF qualifiers:

· Type (3)

· Dir (2)

· Proto (8)

The Type qualifier has three possible options: host, net  and port. The other two qualifier types also have associated options, there are 4 options associated with Dir qualifier type and 8 options associated with Proto qualifier type (please disregard the fddi, decnet options as they are seldom used in today’s networks).

You are required to describe what each qualifier means and list a total of 10 capture filter examples that incorporate at least 1 qualifier and one ID, and explain how each capture filter works.

[ 3 marks ]

Documenting the 3 logical operators for combining primitives

The boxed example above show the logical AND operator ( && ) being used to combine two primitives. There are two other such logical operators.

Document all three logical operators and give one example of how each could be used in a capture filter.

[ 1 mark ]

Implementing BPF capture filters

In this section of the assignment you are required to create a range of capture filters, implement those capture filters in Wireshark and take a screenshot of associated captured traffic.

Your screen captures must include the Time, Source, Destination and Protocol fields of the Wireshark display along with at least two packets (the graphic below shows three, packets 7,8 & 9). 

Because the Time field is displayed to such a fine resolution your screenshot capture will be unique from all other students doing this assignment. This will therefore act as an automatic plagiarism detector.

After creating an appropriate capture filter you may need to generate appropriate traffic for Wireshark to capture. For instance, if you create a Capture Filter to capture ftp traffic you will need to run an ftp client to effect the traffic capture. Likewise, when capturing web traffic you could use a browser to generate appropriate traffic. To capture ICMP traffic you might use the ping command because it uses the ICMP protocol to query other hosts.

Example capture filter:

Filter requirements

Capture all traffic between your computer (that is running Wireshark) and the Google search engine in response to the query “caviar” being entered.

Procedure:

Open a browser to www.google.com

From the Wireshark interface select:

Capture > Options >

Select the desired interface (or select all interfaces)

Enter host google.com in the capture filter entry area

Select the display option Resolve network layer names

Start the capture

Then enter the word caviar into the google query field of the browser

Wireshark will captures the require traffic.

Note –  Make sure you have selected the correct network interface, or select all interfaces if you are unsure.

Capturing traffic from/to another machine (2 marks)

In network analysis you will frequently need to capture all traffic or specific traffic between your machine that is running Wireshark and another specified machine.

For this exercise you should generate traffic between the machines with the ping command.

Create capture filters that will:

1. Capture all traffic between your machine (the one running Wireshark) and another machine. Use the IP address of the other machine to identify it in the filter.

2. Capture all traffic between your machine (the one running Wireshark) and another machine. Use the MAC address of the other machine to identify it.

3. Capture all traffic from the other machine. Use either the IP or MAC address of the remote machine to identify it.

4. Capture only ICMP traffic between the two machines

Your discussion for this section should:

· include two screenshots

· list all capture filters you used

· describe how each capture filter works.

Excluding particular network traffic (2 marks)

Create a set of capture filters that will:

· Capture broadcast traffic only

· Exclude broadcast traffic

· Capture all traffic from a range of network addresses but exclude broadcast traffic

Briefly discuss how each capture filter works.

Using port numbers in capture filters (1 mark)

Create capture filters that will capture the following types of network traffic:

1. DNS traffic

2. DNS traffic being sent from your machine

3. DHCP traffic in either direction

Briefly discuss how each capture filter works.

Challenge exercise (zero marks)

The BPF syntax can detect specific content at specific offsets from the start of network packets.

An example of such syntax would be tcp[13] & 4 == 4

This particular capture filter can detect TCP packets that have the RST flag set.

Describe this syntax so that a layman could understand how such filters work.

Marking Criteria

This assignment is worth 15% of ITECH1003 assessment.

The assignment must be submitted before the due date/time to ensure assessment penalties as stipulated in the course description are not applied.

The marks for each section are shown against each requirement above.

Students are required to demonstrate their understanding of each part of the assignment clearly and concisely and if specified include associated Wireshark screenshots and clear discussion to demonstrate you have fully understood the topic.

Students should realise that any screenshot taken by them will be unique by virtue of Wireshark’s precise time display, hence if identical screenshots appear in two separate assignments then it will be immediately identified as plagiarism. Therefore, all students need to interact with Wireshark to capture their own traffic and ensure that no other student has access to their screenshot files.

All screen captures that you use in the assignment report must include the Time, Source, Destination and Protocol fields of the Wireshark display along with at least two network packets as outlined on page 3 of this assignment specification.

Please acknowledge by way of referencing, if you have used information from books, papers, websites and other published and unpublished materials. 

Students should submit their completed report as a single word or pdf document to Moodle by the due date as specified on your ITECH1003 course description.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

week-6

 

Case Analysis 4 – Managing Innovation Teams at Disney 

Please answer the following questions:

  1. Why does Disney keep its development team small?
  2. What are the pros and cons of the teams being so autonomous?
  3. Is Disney’s team approach most suited to creative projects, or would it work equally well in other kinds of industries?
  4. Importantly, apply as many of the COs (Course Objectives) as you can to the case. These are given for reference below.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Read and Write

Reading assignment, WTF? by Robert Nidefer and Tumbarumba by Ethan Ham

Write one essay on both essays. 

250 words at least 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Describe in 500 words what a dba must be aware of to maintain good regulatory compliance when moving to the cloud.

Describe in 500 words what a dba must be aware of to maintain good regulatory compliance when moving to the cloud. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

C++ Mastermind and Hashing

Question one MasterMind (Most important)

Chose a V1 OR V2 to only edit the AI function to make it solve the game in 12 or less  guess  Mastermind with an AI

Guidelines 4 digit code breaking 0000-9999

Use my Driver/Stub to write your own AI function.  You will find in the class repository.

Create your AI function whose output is the next guess to break the code.

Link

https://github.com/ml1150258/2019_Spring_CIS_CSC_7/tree/master/Projects

Question 2

 

Given the attached Merkle Tree from http://en.wikipedia.org/wiki/Merkle_tree

Let

L1=Then out spake brave Horatius,

The Captain of the Gate:

L2=”To every man upon this earth

Death cometh soon or late.

L3=And how can man die better

Than facing fearful odds,

and

L4=For the ashes of his fathers,

And the temples of his Gods.”

Create all hashes 0-0, 0-1, 1-0, 1-1, 0, 1 with top

Show all you need to do to confirm

L1 is 0-1, 0, top

L2 is 0-0, 1, top

L3 is 1-1, 0, top and

L4 is 1-0, 0, top

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

A Comparative Analysis of Tools and Technologies for Policy Making

A Comparative Analysis of Tools and Technologies for Policy Making

Information technology has become a dependable and efficient tool for improving policymaking in different countries. Policymakers are slowly adapting to the technological changes that are occurring in various disciplines to enhance their tactics towards national programs. The article provides a distinct approach towards policymaking, arguing that information communication technology has enabled growth and competence in the area. Firstly, the authors identify that ICT tools include software programs developed by people and organizations (Kamateri et al. 126). They also delve into a literature analysis using identification, categorization, and comparative analysis. Results of the review reveal 11 categories of tools and technologies that people can use to design policy. These tools include visualization, argumentation, eParticipation, opinion mining, simulation, serious games, persuasive, social network analysis, big data analytics, and semantics.

            The authors apply such tools and technology using three concepts in policymaking that include core activities, the stage of the policy cycle, and the type of stakeholder. The application of each tool is vital in the realization of different outcomes. For instance, one tool provides user-friendly information, while another promotes deliberation (Head 79). Additionally, eParticipation enables the public to engage in the policymaking process. Conversely, researchers use opinion mining to evaluate the sentiments and preferences of the people regarding certain policies. They also use social network analysis to derive key actors relevant to distinct policy areas (Kamateri et al. 150). It is also possible to use big data analytics to evaluate large volumes of information for general policy formulation. Stakeholder identification is important because it determines methods for achieving effective policies. Policymakers should consider target activities and the policymaking stage while selecting ICT tools and technologies. Evidently, these approaches provide significant insight regarding the approach that policymakers can use to obtain and implement certain policies.

Question: Which is the best tool for creating policies on the attainment and distribution of water within the community?

Works Cited

Head, Brian W. “Reconsidering Evidence-Based Policy: Key Issues and Challenges.” Taylor & Francis, 2010, pp. 77-94.

Kamateri, Eleni, et al. “A Comparative Analysis of Tools and Technologies for Policy Making.”

Policy Practice and Digital Science: Integrating Complex Systems, Social Simulation and Public Administration in Policy Research, edited by Marijn Janssen, Maria A. Wimmer, and Ameneh Deljoo, Springer, 2015, pp. 125-156.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Interface Evaluation Exercise

After reading chapter fifteen of the course textbook, complete this assignment. Pick a software application, mobile application, or website and complete a heuristic evaluation of the site. Use the tool extensively while evaluating for all of the benchmarks from pages 501 to 502 (section 15.2.1) of the text. Describe your findings in great and explicit detail. Your report should be submitted in Moodle as an MS Word document by the deadline. Your report should reflect excellent, graduate level writing, professional presentation, and correct formatting (APA). It should not be comprised of a list bullet points. Graphics may be added if they will enhance or bring clarity to your report. All figures should have correct APA in-text citations and those citations should have matching bibliographic references on the reference page. All work should be in well-structured sentences and organized into thoughtful paragraphs. For each benchmark, two specific examples how the interface/system meets or fails to meet the benchmark should be described. One paragraph per benchmark example is adequate. For purposes of the is assignment, a paragraph should consist of 3-5 sentences. The assignment should be double spaced and adhere to all the document formatting expectations described in the course syllabus. The following is a sample of what I would expect to observe for your submission. Of course, you will include a title page and, if needed, a reference page, headers, page numbers, etc. Visibility of system status: The system meets this criteria well. Example 1: A heuristic evaluation of Amazon.com revealed that the firm has designed their site relatively well regarding visibility of system status. An example of this can be observed when a user clicks on the “Add to Cart” button from a product page. After clicking the button either a notice pops up affording the user the opportunity to add a warranty (for electronic devices) or a new page is loaded that show the success/failure of the system to add the item to the cart, the cart subtotal, and an option to view the cart, check out, or continue shopping. This “keeps the user informed” and provides “feedback within [a] reasonable time” (Preece, Rogers, Sharp, 2015, p. 501). Example 2: Another way that….

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now