Computer Science homework help

Get free Computer Science homework help here or go to homework help

CIS175

"Maintaining the Network"  Please respond to the following:

 

CIS 417 Computer Forensics - All Assignments and Case Studies (Strayer)

  • CIS 417 Week 2 Assignment 1, Computer Forensic Overview
  • CIS 417 Week 3 Case Study 1, BTK
  • CIS 417 Week 4 Assignment 2, Forensic Lab Design
  • CIS 417 W

The assignment focuses on using ArrayLists to store collections of values

Goals

By the end of the assignment, you will have gained experience in writing programs using ArrayLists and will also have had more practice at designing programs using loops.

Resources and links

Download Zip file of necessary code and data.

Source Code and data Files (for viewing online)

Submit your answers.

Ask for online assistance from the staff

Marks and Feedback

SQL

1.         Create a query to display the country name and region id of the countries with a region_id greater than 2.

2.         Create a query to display the country name and region id of the countries for one specific country.

3.         Write a query to display your name, and the current date on a single line of output.

Create an application that uses the InputBox method to let the user enter 10 integers into an array

Create an application that uses the InputBox method to let the user enter 10 integers into an array. The Application should display the largest and smallest values stored in the array.

seating patterns related to course performance by using an array of

Write a program that explores the seating patterns related to course performance by using an array of student scores. The program should do the following:



o Draw a seating chart of the classroom.



o Show where people sit and use color coding on the seats to indicate the student's current level of performance. The color-coding scheme should be as follows:

In this project you will use a cryptographic hashing method that allows a user to play a large video files

In this project you will use a cryptographic hashing method that allows a user to play a large video files block by block while making sure that the blocks are genuine without having to download the entire file first. [Cryptographic Hash Functions]

A. The server side: Preparing the video file 

In a first step, this method will compute the hash value of given video file V as follows:

a) Select a secure hash function which is collision resistant like SHA256.

b) Break the file V into 1 Kbytes blocks ( 1024 bytes).

In this graded project, you’ll create a home inventory database based upon fictitious information provided

GRADED PROJECT

In this graded project, you’ll create a home inventory database based upon fictitious information provided in this booklet.

Using this data, you’ll also perform queries and create reports.

Your Access project will consist of the following items:

  1. Two data tables

  2. Two data entry forms

  3. Simple query and report

  4. Multiple-table query and report

program

Your goal (for the encode portion): to write a program that will:

1. read three command-line arguments, the first is the image we wish to hide a file in, the second is the filename of the file we wish to hide, the third is the filename that we will write the hidden image to.

2. copy the original image to an array

3. create new pgm file to hold changed image

4. allocate memory for the new image data

5. start at the mask image’s 0,0 pixel

6. for each bit in the hidden file

Syndicate content