Dear Students, Hope you are doing well, you should answer all question directly on the excel file the upload it on blackboard before October 23, 2024 . * you must fill your university ID to solve the homewor
The first 5 people to email correctly decrypted images to the instructor will win fabulous prizes!! Implement a C program to decrypt a bmp image. Study the posted 8-bit-mini-DES algorithm posted, and study the code in miniDESv2.cpp. This source code implements an encryption algorithm. The posted ePic.bmp was encrypted with this algorithm. Modify the program as necessary to create a decryption program and use it to decrypt the posted ePic file. Use a brute force key-guessing approach. Use your decryption program on ePic with every possible 8-bit key value from 0 to 255. This will generate 255 decryption candidates, then check the candidates visually with Windows File Explorer or some other viewer. You will know when you have the correct answer because it will be an image recognizable by a human. You may want to start off with your own super tiny binary files (like, 4 bytes with values 1234) for testing. Encrypt and decrypt your small test data first, because this is a lot easier to debug, also, you will know your program works ahead-of-time if you plan to compete for the fabulous prizes. Requirements: 1) You must use the brute force approach described above. 2) You must FIRST write a program to generate the inverse function tables with C constant literal array initializer syntax, and print out these inverse function tables for paper submission. 3) CLEARY indicate your final correct key value 4) Indicate your final substitution table function composition order. eg: f0 ? f1 ? f0? f3 or whatever it turns out to be (this part is way easier than it sounds). Resources: See the posted files “miniDES.cpp” and “ePic.bmp”. There is a binary file editor built into Visual Studio. The bmp will not be posted until the official “start time”, but you may practice on your own bitmaps if desired. Turn In: Paper printouts of: 1) Source code for inverse table generator program 2) Source code for decryption program 3) Inverse function tables printout 4) Key value 5) Inverse function composition order (list) 6) Decrypted output. Sample Output Your inverse tables Your Key Your inverse function composition order Your deciphered image
Prompt: Analyze the role cryptographic algorithms play; you will use this knowledge throughout the course. Next, explain how these algorithms could be utilized in a way that would strengthen an organization's existing information assurance plan.
Prompt: Every organization wants their systems to function properly and "talk" to each other. One of the biggest issues companies have is that they have information stored in different systems and it is very difficult to create reporting that ties information from multiple systems. From an integration systems perspective, what would be your first step in determining what systems could be integrated? What information would you need to gather, and who should be involved in this process? Discuss how you determine which systems could be integrated.
Prompt: In your initial post, share an analogy that illustrates how IS strategy supports the three components of organizational strategy. What are some of the ways in which IS strategy has improved business processes in various industries? Explain which strategies have worked in your own organization or provide an example of how these have worked in another organization.
You will perform a series of graphical hand executions on an AVL tree. You will also implement rotations on 2 small “hard coded” trees and verify correctness via traversal. PART 0 Create drawings to manually insert the following sequence into an AVL tree: 60,35,80,55,30,25,10,75,50,15,40,95,20,45,90,85,70,65 1) Show the tree before and after each insertion. 2) Show the tree before and after each rotation. 3) Indicate the pivot node before each insertion. 4) Indicate the balance factors before and after updating them (cross out the old bf, and write down the new bf). 5) Indicate the nodes involved in each rotation. 6) Indicate the subtrees before and after each rotation. PART 1 The following simple trees are out of balance and in need of rotations. See the posted files “AVL_LL.cpp” and “AVL_LR.cpp” which contain very small “hard coded” AVL trees in need of rotation. Modify theses files to perform the rotations by changing the pointer values appropriately. After the rotations, output the preorder, inorder and postorder sequences for each tree traversal. Tree 1 Tree
The a-s-s-e-s-s-m-e-n-t will MAG IA1 PSMT Please see the questions shown in the screenshot. I will send you all the info after being hired, eg PPTs, student access etc. Please send a draft in 12hrs -1 day time, day 2, and day 3 as well. + Will need to draft some questions to ask the teacher and revise base on feedback (Send bk ard in 1 day max) https://drive.google.com/drive/folders/12g3knzscob...
Proposed Approach to Implementing an ERP System (Part 1) You are the CIO of a manufacturing firm. The CEO and CFO continue to express concern over the lack of integration among business processes within their functional business areas. They believe the solution for this is an ERP system coupled with Supply Chain Management and Customer Relationship functionality. Both executives have heard negative reports from executives in other companies and from the press of failed ERP implementations. To avoid duplicating the same situation in their organization, the CEO and CFO request that you submit a Proposed Approach to Implementing an ERP System report. Ultimately, these organizational leaders want to determine if their company is ready for ERP. Your initial deliverable is a draft document that should include the following content: A proposed approach to conducting a needs assessment/requirements gathering initiative. The requirements should reflect which functional business processes your firm needs to implement. This Milestone is the initial requirement for the final Portfolio Project deliverable. Your paper should be 3-4 pages in length
Review existing Automated Car Wash system and discuss if it truly adheres to the principle of standard Process Automation. what are the factors to be taken into consideration in the development of automated car wash, itemize them. Is this an Artificial Intelligent solution, automated system or combination? Provide examples of AI driven solutions to support your answer. Note: Your answer should be a minimum of 5-6 pages and include a minimum of 4-5 references. References/Article dates should be less than 3 years. No plagiarism/AI content is allowed. Note: Content should be clear, concise, and understandable. No plagiarism/AI content is allowed. Please follow the minimum no. of pages and include a minimum number of references, Check for any grammatical errors and sentence structure.