Computer Science
[SOLVED] An Assembly File
Assembly – Course completion project1 “Completeness” in the existing Assembly programThe program in the project knows how to get a table of pointers for data blocks in Flash, outPtrs, RAM – array of 3), and respectively, a table of pointers for addresses in (inPtrs (array of 3).The program reads the address of the data from the table, and through it reaches the block of the data. Please note, all pointers are 11 bits.The data blocks are all 8 bytes long.It also reads the address in RAM where the final array will start, and from there the data will be copied from the block in the flash.The existing plan needs to be supplemented / corrected / renovated so that everything goes through assembly, and that the data does move in the correct order to the places defined in RAM.And through the routine you will encode (part 2) the maximum numbers in each block will be filled.Pay attention to the comments in the program – there is a full name information that will help you decipher what should be in the code !!| Page12 Routine writing findMaxNumAndSaveIt The input is the INDEX number of the same block of data (0, 1, or 2)The output is to update the MaxNum array which will be set to 0x90 within the RAM with the highest number in the data block.You must scan all the numbers in that block of data, and decide which number is the largest.And keep it in an array at the appropriate entry for the block number.For example: for block # 2 containing the numbers 2, 4, 1, 9, 9 will be written instead of the 2nd of the MaxNum array.
[SOLVED] Payment Information
Project Description:You are an account manager for Inland Jewelers, a regional company that makes custom class rings for graduating seniors. Your supervisor requested a workbook to report on new accounts created on payment plans. The report should provide details on total costs to the student as well as payment information. Each ring financed has a base price that can fluctuate based on ring personalization.
[SOLVED] Compressing An Encyclopedia
1/ Explain how does MP3 and RLE maintain audio quality while also reducing file sizes?2/ Which type is best for compressing an encyclopedia?
[SOLVED] Inventory Information
Project Description:You work for Rockville Auto Sales and have been asked to aid in the development of a spreadsheet to manage sales and inventory information. You will start the task with a prior worksheet that contains vehicle information and sales data for 2018. You need to convert the data to a table. You will manage the large worksheet, prepare the worksheet for printing, sort and filter the table, include calculations, and then format the table.
[SOLVED] Internal Database
List and explain at least three ways an intruder can gain access to an internal database.250 words
[SOLVED] IT Green Computing
Data Warehouse Architecture” (2 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing.”Big Data” (2 pages): Describe your understanding of big data and give an example of how youve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology?Green Computing (2 pages): One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers green. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully.
[SOLVED] Coding Assessment
Use a packet capture program to capture some packets on your home PC. Export the data as acsv file, and record the name.Write a simple program (bash/python/perl/java/etc) to open and read the csv data, and generatea report (print to stdout) of all unique destination IPs and hostnames associated with them. Alsoconvert the csv data into valid JSON, and write that to a file.Only submit your script. Do not submit your data.An example of the output format is found below:user@ubuntu:~$ ls | grep ‘wire|josi’josishark.pywiresharkcsv.csvuser@ubuntu:~$ ./josishark.py192.168.1.169,chromecast.dlink.localhost192.0.73.2,assert.lookup.com192.168.1.160,zxcvf74321jd-4234.dlink.localhostfe80::4c:5dcc:a364:10e4,localhostuser@ubuntu:~$ ls | grep ‘wire|josi’josishark.pywiresharkcsv.csvwiresharkjson.json
[SOLVED] Software Applications
Executive SummaryThe executive summary should be a stand-alone document. In other words, if a reader were to read only your executive summary, the reader would have a good understanding of the problem you are writing about and the solution you are proposing to that problem. In this report, your executive summary should be 150-200 words.Table of ContentsIntroductionIn your introduction, you will tell your decision-maker what problem the report is analyzing. It will do the followingdescribe the context of the work or community situationdescribe the problem being analyzed in that business or community situationstate the questions your report will answerdefine any terms, if necessaryDiscussionThe discussion area is the main part of your report. In this section, you will provide evidence of the problem and justify your recommendations. You will need to be clear, thorough, and persuasive.The following examples demonstrate the need for clarity, thoroughness, and persuasiveness:If you are writing a report recommending that your company allow teleworking, you do not want to write a few sentences about how teleworking is convenient. You want to quote some co-workers you have interviewed about how teleworking will benefit them.If you are writing a report recommending that your company move from Google mail to Outlook, you do not want a few sentences on how good Outlook is. You want to show some screen captures of Google mail to demonstrate that it is awkward, is cumbersome, or has inconvenient features. You also want to show some screen captures of Outlook to demonstrate that it does not feature these shortcomings and improves upon these problems.If you are writing a report recommending that a sidewalk be repaired in your neighborhood, you do not want a few sentences describing why sidewalks should be smooth. You want to show some photographs of the sidewalk that is in disrepair, demonstrating why its current state is unsafe, unsightly, or otherwise undesired.If you are writing a report recommending that your local high school repair parts of its football field, you do not want a few sentences describing the value of athletics for high school students. You want to show some photographs demonstrating where the field needs to be repaired, quote individuals that you have interviewed on the problems with the field now, etc.Notice that in all four examples listed above, primary research was included. Interviews with co-workers or individuals in the community, screen captures of software applications, or photographs of the neighborhood or the football field all represent primary research. Such research adds to the persuasiveness of the report.Without this type of evidence, the report is not thorough and lacks persuasiveness. The decision- maker will not be persuaded that the problem you are outlining is an actual problem unless you can demonstrate that it is an actual problem in the context.Moreover, in the discussion, you describe, in paragraph form, your conclusions and your recommendations. You need to explain why you have come to these conclusions and why you are making these specific recommendations.ConclusionsIn the Conclusions section, you take an objective stance. You summarize the findings of your research without putting your own opinion into the analysis.In your conclusion, you will do the following:summarize your findingsconnect your findings to the problem you have identifiedpresent the conclusions in parallel formbullet the list of conclusionsRecommendationsIn the recommendation, you take a subjective stance in the report. You give your opinion on how the problem should be addressed.In your recommendation, you will do the following:number specific steps of action you recommend in parallel form, beginning with a verbrank the recommendations, listing the most important recommendation first, the secondmost important recommendation second, etc.Please note that this section should be brief. A busy administrator does not want to pore through long, dense paragraphs trying to locate your recommendations. The decision-maker should be able to see at a glance what your recommendations are.
[SOLVED] Password Brute-force
a source program file (e.g., password.py) and (2) a PDF document containing the plaintext password found, the number of words tested, and the screenshot capturing the program run and the password found, and the source codePassword Brute-forceWrite a program that performs the brute-force attack to break the password. The following table shows encrypted passwords using the crypt() function. Your mission is to break the password to 5.
[SOLVED] A Good Webpage
You will go through eight(8) of the website provided on the list to see which ones holds your interest. you will then narrow the eight(8) down to four(4) to complete the attached website evaluations. after word, write a 1 page summary of your reasons for selecting the four websites and how they can be used in you future teaching. What was key in each of these for you?EC 320 WEB.docxPreview the documentWhat Makes a Good Webpage.docxPreview the document
Use Promo Code: FIRST15