Computer Science

Evaluate the South Balance/DFW Training company organization security architecture and provide recommendations for improvements.

CASE: South Balance is a yoga mat company that bought the DFW Training company. DFW Training makes obstacle courses and gyms. South Balances’ intention is to get into the lucrative DoD contract market to build obstacle courses and gyms for the military. South Balance must merge with DFW training and build out the South Balance/DFW […]

What is the difference between active spoofing and blind spoofing? Can ARP spoofing be accomplished if the target computer is a Mac running OS X?

Spoofing You need to create your own video and audio show all steps for Part 1. each problem how did you solved Part3: Grade (2.5 points) TextBook1: Chapter 7 Make sure explain What is spoofing? What is IP spoofing? What is the difference between active spoofing and blind spoofing? Can ARP spoofing be accomplished if […]

Implement a program that creates pizzas based on user order. Create a class Pizza which consists of a dynamically allocated array of Ingredient object pointers (a double pointer).

Abstract- Pizza Write the code in C++ Implement a program that creates pizzas based on user order. First, create class called Ingredient with one instance variable description of type string which is set in the constructor and can be get using a getter function. Create the following classes that derive from Ingredient: Tomato Sauce, Cheese, […]

Create the file ID.txt in the format shown below, containing your name, userid, G#, lecture section and lab section. Make a backup of your files on OneDrive.

Honor Code Honor Code:The project is individual work of each student, you’re not allowed to collaborate in any form. Copying code from other sources (peers, websites, etc.) is a serious violation of the University’s Honor Code. Your code will be examined for similarities with other sources. Validation: Make sure all method parameters are properly validated […]

Prepare a research report discussing on the challenges in implementing for privacy and security of medical record.

Challenges in implementing for Privacy and Security of Medical Record Prepare a research report discussing on the challenges in implementing for privacy and security of medical record The report should be well organized: (a)title (b)abstract (c)introduction (motivation/scope, problem/ importance/ objectives), (d)literature review (organized from the general to specific, subheadings reflecting internal subsystem/ framework/ architecture, and […]

Prepare a discussion forum that focuses on traditional software processing models used by developers to create a successful system.

Discussion forum Prepare a discussion forum that focuses on traditional software processing models used by developers to create a successful system. Discuss at least three of the models. Identify each of their respective advantages and disadvantages.  

Starting from the current head position, what is the total distance (in cylinders) that the disk arm moves to satisfy all the pending requests for each of the following disk-scheduling algorithms?

Mass Storage Template Suppose that a disk drive has 5,000 cylinders, numbered 0 to 4,999. The drive is currently serving a request at cylinder 2,150, and the previous request was at cylinder 1,805. The queue of pending requests, in FIFO order, is: 2,069 1,212 2,296 2,800 544 1,618 356 1,523 4,956 3,681 Starting from the […]

Does a multithreaded process consist of (a) a working set for the entire process or (b) a working set for each thread? Explain.

Virtual Memory Template Consider a demand-paging system with the following time-measured utilizations: CPU utilization 20% Paging disk 97.7% Other I/O devices 5% For each of the following, say whether it will (or is likely to) improve CPU utilization. Explain your answers. Install a faster CPU. Install a bigger paging disk. Increase the degree of multiprogramming. […]

Identify and tackle practical problems in networked systems, ideally with data science related techniques learned from the above material from Chiang 2012.

Topic: Networked Life Based on the material on Chapter 1 to 4 of: Mung Chiang, “Networked Life: 20 Questions and Answers”, Cambridge University Press, 2012 (file “NetworkedLife.PDF”) Working on network application or data service projects Create a network (e.g., build an app) Measure/describe a network (one we don’t look at) Analyze an existing dataset (e.g., […]

Scroll to top