UC RSA Algorithm & RSA Cryptosystem Discussion Questions

I need an explanation for this Computer Science question to help me study. 1). Using the Web or other resources, write a brief paper about RSA, its history, its methodology, and where it is used.2). Send a brief message (ten words minimum) using the Caesar Cypher.Video. John Oliver on This Week Tonight.Click HERE to watch or click embedded video below.

Modelling of Public Policy Discussion

Help me study for my Computer Science class. I’m stuck and don’t understand. Describe the different ways in which policy models are used.  What are the key lessons for policy modeling, according to this paper? Based on the examples that are provided, do you agree that these models would be useful? Please explain why or why not. 

Java Programming Code Computer Science Worksheet

Add additional information to the student class below such as name, address, major, and contact information along with all the getters and setters (methods) needed to access all data. Submit your code along with a sample run of your program. Comment all your code. Cite any sources of information you use. Write a note on the process of completing the assignment in a Microsoft Word document.Submission Details:

Critical path method (cpm) | Information Systems homework help

There are a lot of tools that can be used to manage projects. The Critical Path Method (CPM) can be used as a project management tool for determining the duration and slack times of project activities. Describe how this tool can be used to recover from schedule overruns of specific activities that are not on the critical path. Provide an example to justify your answer.

Ancient Epics Plot Analysis

For each of the following works, please provide a one or two sentence summary of its plot, a one sentence description of the time when it was produced and the culture that produced it, and a two sentence description of the character who you think is the most important in the work.Setne Khamwas and Naneferkaptah.Tale of SinuheGilgameshThe OdysseyAesopRamayanaMahabharata

Smart Solution to Detect Prevent Bridge Accident IOT Discussion

In this section, a discussion of the social and ethical impacts of the project on the project environment and on the society as whole is given. The sections must also discussthe legal implications of carryingthis project in the Sultanate of Oman:1.Social Issues (1 page)2.Ethical Issues (1 page)3.Legal Issues (1 page)Notes:-Kindly make sure of, zero similarity in turn it in-Use easy language

Thinking | Computer Science homework help

  
“Critical Thinking Assignment #4: Java Program #4 of 6 Using Arrays with Sorting and Searching Algorithms” 
2. Critical Thinking Assignment #5: Java Program #5 Using Inheritance 
3. Program #6 Java Interactive GUI Application for Number Guessing Game. 
ITS/320
1. Critical Thinking Assignment #4:
 Java Program #4 of 6 (70 Points)Using Arrays with Sorting and Searching Algorithms(based on Module 4 material)1) This program has six required outputs and involves searching and sorting an array of integers.Write a Java application that initializes an array with the following numbers, in this order:23, 17, 5, 90, 12, 44, 38, 84, 77, 3, 66, 55, 1, 19, 37, 88, 8, 97, 25, 50, 75, 61, and 49Then display the unsorted values. This is required output #1 of 6 for this program.Using a sequential search of the unsorted array, determine and report the 1-relative (i.e. 1, 2, 3, 4, etc.) positions of the following numbers in the array (or -1 if not found), and the number of searches required to locate the numbers: 25, 30, 50, 75, and 92. This is required output #2 of 6.Then display the total number of searches for all five numbers. This is required output #3 of 6.Sort the numbers using any algorithm of your choice and then display the sorted array. This is required output #4 of 6.Using a binary search of the sorted array, determine and report the 1-relative positions of the following numbers in the array (or -1 if not found), and the number of searches required to locate the numbers: 25, 30, 50, 75, and 92. This is required output #5 of 6.Finally, display the total number of searches for all five numbers. This is required output #6 of 6.(There are six required sets of output as numbered in the above paragraphs.)Try to create an object-oriented solution for your solution vs. a procedural one. For example, you might have a class that stores an array passed by a driver class, with methods for sorting the array, searching the array via a sequential search, searching the array via a binary search, and output the current contents of the array. The driver class could not only pass in the initial array values but call various methods to perform the searches, sorting, and array contents display. You may use any output type class you want (e.g. Scanner, JOptionPane).Be sure that you include the course, the program number, your name, and the date in your program header. Include additional comments as necessary and maintain consistent indentation for good programming style as shown in the text. Be sure that you capture all of your output for this program’s execution for full credit!2) You may use any Java Integrated Development Environment (IDE) you choose to develop your source code, compile and link your code, and execute your program (jGRASP is recommended). Or you may use the Windows Command Prompt.You are to submit the following deliverables in a single Microsoft Word file in this order, and clearly labeled.a) A screen snapshot of your Java source code (all file(s) shown separately) displayed in the IDE or Windows editor showing a successful compilation if possible (only the beginning of the source file(s) are necessary).b) A listing of your entire source code file(s).c) A screen snapshot of all of your program’s outputs for the specified values in Step #1. For thisprogram there are 6 (six) total sets of item(s) to be output. Failure to show any of them will resultin lost points. In order not to confuse the grading process, and possible lose points, do not includeany other outputs besides these six items.3) Your instructor may compile and run your program to verify its correctness.4) You will be evaluated on (in order of importance):a) Following directions and inclusion and packaging of all deliverables in Step #2.b) Correct execution of your program (this includes proper compilation). This also includes gettingthe correct answers!c) Proper commenting of your Java code and indentation (as specified in the text).d) Neatness in packaging of your deliverables (to include putting the items in Step #2 in the correctorder).
  
2) You may use any Java Integrated Development Environment (IDE) you choose to develop your source code, compile and link your code, and execute your program (jGRASP is recommended). Or you may use the Windows Command Prompt.
You are to submit the following deliverables in a single Microsoft Word file in this order, and clearly labeled.
a) A screen snapshot of your Java source code (all file(s) shown separately) displayed in the IDE or Windows editor showing a successful compilation if possible (only the beginning of the source file(s) are necessary
b) A listing of your entire source code file(s).
c) A screen snapshot of all of your program’s outputs for the specified values in Step #1. Failure to show any of them will result in lost points.
3) Your instructor may compile and run your program to verify its correctness.
4) You will be evaluated on (in order of importance):
a) Following directions and inclusion and packaging of all deliverables in Step #2.
b) Correct execution of your program (this includes proper compilation). This also includes getting the correct answers!
c) Proper commenting of your Java code and indentation (as specified in the text).
d) Neatness in packaging of your deliverables (to include putting the items in Step #2 in the correct order).
  
ITS 320
3. Critical Thinking Assignment #6: Java Program #6 of 6 (70 Points)
Java Interactive GUI Application for Number Guessing with Colored Hints
(based on Module 7 material)
1) Develop a Java application that plays a “guess the number” game as described below.
a) Your application first gets a random number in the range 1-1000 inclusive (you might want to use Math.random() or the Random class).
b) The application then displays the following prompt (probably via a JLabel):
I have a number between 1 and 1000. Can you guess my number?
Please enter your first guess.
Post a textbox for the user to enter a number and post a message telling the user to hit ‘Enter’ after entering a guess in a textbox (probably using a JTextField).
c) Input the user’s guess in the code for a previously-registered event-handler method (consider using the event-handling approach discussed in the text, or the actionPerformed() method of class based on the ActionListener interface, which will require some additional research outside the text).
d) For the first guess, color the entire background red, meaning that they are getting warmer (you might want to use the setBackground() method for a container). If this is the second or later guess, and they are further from the correct number than the last guess, then color the entire background blue. If they get the correct number then color the background some other color than red or blue.
e) If the user guessed the number correctly, respond with their number, post a congratulatory message, get a new random number, and display a JButton to start a new game. Otherwise, to help the user close in on the correct number, post a message, with their guessed number, whether they are “TOO HIGH” or “TOO LOW” from the correct number, and whether they are “WARMER” or “COLDER” (this should match the background color). Also report the guess number of the next guess (e.g. “Enter guess number nnn”). You might want to use a concatenated string in JLabel for these incorrect guess messages.
f) The process is repeated each game until the user guesses the correct number. Be sure that you erase obsolete status messages.
You must run your program for a scenario where the number is not guessed correctly for at least 4 (four) tries (it can be more). A game where you guess the correct number on the fourth try is acceptable. You must show all user inputs and program outputs for this scenario, not just a sample.
Your submitted output must include the appropriate red or blue background after each guess.
You must include at least one “warmer” and one “cooler” result.
To help you visualize what is required for this program please review the sample output from the last step in these specifications below.
(This program was taken from Exercise 11.15 on page 592 of Deitel & Deitel’s “Java How to Program (Sixth Edition)” (2005 by Pearson Publishing Co.))
Be sure that you include the course, the program number, your name, and the date in your program header. Include additional comments as necessary and maintain consistent indentation for good programming style as shown in the text. Be sure that you capture all of your output for this program’s execution for full credit!
2) You may use any Java Integrated Development Environment (IDE) you choose to develop your source code, compile and link your code, and execute your program (jGRASP is recommended). Or you may use the Windows Command Prompt.
3) You are to submit the following deliverables in a single Microsoft Word file in this order, and clearly labeled.

Hazards Threats and Terrorism Discussion

You just basically responding to the student of what you felt compelling and enlightening. If you need help responding to the student post here is a guide that you can use: Respond to your fellow classmate with at least a 100-word reply about their Primary Task Response regarding items you found to be compelling and enlightening. To help you with your discussion, please consider the following questions:Student paper down below:A threat is an expression of an intention to inflect damage, injury or pain to person, place, or thing (Merriam-Webster, n.d.). Hazards are potential threats and can be man-made, technical, naturally occurring or a combination of the both. Both are harmful to human life, property and infrastructure. Natural hazards consist of earthquakes, tsunamis, hurricanes, wildfires, tornadoes , blizzards, and avalanches. Technical hazard incidents include chemical, medical, or radiological (MUSE, 2019).Terrorism is now categorized as either domestic or international. Terrorism is the unlawful use of force or violence against another person or property to intimate or coerce others for political gain (MUSE, 2019). Section 802 of the Patriot Act (Pub. L. No. 107-52) expanded to cover domestic terrorism if an individual appears to intend to cause mass destruction, assassination or kidnapping to the civilian population (ACLU). A domestic terrorist is often motivated by racial, political, social or religious reasons. October 1, 2017 Stephen Paddock shot and killed 59 people and wounded 500 from his room at the Mandalay Bay hotel in an act of domestic terrorism (Grinberg, 2017). I still remember when September 11th happened because I joined the Army shortly after. Homegrown terrorist such as the ones in the San Bernardino, CA shooting are still considered international terrorism because these individuals were radicalized and committed the acts on US soil (FBI, 2016).Colorado Threats and HazardsColorado does not have a specific definition on threats (terrorists), but under C.R.S. 18-3-206 an individual can be charged with criminal threats also known as terroristic threats. A person would be charged with terroristic threats if one threatens to harm, kill, or stalk another person. It is a class three felony and if a weapon is involved it will become a class five felony. The Colorado Information Analysis Center works to gather information on acts of terrorism and criminal threats that directly affect Colorado (CDHSEM, 2017). Hazards in Colorado are like the ones listed under the federal guideline; wildfires, floods, landslides/rockslides. The Colorado Division of Homeland Security & Emergency Management does provide additional information on blizzards, avalanches and active shooters (CDHSEM, 2018). A little over a week ago in Highlands Ranch, CO, the STEM school experienced an active shooter situation and the information provided on the site is very concise on how one should deal with an active shooter once the situation becomes imminent danger to others. Colorado appears to follow very similar guidelines as the federal government. This year we have already dealt with avalanches, active shooters and a blizzard that the governor that to activate the national guard to help with over 1100 stranded drivers in Colorado Springs alone. After reading our emergency preparedness guidelines and plans I feel more knowledgeable for the upcoming fire season!

VC Confidence vs Precision Discussion

I’m working on a statistics discussion question and need guidance to help me learn. Our text describes a trade-off that we must make as engineers between our confidence in the value of a parameter versus the precision with which we know the value of that parameter.  That trade-off might be affected by whether we are looking at a two-sided or bounded (one-sided) interval.Discuss your interpretation of the confidence-precision trade-off, and provide a few examples of how you might make a choice in one direction or the other in an engineering situation.