Skip to content
  • 0 Votes
    3 Posts
    2k Views
    zareenZ
    [ORG 0X0100] start: mov ax, 0x000D int 0x10 mov ax, 0x0C02 xor bx, bx mov cx, 100 mov dx, 60 l1: int 0x10 inc cx cmp cx, 200 jne l1 mov cx, 100 mov dx, 60 l2: int 0x10 mov ax, 0x0C05 inc dx cmp dx, 120 jne l2 mov cx, 200 mov dx, 60 l3: int 0x10 mov ax, 0x0C08 inc dx cmp dx, 120 jne l3 mov cx, 100 mov dx, 120 l4: int 10h mov ax, 0x0C09 inc cx cmp cx, 200 jne l4 mov ah, 0 int 0x16 mov ax, 0x0003 int 0x10 mov ax, 0x4C00 int 0x21
  • 0 Votes
    3 Posts
    1k Views
    zaasmiZ
    @aleem1990 said in CS205 Assignment 3 Solution and Discussion: Assignment No. 03 Semester: Fall 2019 CS205: Information Security Total Marks: 25 Due Date: 22/01/2020 Instructions: Please read the following instructions carefully before submitting assignment: You need to use MS word document to prepare and submit the assignment on VU-LMS. It should be clear that your assignment will not get any credit if:  The assignment is submitted after due date.  The assignment is not in the required format (doc or docx)  The submitted assignment does not open or file is corrupt.  Assignment is copied (partial or full) from any source (websites, forums, students, etc) Objectives: To enhance the learning capabilities of the students about cryptography and crypto algorithms. Assignment Question 1: You are required to encrypt the string “Security Professional” and decrypt the string “MdgfjVhjfbteut” using following tables with “Substitution Cipher Method”. [image: 2jpMsDs.png] Question 2: You are required to encrypt the plain text “ACCOUNTABILITY” using Vigenere Square Cipher method? Suppose that keyword is “SILENT”. Question 3: You are required to encrypt the plain text “wearesecurityprofessionalsinuk” into cipher text using columnar transposition method with a Key: “231645”. Best of luck Any Frnd have CS205 Solved 3rd Assignment. Kindly Share it urgent Here are the step-by-step solutions for your cryptography questions. Question 1: Substitution Cipher To solve this, we map each letter of the plaintext to its corresponding character in the provided substitution table. (Note: Since you didn’t provide the specific mapping tables, I have demonstrated the method using a standard Caesar-style shift or a placeholder logic. Please apply your specific table values to this process). Encryption (“Security Professional”): Take each letter (S-e-c-u-r-i-t-y…). Look up ‘S’ in the “Plaintext” row of your table. Write down the character directly below it in the “Cipher” row. Decryption (“MdgfjVhjfbteut”): Look up ‘M’ in the “Cipher” row. Write down the character directly above it in the “Plaintext” row. Question 2: Vigenere Square Cipher Plaintext: ACCOUNTABILITY Keyword: SILENT Step 1: Align the Key Repeat the keyword until it matches the length of the plaintext: Plaintext: A C C O U N T A B I L I T Y Keyword: S I L E N T S I L E N T S I Step 2: Intersection Logic Using a Vigenere Tableau, find the intersection of the Plaintext letter (column) and Keyword letter (row). Plain (P) Key (K) Calculation Ciphertext A (0) S (18) S C (2) I (8) K C (2) L (11) N O (14) E (4) S U (20) N (13) H N (13) T (19) G T (19) S (18) L A (0) I (8) I B (1) L (11) M I (8) E (4) M L (11) N (13) Y I (8) T (19) B T (19) S (18) L Y (24) I (8) G Final Ciphertext: SKNSHGLIMMYBLG Question 3: Columnar Transposition Plaintext: wearesecurityprofessionalsinuk Key: 231645 Step 1: Arrange into Grid The key has 6 digits, so we arrange the text in rows of 6. 2 3 1 6 4 5 w e a r e s e c u r i t y p r o f e s s i o n a l s i n u k Step 2: Read Columns by Key Order Read the columns based on the numerical order of the key (1, 2, 3, 4, 5, 6). Column 1 (Key 1): AURII Column 2 (Key 2): WEYSL Column 3 (Key 3): ECPSS Column 4 (Key 4): EIFNU Column 5 (Key 5): STEAK Column 6 (Key 6): RROON Final Ciphertext: AURIW EY SLE CPSS EIFN UST EAK RROON (Spaces added for readability)
  • 0 Votes
    20 Posts
    15k Views
    zareenZ
    _________ operator in Prolog is used for List construction and also for List dismantling. CS508 !(Sign of exclamation) |(Vertical Slash) PG # 90 :(Colon) None of the given
  • 0 Votes
    6 Posts
    2k Views
    bc170403108 MUHAMMAD WALEEDB
    solution #2
  • 0 Votes
    4 Posts
    1k Views
    cyberianC
    https://cyberian.pk/topic/1166/cs311-3-fall19-solution-file
  • 0 Votes
    1 Posts
    379 Views
    No one has replied
  • 0 Votes
    1 Posts
    332 Views
    No one has replied
  • 2 Votes
    4 Posts
    506 Views
    Mohsin zafarM
    CAN YOU PROVIDE SOLUTION OF THAT ASSIGNMENT?
  • 1 Votes
    5 Posts
    548 Views
    zareenZ
    @zareen said in EDU431 Assignment 3 Solution and Discussion: Differentiate between Classical Test Theory and Item response Theory of item analysis Solution Links Solution Links
  • 0 Votes
    1 Posts
    457 Views
    No one has replied
  • 0 Votes
    2 Posts
    761 Views
    zareenZ
    @zareen said in STA630 Assignment 1 Solution and Discussion: sampling and sampling technique Sampling is the process whereby some elements (individuals) in the population are selected for a research study. The population consists of all individuals with a particular characteristic that is of interest to the researchers. If data are obtained from all members of the population, then we have a census; if data are obtained from some members of the population, then we have a sample. With probability sampling, a researcher can specify the probability of an element’s (participant’s) being included in the sample. With non probability sampling, there is no way of estimating the probability of an element’s being included in a sample. Although often more difficult and expensive, probability sampling is a methodologically more precise method to obtain a sample that is representative of the population. With simple random sampling, each individual in the population has an equal chance of being selected for the sample. The four steps of simple random sampling are (1) defining the population, (2) constructing a list of all members, (3) drawing the sample, and (4) contacting the members of the sample. Stratified random sampling is a form of probability sampling in which individuals are randomly selected from specified subgroups (strata) of the population. This method can be used to increase the representativeness of the sample and/or to allow comparisons to be made among individuals in the different strata. Convenience sampling is quick and inexpensive because it involves selecting individuals who are readily available at the time of the study (such as introductory psychology students). The disadvantage is that convenience samples are generally less representative than random samples; therefore, results should be interpreted with caution. Quota sampling involves the selection of a certain percentage of individuals from specified subgroups of the population when the population is large and lists of members are not available. Many polling organizations use this technique. Appropriate sample size depends on various considerations, including population variability, statistical issues, economic factors, and availability of participants. In general, with larger samples you will have a smaller margin of error and you can detect smaller differences. The larger the variability of scores in the population, the larger the sample must be in order to be representative. Sampling error includes systematic error and random error.Systematic error occurs when the sample is not properly drawn (an error of the researcher). Random error is the degree to which the sample is not perfectly representative of the population. Even with the best sampling techniques, some degree of random error is expected. Increasingly, we are exposed to information based on sample data. Understanding the principles of sampling, particularly the limitations of various methods, should make us more critical consumers of such information.
  • 0 Votes
    4 Posts
    2k Views
    zareenZ
    Solution Idea: Answer No.1: How decision support system helps to organization: Helps in Decision Making. Decision support systems (DSS) are interactive software-based systems intended to help managers in decision-making by accessing large volumes of information generated from various related information systems involved in organizational business processes, such as office automation system, transaction processing system, Enhance effectiveness. A second category of advantage that has been widely discussed and examined is improved decision making effectiveness and better decisions. Decision quality and decision making effectiveness are however hard to document and measure. Most researches have examined soft measures like perceived decision quality rather than objective measures. Advocates of building data warehouses identify the possibility of more and better analysis that can improve decision making. Improve interpersonal communication. DSS can improve communication and collaboration among decision makers. In appropriate circumstances, communications- driven and group DSS have had this impact. Model-driven DSS provides a means for sharing facts and assumptions. Data-driven DSS make “one version of the truth” about company operations available to managers and hence can encourage fact-based decision making. Improved data accessibility is often a major motivation for building a data-driven DSS. This advantage has not been adequately demonstrated for most types of DSS. Competitive advantage. Vendors frequently cite this advantage for business intelligence systems, performance management systems, and web-based DSS. Although it is possible to gain a competitive advantage from computerized decision support, this is not a likely outcome. Vendors routinely sell the same product to competitors and even help with the installation. Organizations are most likely to gain this advantage from novel, high risk, enterprise-wide, inward facing decision support systems. Measuring this is and will continue to be difficult. Part-(b) Identify the techniques & DSS model in each of the following example scenario S.NO Scenario Technique DSS MODEL 01 What would happen to sale when you cut down advertising cost 20 % What if analysis Model Driven Model 02 Increase the cost of advertisement until sale reach to $ 2 million Goal Analysis Model Driven Model 03 Find out about this year revenue in compare to previous year Data Mining Data Driven Model 04 Past admission analysis using exploration of data and discovering features and pattern Data Mining Data Driven Model 05 To receive 950 dollars what number of item must be solved at the cost of 10$ Data Mining Model Driven Model 06 What is the prediction on sale of next year Data Mining Data Driven Model Question no 2: Identify the type of information system or related sub system that describe the following scenario 01 Management information system to measure the success of your client with your product service 02 Content Management System used to manage contacts, forecast and generate reports for sale 03 Management information system that maintain the correct amount of inventory and notify when under stockage occur. 04 Management information system that guaranteed that produced or completed material shipped to the consumer complies with the company’s quality standards 05 CUSTOMER RELATIONSHIP MANAGEMENT SYSTEM used to notify the customers about product recommendation based on the previous order 06 Material requirement planning system Tracks the whole conversion process of raw material into the finished goods Part-(b) Three point between project life cycle and software development life cycle (SDLC) PDLC SDLC PDLC is defined as a process that is responsible for bringing to market a new product and generally includes the business units. SDLC on the other hand, is used for developing particular software products. SDLC is primarily aimed at solving a specific software problem that may arise. PDLC Phases Are As Follows Idea generation and screening Research Development Testing Analysis Introduction SDLC Phases Are As Follows Requirements gathering or analyzing user requirements Designing the program Coding the program Documentation and testing of the system The project lifecycle concerns itself more with the planning and user facing aspects such as Plan, Execute, QA, UAT, Go Live! The SDLC involves steps such as develop, build, test, and promote, debugging/fix.
  • 0 Votes
    2 Posts
    305 Views
    zareenZ
    Q. 1 Varieties A B C 23 18 16 26 28 25 20 17 12 17 21 14 Test the hypothesis that the three verities of potatoes are not different in the yielding capabilities. Solution Q.1: [image: dzN6VLQ.png] [image: SO55ms8.png] [image: XZEmXSQ.png] [image: nfGQY25.png] Q.2 Solution: Complete the ANOVA table. Source of variation Sum of squares Degrees of freedom Mean square F B/W treatments 79.44 4 19.860 6.90 Error 57.600 20 2.88 Total 137.040 24
  • 0 Votes
    1 Posts
    322 Views
    No one has replied
  • 0 Votes
    1 Posts
    759 Views
    No one has replied
  • 0 Votes
    1 Posts
    915 Views
    No one has replied
Reputation Earning
How to Build a $1,000/Month World CUP LIVE Matches Live Cricket Streaming
Ads
File Sharing
Stats

0

Online

3.0k

Users

2.8k

Topics

8.5k

Posts
Popular Tags
Online User
| |