Skip to content
  • 0 Votes
    2 Posts
    1k Views
    zareenZ
    [image: dlR77xh.png] [image: DIUIHJx.png]
  • 0 Votes
    2 Posts
    598 Views
    zareenZ
    https://youtu.be/VSHrNQftyHQ
  • 0 Votes
    8 Posts
    2k Views
    A
    @zaasmi thank you so much sir
  • 0 Votes
    4 Posts
    1k Views
    zareenZ
    Q. 1 Solution Idea Devices Visibility Consistency Constraints Affordance Keyboard Keyboard design is a good design all the Alphabet and numeric are in different section also the special function key are arranged in top of the keyboard, specially delete button is very good deployed at right top, which cannot be accidentally pressed during any typing. Keyboard has strict constraint i.e if we want to used special character which are on numeric buttons these cannot be activated without pressing the shift button. Or some button on keyboard especially on laptop is only work with pressing “fn” key. Atm machine ATM has good visibility because it have a limited amount of button on his left and right side and only some limited amount of processing screen. ATM has low consistence because there is no similar function to perform. ATM machine have strongly constraint because without the limited amount of action the individual can nothing to do. ATM Machine have no good affordance because naive users have facing a lot of difficulty while using the ATM. Digital watch Digital watch have no good visibility because its screen is not visible in full sun light and in darken area. It is not consistence device because every button has its function, we cannot perform similar task with different button or method. Digital watch has less affordance because its button have no label, so the naïve user can not configure the time or date. Digital camera It has consistence function because every time we press the button the same work will be done against mentioned button. Good constraint because a person cannot capture video except listed format. Also we cannot change function or setting of camera. Less affordance because the new user can used Digital camera with facing some difficulties. Q.2 Solution Idea: [image: pK2ZpIj.png]
  • 0 Votes
    3 Posts
    2k Views
    zareenZ
    [ORG 0X0100] start: mov ax, 0x000D int 0x10 mov ax, 0x0C02 xor bx, bx mov cx, 100 mov dx, 60 l1: int 0x10 inc cx cmp cx, 200 jne l1 mov cx, 100 mov dx, 60 l2: int 0x10 mov ax, 0x0C05 inc dx cmp dx, 120 jne l2 mov cx, 200 mov dx, 60 l3: int 0x10 mov ax, 0x0C08 inc dx cmp dx, 120 jne l3 mov cx, 100 mov dx, 120 l4: int 10h mov ax, 0x0C09 inc cx cmp cx, 200 jne l4 mov ah, 0 int 0x16 mov ax, 0x0003 int 0x10 mov ax, 0x4C00 int 0x21
  • 0 Votes
    3 Posts
    1k Views
    zaasmiZ
    @aleem1990 said in CS205 Assignment 3 Solution and Discussion: Assignment No. 03 Semester: Fall 2019 CS205: Information Security Total Marks: 25 Due Date: 22/01/2020 Instructions: Please read the following instructions carefully before submitting assignment: You need to use MS word document to prepare and submit the assignment on VU-LMS. It should be clear that your assignment will not get any credit if:  The assignment is submitted after due date.  The assignment is not in the required format (doc or docx)  The submitted assignment does not open or file is corrupt.  Assignment is copied (partial or full) from any source (websites, forums, students, etc) Objectives: To enhance the learning capabilities of the students about cryptography and crypto algorithms. Assignment Question 1: You are required to encrypt the string “Security Professional” and decrypt the string “MdgfjVhjfbteut” using following tables with “Substitution Cipher Method”. [image: 2jpMsDs.png] Question 2: You are required to encrypt the plain text “ACCOUNTABILITY” using Vigenere Square Cipher method? Suppose that keyword is “SILENT”. Question 3: You are required to encrypt the plain text “wearesecurityprofessionalsinuk” into cipher text using columnar transposition method with a Key: “231645”. Best of luck Any Frnd have CS205 Solved 3rd Assignment. Kindly Share it urgent Here are the step-by-step solutions for your cryptography questions. Question 1: Substitution Cipher To solve this, we map each letter of the plaintext to its corresponding character in the provided substitution table. (Note: Since you didn’t provide the specific mapping tables, I have demonstrated the method using a standard Caesar-style shift or a placeholder logic. Please apply your specific table values to this process). Encryption (“Security Professional”): Take each letter (S-e-c-u-r-i-t-y…). Look up ‘S’ in the “Plaintext” row of your table. Write down the character directly below it in the “Cipher” row. Decryption (“MdgfjVhjfbteut”): Look up ‘M’ in the “Cipher” row. Write down the character directly above it in the “Plaintext” row. Question 2: Vigenere Square Cipher Plaintext: ACCOUNTABILITY Keyword: SILENT Step 1: Align the Key Repeat the keyword until it matches the length of the plaintext: Plaintext: A C C O U N T A B I L I T Y Keyword: S I L E N T S I L E N T S I Step 2: Intersection Logic Using a Vigenere Tableau, find the intersection of the Plaintext letter (column) and Keyword letter (row). Plain (P) Key (K) Calculation Ciphertext A (0) S (18) S C (2) I (8) K C (2) L (11) N O (14) E (4) S U (20) N (13) H N (13) T (19) G T (19) S (18) L A (0) I (8) I B (1) L (11) M I (8) E (4) M L (11) N (13) Y I (8) T (19) B T (19) S (18) L Y (24) I (8) G Final Ciphertext: SKNSHGLIMMYBLG Question 3: Columnar Transposition Plaintext: wearesecurityprofessionalsinuk Key: 231645 Step 1: Arrange into Grid The key has 6 digits, so we arrange the text in rows of 6. 2 3 1 6 4 5 w e a r e s e c u r i t y p r o f e s s i o n a l s i n u k Step 2: Read Columns by Key Order Read the columns based on the numerical order of the key (1, 2, 3, 4, 5, 6). Column 1 (Key 1): AURII Column 2 (Key 2): WEYSL Column 3 (Key 3): ECPSS Column 4 (Key 4): EIFNU Column 5 (Key 5): STEAK Column 6 (Key 6): RROON Final Ciphertext: AURIW EY SLE CPSS EIFN UST EAK RROON (Spaces added for readability)
  • 0 Votes
    6 Posts
    2k Views
    bc170403108 MUHAMMAD WALEEDB
    solution #2
  • 0 Votes
    4 Posts
    1k Views
    cyberianC
    https://cyberian.pk/topic/1166/cs311-3-fall19-solution-file
  • 1 Votes
    5 Posts
    540 Views
    zareenZ
    @zareen said in EDU431 Assignment 3 Solution and Discussion: Differentiate between Classical Test Theory and Item response Theory of item analysis Solution Links Solution Links
  • 0 Votes
    4 Posts
    2k Views
    zareenZ
    Solution Idea: Answer No.1: How decision support system helps to organization: Helps in Decision Making. Decision support systems (DSS) are interactive software-based systems intended to help managers in decision-making by accessing large volumes of information generated from various related information systems involved in organizational business processes, such as office automation system, transaction processing system, Enhance effectiveness. A second category of advantage that has been widely discussed and examined is improved decision making effectiveness and better decisions. Decision quality and decision making effectiveness are however hard to document and measure. Most researches have examined soft measures like perceived decision quality rather than objective measures. Advocates of building data warehouses identify the possibility of more and better analysis that can improve decision making. Improve interpersonal communication. DSS can improve communication and collaboration among decision makers. In appropriate circumstances, communications- driven and group DSS have had this impact. Model-driven DSS provides a means for sharing facts and assumptions. Data-driven DSS make “one version of the truth” about company operations available to managers and hence can encourage fact-based decision making. Improved data accessibility is often a major motivation for building a data-driven DSS. This advantage has not been adequately demonstrated for most types of DSS. Competitive advantage. Vendors frequently cite this advantage for business intelligence systems, performance management systems, and web-based DSS. Although it is possible to gain a competitive advantage from computerized decision support, this is not a likely outcome. Vendors routinely sell the same product to competitors and even help with the installation. Organizations are most likely to gain this advantage from novel, high risk, enterprise-wide, inward facing decision support systems. Measuring this is and will continue to be difficult. Part-(b) Identify the techniques & DSS model in each of the following example scenario S.NO Scenario Technique DSS MODEL 01 What would happen to sale when you cut down advertising cost 20 % What if analysis Model Driven Model 02 Increase the cost of advertisement until sale reach to $ 2 million Goal Analysis Model Driven Model 03 Find out about this year revenue in compare to previous year Data Mining Data Driven Model 04 Past admission analysis using exploration of data and discovering features and pattern Data Mining Data Driven Model 05 To receive 950 dollars what number of item must be solved at the cost of 10$ Data Mining Model Driven Model 06 What is the prediction on sale of next year Data Mining Data Driven Model Question no 2: Identify the type of information system or related sub system that describe the following scenario 01 Management information system to measure the success of your client with your product service 02 Content Management System used to manage contacts, forecast and generate reports for sale 03 Management information system that maintain the correct amount of inventory and notify when under stockage occur. 04 Management information system that guaranteed that produced or completed material shipped to the consumer complies with the company’s quality standards 05 CUSTOMER RELATIONSHIP MANAGEMENT SYSTEM used to notify the customers about product recommendation based on the previous order 06 Material requirement planning system Tracks the whole conversion process of raw material into the finished goods Part-(b) Three point between project life cycle and software development life cycle (SDLC) PDLC SDLC PDLC is defined as a process that is responsible for bringing to market a new product and generally includes the business units. SDLC on the other hand, is used for developing particular software products. SDLC is primarily aimed at solving a specific software problem that may arise. PDLC Phases Are As Follows Idea generation and screening Research Development Testing Analysis Introduction SDLC Phases Are As Follows Requirements gathering or analyzing user requirements Designing the program Coding the program Documentation and testing of the system The project lifecycle concerns itself more with the planning and user facing aspects such as Plan, Execute, QA, UAT, Go Live! The SDLC involves steps such as develop, build, test, and promote, debugging/fix.
  • 0 Votes
    1 Posts
    262 Views
    No one has replied
  • 0 Votes
    5 Posts
    2k Views
    zareenZ
    Idea Solution: [image: DTgY5qn.png]
  • 0 Votes
    6 Posts
    2k Views
    cyberianC
    https://youtu.be/6HzayWChB-o
  • 0 Votes
    3 Posts
    953 Views
    zareenZ
    @zareen said in CS604 Assignment 3 Solution and Discussion: Question No 02 12 Marks Suppose a computer lab comprises of two printers, three scanners, and four ROM writers. There are three programs currently running on some computer. Assume program P1 is currently allocated a printer and two ROM writers and it is waiting for a scanner. Program P2 is allocated a scanner and it is waiting for a printer. Program P3 is allocated two ROM writers, a scanner, and a printer. Draw the corresponding resource allocation graph for these three programs. Also specify if the system is in a deadlocked state or not? [image: fEvrDBH.png] The system is not in deadlock state as it is clear from the above graph it is multi instance and circular weight.
  • 0 Votes
    4 Posts
    1k Views
    S
    @zareen ![image: mlmFi3g.jpg] This is the assignment #3 of cs204. Please give me the solution asap. Thanks
  • 0 Votes
    1 Posts
    664 Views
    No one has replied
Reputation Earning
How to Build a $1,000/Month World CUP LIVE Matches Live Cricket Streaming
Ads
File Sharing
Stats

1

Online

3.0k

Users

2.8k

Topics

8.5k

Posts
Popular Tags
Online User
| |