Description
Need a program for college assignment.
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
This is great! Exactly what I wanted.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
CS 405 SNHU W5 Code XOR Encryption Project
Overview
You are a senior software developer on a team of software developers who are responsible for a large banking web ...
CS 405 SNHU W5 Code XOR Encryption Project
Overview
You are a senior software developer on a team of software developers who are responsible for a large banking web application. Your manager has recently discovered that none of the data is encrypted. She is panicking and now wants to put encryption into everything. However, she wants some proof of how it works. Another developer on the team started creating the application to show encryption, but cannot figure out how to load and save files or to do encryption. The task has fallen to you to finish the work.
Prompt
You will learn to do the following:
Implement XOR-based encryption character by character across a file of data
Implement loading data from a text file into a string
Save a string to a text file
The source code has been commented on using TODO to explain the detailed rules you must follow. When implementing XOR encryption, you will need to account for the length of your password key. See the example file in the module resources section. The file format that is loaded and saved is defined in the source code. You must use the format specified for the program to work. You are provided a sample input file to test your program, and you will need to change the data file to complete the assignment. Use the file names defined in the source code file, and don’t forget that you can leverage capabilities provided by the standard C++ library to help you achieve success.
Specifically, you will need to complete the following:
Code XOR Encryption: Complete the coding activity by successfully implementing XOR encryption, accounting for key lengths.
Code the Loading of a Text File: Complete the coding activity by successfully implementing the logic to read a text file in the specified format into a string in the read_file method.
Code the Saving of a Text File: Complete the coding activity by successfully implementing the logic to save a text file in the specified format in the save_data_file method.
Data Files: Create an original data file in the specified data format, produce the encrypted and decrypted data files, and ensure all file names match the source code defined file names.
C/C++ Program Functionality and Best Practices: Demonstrate industry standard best practices, including in-line comments and appropriate naming conventions to enhance readability of code. Develop functional C/C++ code that illustrates a software design pattern approach.
Process Summary: Provide a summary of the debugging that is thorough and systematic, including specific types of bugs, and accurately describe the corrections.
Python SQL Programming Assignment
Relational databases tutorial - A quick guide covering relational databases
Back to Basics SQL Tutorial - A good run down ...
Python SQL Programming Assignment
Relational databases tutorial - A quick guide covering relational databases
Back to Basics SQL Tutorial - A good run down of using SQL and SQLite
SQLite Python Tutorial - how to use SQLite from python
DeVry University R Programming and The Shinydashboard Package Coding
8.2The Shinydashboard PackageCreating CodeBuilding on the Shiny application techniques of the from your earlier readings, ...
DeVry University R Programming and The Shinydashboard Package Coding
8.2The Shinydashboard PackageCreating CodeBuilding on the Shiny application techniques of the from your earlier readings, you will create a dashboard application using the shinydashboard package. Data generated from the uniform probability and normal probability distributions will be used to generate our data sets. The graphs of our dashboard applications will present more detailed information about our data including summary statistics such as the mean, median, and standard deviation.To prepare for your assignment you will need to practice by recreating code contained in your readings. Develop the R code for the "Suggested project: Relocate the slider" found in this module's readings. Paste your R code and your output into a document. Submit your results for this assignment.8.3Interacting with GraphicsCreating CodesIn the previous shinydashboard application you used a slider bar and tabs to change the appearance of your plotted output. The user is interacting with the components, such as slider bars and tabs, to produce a change in the plotted graph.In this application, the user will interact directly with the points on the plotted graph to modify the output of the application. Now the plotted graph itself becomes interactive.For this assignment, develop the R code for the "Suggested project: Experiment with airquality" found in this week's readings. This project is located in the Interacting with Graphics section. Paste your R code and your output into a document. Submit your results for this assignment.Save your assignment using a naming convention that includes your first and last name and the activity number (or description). Do not add punctuation or special characters.
Create the Data Access tier and Data tier projects:
I have included the link to install the database, if needed.Please do not hesitate to let me know if you need anything els ...
Create the Data Access tier and Data tier projects:
I have included the link to install the database, if needed.Please do not hesitate to let me know if you need anything else. THANK YOU!The company has asked you to build a prototype of an n-tier system
using the Northwind database as an example. The company wants to be able
to add, edit, and delete records from the customers, orders, order
details, products, categories, and suppliers tables. Your instructor
will provide you the online link to the SQL Server database files (MDF
and LDF).
Assignment Guidelines
Create the Data Access tier and Data tier projects:
Create a class library project for the Data tier.Add a new class library project the project created in Step 1 for the data access tier.Add a typed DataSet using a new data source that connects to the Northwind sample database.Select the database objects (customers, orders, order details, products, categories, and suppliers) tables.Make sure the TableAdapters are stored in the Data Access tier and the DataSet class is added to the Data tier. Make
sure that separate tiers are created for each layer by verifying that
separate class libraries were created and the necessary references to
the project were added. *****
Links to install Database for IP2:
https://msdn.microsoft.com/en-us/library/8b6y4c7s.aspx
3 pages
Doc111
In the 2008 presidential election, newspapers reported that Obama received 40% of the white male vote. If this is true, wh ...
Doc111
In the 2008 presidential election, newspapers reported that Obama received 40% of the white male vote. If this is true, what is the probability that a ...
Similar Content
How Did Piaget Influence Our Understanding of Play?
For this Play assignment You will follow the instructions and answer all the 11 questions on the form. Please print...
Scala Programmming Worksheet
Instructions:Watch the hands-on video on using Scala to write a MapReduce program. Write a Scala MapReduce program that fi...
ITP 120 Northern Virginia Community College Classes Objects & Inheritance Program
ITP 120 Program 4 (Classes, Objects, and Inheritance) Spring 2020
Due Sunday, May 3 at 11:59 PM
WARNING: You have 11 days ...
Ashford University ERD Models Project Report
ER model.You should present the ER model for the government data and the ER model for your redesigned database. You should...
Design Alternatives, computer science homework help
Week 3 Assignment 2:Course Project: Part 3—Design AlternativesIn a professional environment, you typically create three ...
Collin County Community College The Film Schindlers List Discussion
Collin Film Series - "Schindler's List" - Oct 12-16Collin College Auteur Film Series presents a free screening of ...
Answers
You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the a...
Answer
last_update TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP ON UPDATE...
Untitled
A company claims that, when exposed to their toothpaste, 45% of all bacteria related to gingivitis are killed, on average....
Related Tags
Book Guides
The Mayor of Casterbridge
by Thomas Hardy
Wuthering Heights
by Emily Brontë
Too Much and Never Enough
by Mary L. Trump
The Glass Palace
by Amitav Ghosh
The Call of the Wild
by Jack London
The Sun Is Also a Star
by Nicola Yoon
How to Win Friends and Influence People
by Dale Carnegie
The Sixth Extinction An Unnatural History
by Elizabeth Kolbert
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
CS 405 SNHU W5 Code XOR Encryption Project
Overview
You are a senior software developer on a team of software developers who are responsible for a large banking web ...
CS 405 SNHU W5 Code XOR Encryption Project
Overview
You are a senior software developer on a team of software developers who are responsible for a large banking web application. Your manager has recently discovered that none of the data is encrypted. She is panicking and now wants to put encryption into everything. However, she wants some proof of how it works. Another developer on the team started creating the application to show encryption, but cannot figure out how to load and save files or to do encryption. The task has fallen to you to finish the work.
Prompt
You will learn to do the following:
Implement XOR-based encryption character by character across a file of data
Implement loading data from a text file into a string
Save a string to a text file
The source code has been commented on using TODO to explain the detailed rules you must follow. When implementing XOR encryption, you will need to account for the length of your password key. See the example file in the module resources section. The file format that is loaded and saved is defined in the source code. You must use the format specified for the program to work. You are provided a sample input file to test your program, and you will need to change the data file to complete the assignment. Use the file names defined in the source code file, and don’t forget that you can leverage capabilities provided by the standard C++ library to help you achieve success.
Specifically, you will need to complete the following:
Code XOR Encryption: Complete the coding activity by successfully implementing XOR encryption, accounting for key lengths.
Code the Loading of a Text File: Complete the coding activity by successfully implementing the logic to read a text file in the specified format into a string in the read_file method.
Code the Saving of a Text File: Complete the coding activity by successfully implementing the logic to save a text file in the specified format in the save_data_file method.
Data Files: Create an original data file in the specified data format, produce the encrypted and decrypted data files, and ensure all file names match the source code defined file names.
C/C++ Program Functionality and Best Practices: Demonstrate industry standard best practices, including in-line comments and appropriate naming conventions to enhance readability of code. Develop functional C/C++ code that illustrates a software design pattern approach.
Process Summary: Provide a summary of the debugging that is thorough and systematic, including specific types of bugs, and accurately describe the corrections.
Python SQL Programming Assignment
Relational databases tutorial - A quick guide covering relational databases
Back to Basics SQL Tutorial - A good run down ...
Python SQL Programming Assignment
Relational databases tutorial - A quick guide covering relational databases
Back to Basics SQL Tutorial - A good run down of using SQL and SQLite
SQLite Python Tutorial - how to use SQLite from python
DeVry University R Programming and The Shinydashboard Package Coding
8.2The Shinydashboard PackageCreating CodeBuilding on the Shiny application techniques of the from your earlier readings, ...
DeVry University R Programming and The Shinydashboard Package Coding
8.2The Shinydashboard PackageCreating CodeBuilding on the Shiny application techniques of the from your earlier readings, you will create a dashboard application using the shinydashboard package. Data generated from the uniform probability and normal probability distributions will be used to generate our data sets. The graphs of our dashboard applications will present more detailed information about our data including summary statistics such as the mean, median, and standard deviation.To prepare for your assignment you will need to practice by recreating code contained in your readings. Develop the R code for the "Suggested project: Relocate the slider" found in this module's readings. Paste your R code and your output into a document. Submit your results for this assignment.8.3Interacting with GraphicsCreating CodesIn the previous shinydashboard application you used a slider bar and tabs to change the appearance of your plotted output. The user is interacting with the components, such as slider bars and tabs, to produce a change in the plotted graph.In this application, the user will interact directly with the points on the plotted graph to modify the output of the application. Now the plotted graph itself becomes interactive.For this assignment, develop the R code for the "Suggested project: Experiment with airquality" found in this week's readings. This project is located in the Interacting with Graphics section. Paste your R code and your output into a document. Submit your results for this assignment.Save your assignment using a naming convention that includes your first and last name and the activity number (or description). Do not add punctuation or special characters.
Create the Data Access tier and Data tier projects:
I have included the link to install the database, if needed.Please do not hesitate to let me know if you need anything els ...
Create the Data Access tier and Data tier projects:
I have included the link to install the database, if needed.Please do not hesitate to let me know if you need anything else. THANK YOU!The company has asked you to build a prototype of an n-tier system
using the Northwind database as an example. The company wants to be able
to add, edit, and delete records from the customers, orders, order
details, products, categories, and suppliers tables. Your instructor
will provide you the online link to the SQL Server database files (MDF
and LDF).
Assignment Guidelines
Create the Data Access tier and Data tier projects:
Create a class library project for the Data tier.Add a new class library project the project created in Step 1 for the data access tier.Add a typed DataSet using a new data source that connects to the Northwind sample database.Select the database objects (customers, orders, order details, products, categories, and suppliers) tables.Make sure the TableAdapters are stored in the Data Access tier and the DataSet class is added to the Data tier. Make
sure that separate tiers are created for each layer by verifying that
separate class libraries were created and the necessary references to
the project were added. *****
Links to install Database for IP2:
https://msdn.microsoft.com/en-us/library/8b6y4c7s.aspx
3 pages
Doc111
In the 2008 presidential election, newspapers reported that Obama received 40% of the white male vote. If this is true, wh ...
Doc111
In the 2008 presidential election, newspapers reported that Obama received 40% of the white male vote. If this is true, what is the probability that a ...
Earn money selling
your Study Documents