Sorting a Random List

Given what algorithm is supposed to do, just make the code based on the descriptions. Keep function names and parameter the same as given. Use the test.py file to ensure that the algorithm will get the full grades. Do not prompt the user for input.

Python IPv4 Breakdown

Write a short program that does all of the following.  1. Asks the user for an IP Address with the subnet prefix.  (ex:  192.168.2.142/20 ) 2. The input must be the correct format and have validation (make sure it meets the format requirements).  3. You must use a List to …

LAB 4

Complete a port scan.  Use NMAP for this.  Showcase the findings. Use wireshark and perform a TCPFlood attack.  Record your findings. Use Kali tools to perform a Hping3 attack.  Record your findings. Write a 2 page paper that discusses your findings and what businesses should do to mitigate these attack …

LAB 3 Assignment

It was brought to my attention that the laboratory does not contain information on what you need to do. After trying to contact faculty services, I wasn’t able to get a hold of anyone that could discuss what needed to be done.  As we are discussing footprinting and we have …

Shiny

The Data For this assignment, you’ll be using the midwest dataset, which is built into the ggplot2 package. Each row contains demographic information about a county in each state: midwest dataset Remember, you may want to use dplyr to compute (and then later visualize) summary information! Assignment Structure For this …

AES block cipher

Project 3AES block cipher modes In this project you will answer a series of questions about AES. In this description you will see five questions, Question 1,…,Question 5. You should answer each of these in a separate document, preferably a markdown document like this one. Please do not use MS …

C Code Expressions

Deliverables: Deliverables for this project include the following: 1. Source code correctly implementing all required functionality. Your program must compile with Microsoft Visual C++ or any modern C/C++ compiler on your O/S. 2. Word or PDF file providing screen shots of successfully compiling and executing the program. 3. Description of …

Computer Science Assignment 2

In this assignment, the encryption algorithm we use encrypts (or decrypt) one letter of the message at a time. First, we will remove all characters that are not letters from the plaintext message and also convert all lowercase letters to uppercase. This means that whitespace, digits and punctuation are lost …

Python design problem

PayrollIntroductionThis assignment is a design problem, not a coding problem. It is meant to provide you with practice in top-down design with step-wise refinement, that is, the decomposition of a problem into appropriate modules and high level functions definitions. We are looking for a design document, not a working Python …

Password Breaker

Attached will be the rubric my task I have chosen is: I am writing a python program to access my schools linux server using python. logging on as myself then executing  ypcat passwrd | awk -F “:” ‘print $1’ > users_on.txt  . Everything must be in in one py file. …