(a) Provide a UML class diagram for the Proxy design pattern applied to the problem stated above. b) Provide Java source code for the proxy class' getData method.
Q: What debugging tools do you have for Apache Pig scripts?
A: Answer: This application is important for Hadoop developers who are seeking to troubleshoot or…
Q: What are the advantages and disadvantages of utilising R-interface versus RStudio interface?
A: Introduction: R is a software framework that allows you to break down factual information and…
Q: In java programming, Explain the definition and importance of code reduction by using features such…
A: Definition of code reduction: Some times, the programmer needs to perform operations, where a stream…
Q: #2 What is the signature of the addHandler method of the Controller interface in JUnit ? a) void…
A: In the given question for the Controller interface, it uses the method "addHandler" in which it uses…
Q: A File System Web site has what benefits over an HTTP Web site? What are the distinctions between…
A:
Q: Note - Give a step-by-step and brief explanation for your solution. To develop a user interface for…
A: given code: public class ParkingOffice {String name;String address;String phone;String…
Q: How would you define interface testing in a nutshell?
A: Introduction: Still to be determined: Describe the procedure for testing the interface. User…
Q: Discuss the strengths and weaknesses of implementing an access matrix using access lists that are…
A:
Q: ______is the process of communicating with items over well-defined interfaces without being given…
A: The answer:
Q: onsider the scenario of a Pharmacy Management System. The following UML Class diagram shows a…
A: Note: Since you have not provided the language to write the code, I am using Java language to write…
Q: Distinguish between the design o
A: Q)Distinguish between the design of conversation and that of an interface? Answer: There are two…
Q: What are some of the benefits of using a File System website rather than an HTTP website? Also,…
A: Given: File system and HTTP (HyperText Transfer Protocol) websites are used for communicating and…
Q: Give an example of a program that uses the nongeneric version of a class from the Java Collection…
A: The Java Collections Framework is a set of classes and interfaces implementing complex collection…
Q: (a) What is a generic subprogram? explain with example (b) Write a comparison of the generic…
A: Answer :(a) A generic or polymorphic subprogram is one that takes parameters of different types on…
Q: n UML, which TWO of the following can represent a provided Interface. 1)a port 2)round circle (ball)…
A: UML is the Unified Modelling Language which is used for visualize software model. It has various…
Q: Write an oop Python code, using the following UML class diagram?
A: class Bank: def __init__(self,code,address): self.code=code self.address=address…
Q: )Outline benefits of generic programming.
A: Note: we are only allowed to solve one question in one post. I am solving the first on here. To get…
Q: Establish a clear line between generic and acceptability testing. How can you tell the difference…
A: Given: Make a distinction between dynamic and static testing. Static testing is a kind of software…
Q: We deal with ADTS on three levels. On which level do we just deal with the "what" questions, as in…
A: Explanation: The term ADT stands for Abstract Data Type. It refers to a mathematical model of data…
Q: Draw the UML diagram of the class linkedStackType.
A: The class diagram is composed of three parts: Upper section: Name of the class - This section…
Q: For what reason is it necessary for the symbol or name used in the C++ inclusion guard on a library…
A: Introduction : The symbol / name used in the c++ inclusion guard on a library interface file must be…
Q: Is there any benefit or drawback to making use of the Java Generics feature?
A: The answer is
Q: What exactly is information hiding? What access modes are available in C++ to implement various…
A: Solution In computer science, hiding knowledge is the idea that design decisions in a computer…
Q: Why is it important for the C++ inclusion guard on a library interface file to utilize a unique…
A: Answer The symbol/name used in the c++ inclusion guard on a library interface file is unique…
Q: Note - Give a step-by-step and brief explanation for your solution. To develop a user interface for…
A: given: public class ParkingOffice {String name;String address;String phone;String…
Q: What are the advantages and disadvantages of using Java Generics feature.
A: Java Generics : Java Generics is a set of related methods or a set of similar types. Generics allow…
Q: show me the project hierarchy in eclipse pls, this is to be written in java. In the existing…
A: In the existing DoublyLinkedList class, write and test a Java method named reverseList to reverse a…
Q: What are generics used for primarily? Why do generics in C++ and Ada have a wider purpose than they…
A: The principal purpose of generics is to parameterize entire classes meaning allowing the programmer…
Q: Define Interface testing in brief.
A: To be determine: Define interface testing
Q: Write a MultiThreaded ServerSocket Program in C# that can handle multiple clients at the same time.…
A: Given: Write a MultiThreaded ServerSocket Program in C# that can handle multiple clients at the same…
Q: Which analogy is true? interface : implementation (implementing the interface) :: contract :…
A: The given question regarding interface.
Q: What is the difference between a DLL and an EXE in.NET? ?
A: Dynamic Link Library (DLL) is Microsoft's implementation of the shared library idea. A DLL document…
Q: t is possible to convert this uml class diagram into a Java oop code ... even if only a small part…
A: Below is the required java program. Program Approach. As per the class diagram, there are ten…
Q: s there ever a time where AJAX is interrupted and not continuous or asynchronous? If yes, please…
A: What is asynchronous? Asynchronous in computer system means occurring of event with out disturbing…
Q: (Java) Data fields are encapsulated with which modifier?
A: Encapsulation in Java is defined as a process of wrapping code and data together into a single unit.…
Q: Because a class may derive from a number of different interfaces, interfaces aid in the…
A: A class may implement many interfaces, each having default methods that have the same name as the…
Q: When the java generics are generics capable of preventing runtime error? applied, at compile time or…
A: Java Generics is a solution designed to reinforce the type safety that Java was designed to have.…
Q: Projects 1. Write a brief history of the UML,
A: 1. Brief history of UML: What is UML: It is an Unified Modeling Language. It is used to create…
Q: In a nutshell, define interface testing.
A: Defined interface testing, in a nutshell
Q: g languages that do not implement templates or
A: What is the programming languages that do not implement templates or generics?
Q: Write a complete Java program to do the following. The attributes of a TV object are the channel,…
A: The TV class will have regular TV operations such as Turn On, Turn Off, Volume Up, Volume Down,…
Hi please assist with a and b
Step by step
Solved in 2 steps with 1 images
- Password management schemes are complex in ITsystems. Consider an IT company that does not want users to choosepasswords from a database of easily guessable passwords during accountregistra8on. The challenge is how to implement this mechanism. Oneapproach is to store all these guessable passwords in a database and checkevery password chosen during registra8on against this database. a) What isthe security problem in this implementa8on?ANer listening to you, the company has the following expecta8ons for a newsolu8on. Your solu8on should have the following proper8es – There shouldbe no False Nega8ves (a guessable (bad) password should not be mistakenlyiden8fied as a non-guessable (good) password); Some False Posi8ves aretolerated (a very small number of non-guessable (good) passwords can beiden8fied as guessable (bad) passwords by mistake); The guessablepasswords should not be stored in plain text; The solu8on should be spaceefficient; It should be fast. b) Iden8fy another solu8on to this…help me please provide by step by step find another vulnerability and exploit within the Metasploit framework against the Metasploitable2 system by using Metasploit's search, show, use, set, check, locate, and exploit/run commands. You should find one not used yet, so don't use any in that we used in the previous steps (vsftpd vulnerability or the tomcat exploit).The Access to objects in the security design should be depend on more than one condition being satisfied. This principle reflect: Complete mediation Separation of privilege Least common mechanism Isolation
- In this assignment, you will develop a user interface for three different functions of an operating system and decide how each of the functions could be secured using various authentication schemes. You must support one single factor, one two-factor, and one multi-factor authentication scheme in your design. You may choose any features in an operating system you want (e.g., login, getting help on a system function, or listing all processes). Your user design will address the following three main security areas: 1. Proposed Security Authentication Scheme 2. Proposed Security Authentication Factor 3. Required Security Policies For each operating system function, provide the following: a. Detailed explanation of your interface design choices and how it addresses the three assignment requirements: authentication scheme, factors, and policies that will be used. b. A table outlining the functional requirements to secure the function in #2a. c. A wireframe mockup user interface that…Draw a UML class diagram consistent with the following sequence diagram. : DBClass :Connection : Statement PersistencyClient PersistentClass 1. create( ) 1.1. new( ) 1.2. getData( ) 1.3. createStatement() 1.4. executeUpdate(string)Complete the attached table with the principles below relating to server security The principles are: Economy of mechanism Fail-safe defaults Complete mediation Open design Separation of privilege Least privilege Least common mechanism Psychological acceptability
- do this for me find another vulnerability and exploit within the Metasploit framework against the Metasploitable2 system by using Metasploit's search, show, use, set, check, locate, and exploit/run commands. You should find one not used yet, so don't use any in that we used in the previous steps (vsftpd vulnerability or the tomcat exploit). write full command here please.Bob has designed a secure login system for the student portal of the Xiamen University of Technology (XUT). In Bob's design, a two-factor authentication method is used for verifying the authenticity of the user. A brief description of the design is provided below. For the two-factor authentication, the followings are required: • Factor 1: a user first required to provide a secret password, • Factor 2: the user then needs to provide the correct answer to a security question. To securely store the user password in the system, Bob has used state-of-the-art encryption algorithm, Advanced Encryption Standard (AES), to encrypt the user password and stored the encrypted password in the system database. For securely signing in to the system: the user needs to provide his/her user ID and the corresponding password. This information will be transmitted to the system over a secure communication channel. Upon receiving this information, the system will: o locate/retrieve the corresponding…Let us consider an application where we need to run a secure Information Management System. We are to receive very confidential information from our customer sand keep them save in our system. These information are sent to us in the softcopy forms. We are to protect ourcustomers’ confidentiality even from ourselves, we are not to see the information they bring to us,or else the confidentiality is compromised. Your job as computer security officer is to verify the authenticity of the important documentreceived in order to save them under the appropriate users. Mind you; you have no access to the users’ usernames and passwords, you can storebut cannot retrieve except the user himself. Secondly, you are to protect the passwords and usernames to make impossible for everyone(including the system administrators) except the users themselves to access even if the whole data base is hacked or stolen. i)Based on your knowledge in computer security, which cryptographic mechanisms would you…
- What is the difference between a binary semaphore and a counting semaphore? Question 9 options: A binary semaphore is used for mutual exclusion, while a counting semaphore is used for synchronization. A binary semaphore can only take two values, while a counting semaphore can take any positive integer value. There is no difference between a binary semaphore and a counting semaphore. A binary semaphore is used for synchronization, while a counting semaphore is used for mutual exclusion.Is this design secure from other attacks? (You can assume that the site is safe from web attacks such as CSRF, XSS and SQL injection, and uses HTTPS for the Checkout procedure.) No it is vulnerable to man in the browser attack. Yes, it is safe. No it is vulnerable to integrity problem on the client side. No it is vulnerable to integrity problem on the server side.Let us consider an application where we need to run a secure Information Management System.We are to receive very confidential information from our customers and keep them save in our system. These information are sent to us in the softcopy forms. We are to protect our customers’ confidentiality even from ourselves, we are not to see the information they bring to us, or else the confidentiality is compromised.Your job as computer security officer is to verify the authenticity of the important document received in order to save them under the appropriate users. Mind you; you have no access to the users’ usernames and passwords, you can store but cannot retrieve except the user himself.Secondly, you are to protect the passwords and usernames to make impossible for everyone (including the system administrators) except the users themselves to access even if the whole database is hacked or stolen.2. Which cryptographic mechanisms would you implement in order to protect the usernames and…