Questions: Question 1 (25 Marks) Write a program that takes a command-line argument N and prints an N-by-N triangular pattern like the one below. Question 2 (25 Marks) Implement a class called Account which defines a modified banking account that can be created with a given balance and account name. It must be able to perform the following operations in the public interface: Accepts an amount to deposit the balance Withdraws an am...
TaskFor the submission create a single zip archive that contains: 1. A single LaTeX PDF file with your answers created from the provided LaTeX template. Only PDF submissions that are typeset with LaTeX, e.g., via https://www.overleaf.com/edu/ucl, will be accepted. Submissions must not include screenshots, e.g., of handwritten solutions or of code, unless explicitly permitted. Students with disability accommodations are excluded from this re...
Assignment ObjectiveAim & Objective  This coursework is designed to demonstrate the broad understanding and knowledge of the module, assessing, and evaluating the studentâs strength and level of analysis; divided into 4 Section. The coursework should be submitted as one document in a report format in final submission. Data structures provide a means to manage large amounts of data efficiently for uses ...
TaskThe list will grow or shrink by adding, when needed, given amounts of free nodes to the free gap between the stacks. The number of free nodes added to the list will be the same at each time and fixed by a macro, BLOCKSIZE, defined at the beginning of the program. As all integers stored in the list will be nonnegative, free nodes will be marked with the fixed negative value 1. To keep track of all dynamic memory allocations, you will use a ...
Learning OutcomesLearning Outcomes 1. Practical experience of analysing, designing, implementing and validating solutions to computer network security challenges using common network security tools and formal methods.2. Ability to deal with complex issues and make informed judgements about network security in the absence of complete or consistent data.3. Exercise substantial autonomy and initiative in addressing computer network security chal...
Step 1Characterise and critically evaluate high performance computing based architectures and their suitability for given applications.Implement and execute applications using shared and distributed memory programming paradigms.Describe and critically discuss the roles and applications of cloud and grid computing. As you implement each of the following 4 steps make sure that you retain and do not overwrite previous versions of your solutions....
TaskGeneral problem description The Alzarius Engineering Convention is holding a 3-day collection of workshops. They are going to offer a certificate to anyone who completes at least 5 credits' worth of workshops. Workshops are worth either 1 or 2 credits, so the certificate could be earned by attending five 1-credit workshops, three 2-credit workshops, or a mix of the two, such as three 1-credit workshops and one 2-credit workshop. Each w...
Question 1: Cryptographic SoftwareOpenSSL is a widely used open source cryptography library that allows you to generate keys, encrypt messages, sign messages, etc. In many cases the OpenSSL tool comes already pre-installed with your operating system. If thatâs not the case, you can usually install it through your favorite package manager or download it, e.g., at Make sure you have the latest stable version Open...
Genetic Algorithm Optimization of a Multivariable FunctionYour report should be single-spaced, double-column (but tables or figures are allowed to span two columns if you wish).�� Submit a single PDF file. The code you used to produce the results should be appended at the end of the report (appendix). The appendix may be in single column format. Include a he...
Task Explain the concepts and procedures associated with Web and database attacks by addressing the following: Explain when and why the initial penetration test should be performed on a Web server. Explain the similarities and differences between a cross-site scripting attack and a reflective cross-site scripting attack. Identify the Web application attacks that are most likely to compromise confidentiality. Describe techniques to mitigate and r...
Question: Data Algorithms Background In this assignment, your task is to implement a simple search engine using a simplified version of the well-known Weighted PageRank algorithm. You should start by reading the Wikipedia article on PageRank (read up to the section Damping Factor). Later I will release a video lecture introducing this assignment and discuss the required topics. The main focus of this assignment is to build a graph ...
Task I. Project Organization This project will study the coordination of multiple threads using semaphores. You should do the following pieces to complete your project. Each piece is explained below: •Design 40 points •Code 25 points •Output 25 points •Summary 10 points Design The design should consist of two things: (1) a list of every semaphore, its purpose, and its initial value, and (...
TaskIn this assignment. you are asked to implement a simple version of 'tar'. The program (call it mytar) can either create an archive file from a list of files or extract the files from a given archive file. The program takes the follow arguments: mytar {-t | -c | -x | -u} -f [list_of_files] -t List the contents of the archive file to stdout -c Create a new archive containing the list of one or more files -x Extract the files ...
General instructions⢠We are provided you with a scaffold to build your code on, i.e. starter code. You should download the scaffold first and then start coding. As with Assignments 1 and 2, you can find this code either your workspace on Ed or on mycourses.  ⢠Search for the keyword updated to find any places where this PDF has been updated.  ⢠T.A. office h...
TaskYou are asked to implement the following programming tasks (1-5), using good coding practice (point 6 below) and to write MATLAB and PDF documentation (task 7). 1. (1 mark) Consider the following domain: x interval [a,b], t interval [0,T]. Generate the grid in the x, t coordinates as follows:⢠Space interval divided into N equal parts (N+1 boundary points). The index values should be consistent with MATLAB array index ...