HandsOnProject12-1
.docx
keyboard_arrow_up
School
Brigham Young University, Idaho *
*We aren’t endorsed by this school
Course
270
Subject
Computer Science
Date
Dec 6, 2023
Type
docx
Pages
1
Uploaded by calebhatchcontact on coursehero.com
CIT 270: Hands-On Projects
Choose one hands-on project at the end of the module (or chapter). Complete it. Fill out the following
template. Then upload this document to I-Learn Canvas for your Hands-On Project submission.
Project Module and
Number (1pts)
Project 12-1: Using an Online Password Cracker
Key words and
Definitions
(3pts)
1.
Dictionary attack – an attack that uses a restricted list in order to crack
a password or key by brute force.
2.
Salt – random data added to a hash. Salting makes a hash harder to
crack, as the cracking software would need to determine what part of
the hash is the real password and what part is the random, added
data.
3.
Oauth- a way of granting websites or applications access to limited
amounts of a user’s data. This is used as a more secure alternative to
giving the website or application the user’s entire password or similarly
sensitive data.
Key takeaways, or:
What did you learn?
(4pts)
It’s incredibly important to make a secure password. Even if you have numbers
in your password, that doesn’t necessarily mean that it won’t be easy to crack.
Using special characters and no dictionary words is a smart way to make your
passwords not as easy to crack.
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
blockchain is a collection ofrecords (called blocks), where each block links to the previous block using cryptography. Eachblock contains cryptographic hash, timestamp and data relevant to its application. Think ofit as a distributed ledger where instead of information being stored in a database it is storedon the blockchain. Some examples of solutions that use a blockchain at its core are:1. Cryptocurrencies (however, for this project you may NOT do a cryptocurrency)2. Smart contracts3. Trading4. Supply chain management5. Anti-counterfeiting6. Healthcare7. Domain names8. Proof of existence9. Voting10. and many others!
Programming Language: Java
The use of third-party libraries for primary functionally is strictly prohibited, however, third party libraries can be used for other functionality such as communications and visualisation (such as normal JavaFX, JFreeChart, GraphStream, JGraphT, Yworks, JUNG or JMonkey).
The use of other data structures for auxiliary operations is…
arrow_forward
The objective is to make sure we are able to set up their own GIT repository and are able to navigate using basic commands. Please use at least 3 basic commands, take a snapshot and provide a brief explanation of the commands used(1-2 sentences).
1. Create any java program correctly and have it in your GIT repository.
a. Steps for begin with the installation of GIT repository
b. Include snapshots of(at least 3) performed by GIT commands from your program
c. Provide brief explanation of each command below its snapshot
arrow_forward
do this for me find another vulnerability and exploit within the Metasploit framework against the Metasploitable2 system by using Metasploit's search, show, use, set, check, locate, and exploit/run commands. You should find one not used yet, so don't use any in that we used in the previous steps (vsftpd vulnerability or the tomcat exploit).
write full command here please.
arrow_forward
Rules:
1. Mention student ID, Name, Section Number, at the end of the Assignment.
2. COPYING is not permitted and if identified marks will be deducted.
3. Marks will be deducted for Late Submission.
4. Last Date for submission is 2.12.2021
5. You can upload the file by taking pictures of all pages and compress into single "rar" file.
Note: All the work should be Hand - written.
No copy paste.
No typing anything in the computer as file/document.
Just answer without explanation please.
arrow_forward
2.
An instructor created a submission folder for coding submissions from students. The instructor wants to maintain all access to the folder for herself, but wants to give the grading assistants 'read' and 'execute' permission to the folder. However, the grading assistants cannot change anything in the folder. She adds a group 'grader' with the grading assistants for the folder. Nobody else should have any access to the submission folder. The instructor should use : chmod ________ to set the access permission for the submission folder to achieve the above goal.
Hint:
Indicate the decimal number corresponding to the permission.
arrow_forward
Create a Registration page:
choose language as per the your convince
• Registration Fields:
1) User Name - Input Text
2) Password - Input Password
3) Repeat Password - Input Password
4) First Name - Input Text
5) Last Name - Input Text
6) Address line 1 - Input Text
7) Address line 2 - Input Text
8) City - Input Text
9) State - Drop Down of Options
10) Zip Code - Input Text
11) Phone Number - Input Text
12) Email - Input Text
13) Gender - Radio buttons
14) Marital Status - Radio buttons
15) Date of Birth - Input Text, must have a calendar pop up (date picker)
16) Submit Button - Form submit button
17) Reset Button - Clears form fields to default settings (normally empty)
Please type the code in Notepad++.
arrow_forward
Create a student api.
The student resource contains the below information
Id, first name, last name, email
Generate a project file with the correct dependencies
Configure the application properties file for connecting to an H2 or mysql database
Create a model
Create a repository
Create the controller and implement the Standard CRUD HTTP methods
Create an endpoint that returns a list of students
Create an endpoint that returns back a single student by id
Create an endpoint the adds a student to the database
Create an endpoint that updates a student
Create an endpoint that deletes a student
arrow_forward
pls check if my unix answers are correct and provide corrections if necessary(commas separate the commands)
Move cursor to the last line of the file with one key: G
Use one key to move cursor to bottom line of screen: L
Move cursor to line 32 with three keys: <32>G
Turn on/off line numbers: :set nu , :set nonu
Forward/backward one page: ctrl-f , ctrl-b
Join the current line with next line: J
Replace the whole current line with “abc” with five keys:
Append text “abc” at the end of current line: A
You just deleted one line by accident. Undo this with one key: u
Delete next six lines including current line with three keys: 6dw
Delete from cursor to the rest of current line with one key: D
Save your changes without quitting vi: :w
Delete next five lines from current line and paste them back at the end of the file: 5dd, p
Delete next seven characters from cursor with two keys: 7x
Swap current char with the next one with just two keys: r<c>
Temporarily leave vi as a background…
arrow_forward
Create a spreadsheet that takes eight values that a user inputs into eight different cells. Then create a row that transposes the cells to simulate a transposition cipher, using the example transposition cipher from the text. Remember to work from right to left, with the pattern 1 > 3, 2 > 6, 3 > 8, 4 > 1, 5 > 4, 6 > 7, 7 > 5, 8 > 2 where 1 is the rightmost of the eight cells. Input the text ABCDEFGH as single characters into the first row of cells. What is displayed?
arrow_forward
Let's imagine you're developing a browser history-preserving app. Identify the collection class that will be most helpful in obtaining data from the most recently seen page.
arrow_forward
steps are followed to reach the desired result- either block, delete or authorize usage of content.fingerprint
arrow_forward
can someone explain this code to me ?
<form><?php$left = array();$right = array();$current = 0;session_start();extract($_SESSION);extract($_REQUEST);if ($button == "Left") move_left();if ($button == "Right") move_right();if ($button == "Toggle") toggle();$_SESSION["left"] = $left;$_SESSION["right"] = $right;$_SESSION["current"] = $current;echo <<<HERE<input type="submit" name="Left"><input type="submit" name="Right"><input type="submit" name="Toggle">$currentHERE;function move_left(&$left,&$right,&$current) {array_push($right,$current);$current = array_pop($left);};function move_right(&$left,&$right,&$current) {array_push($left,$current);$current = array_pop($right);};function toggle(&$left,&$right,&$current) {$current = 1 - $current;};?></form>
arrow_forward
Compulsory Task 3● Pick any one of your GitHub repos.● Create 2 issues for things you think could be improved. Ideas forimprovements include making new methods, adding constants, renamingvariables and functions, or adding comments.● For each issue:○ Create a branch with a meaningful name.○ Implement the changes required by the issue.○ Commit and push your work.○ Create a PR for your changes.○ Merge in the PR and close the issue.● In a text file called repo.txt, paste the link to your repo. Add the file to thistask’s folder.
arrow_forward
This page gives an in-depth look at the Access Control List.
arrow_forward
You must write clear, meaningful, consistent. Show each step of your work to receive full credit. If you use a programming platform for a computation, write the set of commands that produced the result. Upload a SINGLE PDF file. It must be readable..
Decrypt your own ciphertext obtained from a Substitution Cipher. Note that there may be meaningless words at the beginning or at the end since the plaintext is divided into equal parts
Decrypt the following ciphertext
PTMNYJLCUPCCJAUBCXMAAJDPSGSYLJNMAMPTZGLCUMPQBUQMZGCDLPGSU PSZUNGKUZFUTUMPFGGYBJDLCGNYGLAUMSCXGZUCGLYMQQULMACXUCUQQA UMSUQMZGAEUQQJEMPTSJEPXGLUPTGLUAEGQQUAAXGZJDQSPJAUMSCXGZU CGLYMQQULUQMZGCXJDTXCAXGNMTXCUAEGQQEUMCUAAXGXUSPJCXMPTGQA GCJSJUPSYGLXUYAUWCGLUQQMCNMTXCCGQQXGLAJNGCXMPTEJLCXXGULMP TWJLAJNGNMPDCGAMCYDWWGSUEUBEMCXJDCAYGUFMPTKDCUCQUACMCDPWJ QSGSMCAULNACJJFCXGXJJFUXJDCJWMCANJDCXUTUMPUPSAUMSAJBJDCXM PFBJDLGZXUPTGSSJBJDMNUWLUMSMUNAMLAUMSUQMZGMZUPCLGNGNKGLCX MPTAUAMDAGSUPSMSJPCFGGYCXGAUNGAMIGWJLCGPNMPDCGACJTGCXGLZU…
arrow_forward
One of the tips that J. Heumann mentioned in his article about writing use cases Download writing use caseswas “kick out the CRUD (create, read, update and delete)”. Why do you think we need to avoid CRUD in use cases?
arrow_forward
Update the following PHP script to check the users answer to this quiz. The answer key is provided as part of the HTML and the weight of each question is also given. When the user submits the quiz provide them a report of how they did. Include points they got right, percentage score, and letter grade. Add feedback in mon-day-year hh24:mi
<!DOCTYPE html><!--To change this license header, choose License Headers in Project Properties.To change this template file, choose Tools | Templatesand open the template in the editor.-->
<html> <head> <meta charset="UTF-8"> <title>Great Explorers Quiz</title> </head> <body> <?php // put your code here
$points_possible = 36; $points_correct = 0; $letter_grade = ''; $score_percent = 0; $feedback= date('M-d-Y-H:i');
if (isset($_POST['grade'])) { $question1 = $_POST['question1']; $question2 =…
arrow_forward
How to remove the item from the cart if the quantity is 0?
I have included my code below that I am confused about how to implement this on.
<?php
session_start();
$page = 'cart';
//DATABASE CONNECTION INFO
include_once ('includes/database.php');
include_once ('includes/header.php');
if(!isset($_COOKIE['loggedIn']))
{
header("location: login.php");
}
if (isset($_POST['update']))
{
for ($x = 0; $x < sizeof($_SESSION['quant']); $x++)
{
$quant_id = 'quant_'.$x;
if($_POST[$quant_id] > 0)
{
$_SESSION['quant'][$x] = $_POST[$quant_id];
}
elseif($_POST[$quant_id] == 0)
{
//HOW DO I REMOVE THE ITEM FROM THE CART IF QUANTITY IS = 0?
}
else
{
echo "Quantity must be greater than 0 to purchase.";
}
}
}
if(isset($_POST['remove']))
{
//HOW DO I REMOVE THE ITEM FROM THE CART IF THE "REMOVE" BUTTON IS CLICKED?
}
if(isset($_POST['submit_order']))
{…
arrow_forward
//19. selectMenuChangeEventHandler//a. Dependencies: getUserPosts, refreshPosts//b. Should be an async function//c. Automatically receives the event as a parameter (see cheatsheet)//d. Defines userId = event.target.value || 1; (see cheatsheet)//e. Passes the userId parameter to await getUserPosts//f. Result is the posts JSON data//g. Passes the posts JSON data to await refreshPosts//h. Result is the refreshPostsArray//i. Return an array with the userId, posts and the array returned from refreshPosts://[userId, posts, refreshPostsArray]
This is what I have but it fails help please
const selectMenuChangeEventHandler = async (e) => { let userId = e?.target?.value || 1; let posts = await getUserPosts(userId); let refreshPostsArray = await refreshPosts(posts); return [userId, posts, refreshPostsArray];}
arrow_forward
Posting this 4th time if wrong answer this time will downvote and give bad reviews too
If header files are added please provide them
The Caesar cipher is one of the earliest known and simplest ciphers. It is a type of substitution cipher in which each letter in the plaintext is 'shifted' a certain number of places down the alphabet.
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
U
V
W
X
Y
Z
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
H
E
L
L
O
W
O
R
L
D
Normal Text
B
Y
F
F
I
Q
I
R
M
X
Encrypted Text
You are tasked to create an encryption program which takes a key word. The keyword will fill the first part of the shifted array. The remaining letters will fill the end of the array. It should look like this:
Key=”TOY
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
T
O
Y
A
B
C
D
E
F
G
H
I
J
K
L
M
N
P
Q
R
S
U
V
W
X
Z
You should have an…
arrow_forward
I've created a BST inserting keys 18, 56, 28, 40, 35, 38, 36, 20, and 24 in that order into an inititally empty BST. Now, I'm being asked to delete key 28 and I'm stuck between what I think are two options. I've added an image below for reference. Any help with this is appreciated!
**Please do not use Chegg or other comparable resources as they do not provide an explanation of how to get to the answer**
arrow_forward
ANSWER ALL THE QUESTION IF YOU KNOW THE CORRECT SOLUTION OTHERWISE LEAVE IT DO NOT USE CHATGPT OTHERWISE IT WILL DOWNVOTE
4. Which one of the following correct options:
A. Lifecycle methods will not run when a component is modified and altered.
B. Lifecycle methods in react JS is for the entire project rather than for each component.
C. React contained both controlled and uncontrolled components.
D. A and C.
5. Alice uses a digital signature(DS) to communicate with Bob for authentication and integrity. Bob claims to have received a message in clear text, "Transfer $1432 to Peter," with a valid digital signature from Alice. Alice denies sending the message. The digital signature proves that Alice must have created the message. Select the correct Option:
A. True
B. False
6. What will be the return value of function call foo (n, n) for the following recursive function foo ()? Assume that the variable n is initialized to 4 before function call.
int foo(int& p, int q) { int I = 9;…
arrow_forward
A gym wants to store user profile information in a NoSQL database. Write MongoDB interactiveshell commands to complete the tasks below. Copy and paste all the commands from the shellinto a single text file for submission. The commands must execute correctly using the MongoDBshell to get full marks.
Q.4.1 Create a database called gym_<your‐student‐number>. The <your‐student‐number>part should be replaced with your student number, for example gym_29876543.
Q.4.2 In a collection called userProfiles, create the following data:Name Surname Date of Birth Fitness LevelDominic Badeaux 1982‐09‐04 1John Dlamini 1974‐05‐18 2
Q.4.3 Query all the data in the userProfiles collection.
Q.4.4 Query all the user profiles where the fitness level of the user is equal to 2. Q.4.5 Query all the user profiles where the date of birth of the user is from 1980‐01‐01 to1982‐12‐31 (including both dates)
arrow_forward
No need copy paste & plagiarism content any thing wrong will downvoted
What is a decision table? Mention the components present in it.
arrow_forward
C1 Using the Least Recently Used (LRU) page replacement algorithm, complete the following page replacements using the reference string given below. Calculate the total number of the page faults.
Reference String
0
1
2
3
0
1
4
0
1
2
Frame 1
Frame 2
Frame 3
Page Fault
C2 Create an access matrix for the following scenario:
Ahmad has the right to read /etc/passwd and view the grades.
Mohammed has the right to view the EECS website.
Students have the right to share project data and view the EECS website.
Instructors have the right to change the grades.
Answer:
Object
Domain
C3 Draw the Gantt chart and compute the average turnaround and waiting…
arrow_forward
Please help me with this assignment
1. Open and examine the following ERR design file people.mwb (https://acconline.austincc.edu/bbcswebdav/pid-18686108-dt-content-rid-70255490_1/xid-70255490_1)
a. Each person is described by their name and email.b. Each person can be registered in multiple countries.c. Ensure it is in 3rd normal form.d. Ensure the relationships and primary and foreign keys are correct.
2. Create a database from the design.
3. Import the following data into the database people.txt (have to modify the data to match the design)
people.txt
Email,Full Name,Country,Date RegisteredCarley_Bahringer@destiny.com,Carley Bahringer,Brazil,1987-10-03 22:09:54Patricia_Fadel@avis.com,Patricia Fadel,Chile,2012-05-10 11:07:49Sedrick@godfrey.ca,Sedrick Kuphal,Chile,2007-11-12 00:09:53Briana_Berge@axel.ca,Briana Berge,Iceland,2006-03-26 15:32:08Lucy_Lockman@abby.org,Lucy Lockman,Iceland,2014-02-13 10:26:57Lucy_Lockman@abby.org,Lucy Lockman,France,1999-02-12…
arrow_forward
Why do authorisation lists need encryption and protection since they are so vulnerable to unauthorized modification? What type of harm may result from an unforeseen or unexpected change to these files?
arrow_forward
Is there any way to lessen the load time associated with page table shadowing?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Related Questions
- blockchain is a collection ofrecords (called blocks), where each block links to the previous block using cryptography. Eachblock contains cryptographic hash, timestamp and data relevant to its application. Think ofit as a distributed ledger where instead of information being stored in a database it is storedon the blockchain. Some examples of solutions that use a blockchain at its core are:1. Cryptocurrencies (however, for this project you may NOT do a cryptocurrency)2. Smart contracts3. Trading4. Supply chain management5. Anti-counterfeiting6. Healthcare7. Domain names8. Proof of existence9. Voting10. and many others! Programming Language: Java The use of third-party libraries for primary functionally is strictly prohibited, however, third party libraries can be used for other functionality such as communications and visualisation (such as normal JavaFX, JFreeChart, GraphStream, JGraphT, Yworks, JUNG or JMonkey). The use of other data structures for auxiliary operations is…arrow_forwardThe objective is to make sure we are able to set up their own GIT repository and are able to navigate using basic commands. Please use at least 3 basic commands, take a snapshot and provide a brief explanation of the commands used(1-2 sentences). 1. Create any java program correctly and have it in your GIT repository. a. Steps for begin with the installation of GIT repository b. Include snapshots of(at least 3) performed by GIT commands from your program c. Provide brief explanation of each command below its snapshotarrow_forwarddo this for me find another vulnerability and exploit within the Metasploit framework against the Metasploitable2 system by using Metasploit's search, show, use, set, check, locate, and exploit/run commands. You should find one not used yet, so don't use any in that we used in the previous steps (vsftpd vulnerability or the tomcat exploit). write full command here please.arrow_forward
- Rules: 1. Mention student ID, Name, Section Number, at the end of the Assignment. 2. COPYING is not permitted and if identified marks will be deducted. 3. Marks will be deducted for Late Submission. 4. Last Date for submission is 2.12.2021 5. You can upload the file by taking pictures of all pages and compress into single "rar" file. Note: All the work should be Hand - written. No copy paste. No typing anything in the computer as file/document. Just answer without explanation please.arrow_forward2. An instructor created a submission folder for coding submissions from students. The instructor wants to maintain all access to the folder for herself, but wants to give the grading assistants 'read' and 'execute' permission to the folder. However, the grading assistants cannot change anything in the folder. She adds a group 'grader' with the grading assistants for the folder. Nobody else should have any access to the submission folder. The instructor should use : chmod ________ to set the access permission for the submission folder to achieve the above goal. Hint: Indicate the decimal number corresponding to the permission.arrow_forwardCreate a Registration page: choose language as per the your convince • Registration Fields: 1) User Name - Input Text 2) Password - Input Password 3) Repeat Password - Input Password 4) First Name - Input Text 5) Last Name - Input Text 6) Address line 1 - Input Text 7) Address line 2 - Input Text 8) City - Input Text 9) State - Drop Down of Options 10) Zip Code - Input Text 11) Phone Number - Input Text 12) Email - Input Text 13) Gender - Radio buttons 14) Marital Status - Radio buttons 15) Date of Birth - Input Text, must have a calendar pop up (date picker) 16) Submit Button - Form submit button 17) Reset Button - Clears form fields to default settings (normally empty) Please type the code in Notepad++.arrow_forward
- Create a student api. The student resource contains the below information Id, first name, last name, email Generate a project file with the correct dependencies Configure the application properties file for connecting to an H2 or mysql database Create a model Create a repository Create the controller and implement the Standard CRUD HTTP methods Create an endpoint that returns a list of students Create an endpoint that returns back a single student by id Create an endpoint the adds a student to the database Create an endpoint that updates a student Create an endpoint that deletes a studentarrow_forwardpls check if my unix answers are correct and provide corrections if necessary(commas separate the commands) Move cursor to the last line of the file with one key: G Use one key to move cursor to bottom line of screen: L Move cursor to line 32 with three keys: <32>G Turn on/off line numbers: :set nu , :set nonu Forward/backward one page: ctrl-f , ctrl-b Join the current line with next line: J Replace the whole current line with “abc” with five keys: Append text “abc” at the end of current line: A You just deleted one line by accident. Undo this with one key: u Delete next six lines including current line with three keys: 6dw Delete from cursor to the rest of current line with one key: D Save your changes without quitting vi: :w Delete next five lines from current line and paste them back at the end of the file: 5dd, p Delete next seven characters from cursor with two keys: 7x Swap current char with the next one with just two keys: r<c> Temporarily leave vi as a background…arrow_forwardCreate a spreadsheet that takes eight values that a user inputs into eight different cells. Then create a row that transposes the cells to simulate a transposition cipher, using the example transposition cipher from the text. Remember to work from right to left, with the pattern 1 > 3, 2 > 6, 3 > 8, 4 > 1, 5 > 4, 6 > 7, 7 > 5, 8 > 2 where 1 is the rightmost of the eight cells. Input the text ABCDEFGH as single characters into the first row of cells. What is displayed?arrow_forward
- Let's imagine you're developing a browser history-preserving app. Identify the collection class that will be most helpful in obtaining data from the most recently seen page.arrow_forwardsteps are followed to reach the desired result- either block, delete or authorize usage of content.fingerprintarrow_forwardcan someone explain this code to me ? <form><?php$left = array();$right = array();$current = 0;session_start();extract($_SESSION);extract($_REQUEST);if ($button == "Left") move_left();if ($button == "Right") move_right();if ($button == "Toggle") toggle();$_SESSION["left"] = $left;$_SESSION["right"] = $right;$_SESSION["current"] = $current;echo <<<HERE<input type="submit" name="Left"><input type="submit" name="Right"><input type="submit" name="Toggle">$currentHERE;function move_left(&$left,&$right,&$current) {array_push($right,$current);$current = array_pop($left);};function move_right(&$left,&$right,&$current) {array_push($left,$current);$current = array_pop($right);};function toggle(&$left,&$right,&$current) {$current = 1 - $current;};?></form>arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Np Ms Office 365/Excel 2016 I NtermedComputer ScienceISBN:9781337508841Author:CareyPublisher:Cengage
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage