Write an EBNF rule that describes the for statement of Java or C++. Write the recursive-descent subprogram in Java or C++ for this rule.
The questions information is in the link I attached. And the resistance R value is also in another link. Thank you for help me with this
Why is the Solid-State Lighting (SSL) Portfolio of the Department of Energy’s Building Technologies Program considered to be of central importance?
A solid circular titanium control rod at 7,000 lb axial tension force where stress must not exceed 42,000 psi. Assume that the modulus of elasticity of the titanium is 16,500,000 psi and that the rod must elongate no more than 0.20 in. Determine (a) the minimum rod diameter (precision 0.00) and (b) the maximum rod length (precision of 1).
Figure Q1 shows a piston-and-cylinder apparatus. If during the beginning of the operation process the initial volume is 80 L at the temperature of 28 ºC and a pressure of 150 kPa. Then during the process, the volume is decreased to 50 L while the pressure is doubled. Calculate the density at the final state and the final temperature in Degree Celsius.
Water flows through a horizontal pipe. The diameter of the pipe at point b is larger than the diameter of the pipe at point a. Where is the water pressure the greatest?.
Kinesin-1 motors can move long distances on microtubule tracks without dissociating. By contrast, myosin ii motors in skeletal muscle take only one or a few steps before letting go. What is most likely the difference between these two motors that allow two different types of movement?.
what is the minimum number of load balancers needed to configure active/active load balancing? 4 3 1 2
what characteristics differentiate unconventional hydraulic fracturing wells from conventional oil wells?
Section 1: Public-key encryption 1. Create a directory “hw3”. Download a file “sensitive.txt” from the assignment page and copy it into the directory “hw3”. 2. Write a program “generate_keys”. This program will randomly generate a pair of 3072-bit RSA keys and then it will save the public key into a file “pub_key” and the private key into a file “priv_key”. Q0: What programming language did you use? What cryptographic library did you use? Student Name: Course: CSCE 5550 Semester: Fall 2022 Homework 3: Cryptography In the terminal window, run the program “generate_keys”. Then, display the files “pub_key” and “priv_key” using the “hexdump” command. Q1: Attach a screenshot of the result. 3. Write a program “encrypt_file”. This program will encrypt a file “sensitive.txt” in the directory “hw3” on the key “pub_key”. The key will be read from the file “pub_key”. The encrypted file will overwrite the original file “sensitive.txt”. Make sure that the original (unencrypted) file “sensitive.txt” is placed into the directory “hw3”. In the terminal window, display the first 100 bytes of the original (unencrypted) file “sensitive.txt” using the “head” command. Run the program “encrypt_file”. Display the first 100 bytes of the encrypted file “sensitive.txt” using the “hexdump” command. Q2: Attach a screenshot(s) of the result. Make sure that both original (unencrypted) and encrypted versions of the file are displayed on the screenshots. 4. Write a program “decrypt_file”. This program will decrypt the file “sensitive.txt” in the directory “hw3” using the key “priv_key”. The key will be read from the file “priv_key”. The decrypted file will overwrite the encrypted file “sensitive.txt”. Make sure that the encrypted file “sensitive.txt” is in the directory “hw3”. In the terminal window, display the first 100 bytes of the encrypted file “sensitive.txt” using the “hexdump” command. Run the program “decrypt_file”. Display the first 100 bytes of the decrypted file “sensitive.txt” using the “head” command. Q3: Attach a screenshot(s) of the result. Make sure that both encrypted and decrypted versions of the file are displayed on the screenshots. 5. Write a program “compute_checksum” which computes a keyless cryptographic checksum of a file “sensitive.txt”. You will use a hash function SHA256 compute it. The checksum will be written into a file “sensitive_checksum.txt”—this file should be in the text format. Copy the original (unencrypted) file “sensitive.txt” into the directory “hw3”. In the terminal window, run the program “compute_checksum”. Display the checksum: cat sensitive_checksum.txt Q4: Attach a screenshot of the result. Student Name: Course: CSCE 5550 Semester: Fall 2022 Homework 3: Cryptography 6. Write a program “verify_checksum” which works as follows: it computes a checksum of “sensitive.txt” and compares it with the contents of “sensitive_checksum.txt”. If the resulting hash values are the same, then the program outputs “Accept!” and otherwise it outputs “Reject!”. In the terminal window, run the program “verify_checksum”. (Observe the result.) Change the first symbol in “sensitive.txt” to a different symbol, and save the file. Come back to the terminal window and run the program “verify_checksum”. (Observe the result.) Q5: Attach a screenshot of the result. 7. Write a program “compute_keyed_checksum” which works similarly to the one in Step 4, but instead of SHA256, you will use the keyed hash function HMAC-SHA256. A 256-bit key will be read from the file “key.bin”. The checksum will be written into a file “sensitive_keyed_checksum.txt”—this file should be in the text format. Generate a random key: head -c 256 /dev/urandom > key.bin Copy the original (unencrypted) file “sensitive.txt” into the directory “hw3”. In the terminal window, run the program “compute_keyed_checksum”. Display the checksum: cat sensitive_keyed_checksum.txt Q6: Attach a screenshot of the result. 8. Write a program “verify_keyed_checksum” which works as follows: it computes a keyed checksum of “sensitive.txt” using HMAC-SHA256 and compares it with the contents of “sensitive_keyed_checksum.txt”. If the resulting values are the same, then the program outputs “Accept!” and otherwise it outputs “Reject!”. In the terminal window, run the program “verify_keyed_checksum”. (Observe the result.) Change the first symbol in “sensitive.txt” to a different symbol, and save the file. Come back to the terminal window and run the program “verify_checksum”. (Observe the result.) Q7: Attach a screenshot of the result.
navigation radars typically operate at high frequencies and low pulse lengths. this causes them to have...
explain the role of requirements in architectural design. explain the role of requirements in detail design
what are the benfits of a cool roof? what properties of a roofing material affect its solar heating and how?
what fuel flow should a pilot expect at 11,000 feet on a standard day with 65 percent maximum continuous power?