CLIENT SERVER APPLICATIONS

CLIENT SERVER APPLICATIONS ITC 382 Assignment 1 Prepared By: Contents . Journal 3 2. Journal Entries 4 3. Report 11 3.1 Non-technical Report 11 3.2 Technical Report 16 4. References 19 . Journal Topic: Pretty Good Privacy (PGP) Author: Wong Sye Keit Perspective: This is the first assignment in the client server applications subject. On this assignment we are suppose to choose a topic of interest (related to client/server) and write two reports on it, a non technical and a technical report. After much research I decided to write on a subject related to security. I scope this topic down and researched on cryptography. From there I concentrated on writing about Pretty Good Privacy (PGP) which is a cryptography program. The research helped me to understand this various topics and the importance of it. 2. Journal Entries August 4th 2004 Received assignment 1 Topic: N/A Source: N/A * Received assignment 1. Mr. Kulwant (Lecturer) briefs us on what has to be done and provides guidelines regarding the topics. August 5th 2004 Book Search Topic: Client/Server Source: Book * Look through the Client/Server Survival Guide, 3rd Edition by Robert Orfail, Dan Harkey, Jeri Edwards to find a topic of interest for the assignment. Security seems to be an interesting topic to write about. August 7th 2004 Discussion Topic: Topic for assignment Source: N/A * Had a

  • Word count: 3892
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

The term Forensic Computing(TM) and its basic principles have been defined by many organisations, including the Australian Institute of Criminology and

The term 'Forensic Computing' and its basic principles have been defined by many organisations, including the Australian Institute of Criminology and the International Organisation on Computer Evidence. Explain what Forensic Computer is and explain its basic principles. How might these change over the next 10 years? 'The application of computer based technology to the investigation of computer based crime has given rise to the field of forensic computing.' [7] Forensic Computing is the principle of forensically and technologically analysing data found on a piece of computer hardware or software. Forensically speaking, the analysis requires the specialist to follow precise standards, such as any police officer or scenes of crime officer at a murder. Any crime scene has to follow several principles: preservation, identification, extraction, documentation and interpretation. [1, Kruse] Well in the case of forensic computing these five steps must always be followed but relating to computer evidence. The first major rule in collecting computer forensic evidence is that if the machine is turned off, do not turn it on at any point, the officer collecting the evidence is permitted to photograph, sketch and take any notes about the computer, such as the model. But the officer is prohibited to turn on the machine; this is because when the machine starts up previous information

  • Word count: 2132
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

CPU scheduling deals with the issue of deciding which of the processes in the ready queue is to be allocated the CPU. Many different scheduling algorithms exist and these are the most important ones:

GROUP MEMBERS: Student Name Student Number Role Meeting Kamal Sodki 2211176 Group Member Research, Presenter and Writer Mohamed Salah 2309327 Deputy Leader Research Ben Montague 2333332 Group Leader Research Ahmed Sheikh Faraah 2322091 Group Member Research The following report about scheduling will be divided in the subsequent parts: • SCHEDULING AIMS • SCHEDULING ALGORITHMS • SCHEDULING IN WinNT SCHEDULING AIMS: The scheduling aims differ according to the needs of the designers and users, but the following criterias are the most common: • CPU utilization: Keep the CPU busy. • Throughput: Measures the number of processes that are completed per time unit. • Turnaround time: The sum of the periods spent waiting to get into memory, waiting in the ready queue, executing on the CPU and doing I/O. • Waiting time: Is the sum of the periods spent waiting in the ready queue. • Response time: Measures the time from the submission of a request until the first response is produced. SCHEDULING ALGORITHMS: CPU scheduling deals with the issue of deciding which of the processes in the ready queue is to be allocated the CPU. Many different scheduling algorithms exist and these are the most important ones: First Come First served (FCFS): This is the simplest scheduling algorithm, where the process that requests the CPU first is allocated

  • Word count: 822
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Database projects in MS Access.

ICT6 PROJECT GUIDE MAJOR PROJECTS IN MS ACCESS ICT6 Major Coursework Guide Database projects in MS Access - Contents Content Page Introduction 2 Analysis 4 Design 1 Implementation 9 Testing 24 User Guide 27 Evaluation 30 Report 34 Appendices 36 Copyright/Acknowledgements This project guide is provided "copyright free" i.e. schools and colleges can distribute it to students in paper or electronic format (via a school/college intranet or website) and can make changes to the guide to meet the needs of their own students. If you do distribute the guide and/or make changes I would appreciate feedback about: * How you used the guide * Student perceptions * Limitations of the guide and/or errors * If you changed it how and why * Suggested improvements Some parts of the project guide contain information already published in other documents (books/websites etc.) Where possible, I have aimed to acknowledge intellectual property where it exists and I appreciate having any oversights drawn to my attention. Thanks to D. Yates at the KJS, Essex for his valuable input and suggestions in the construction of this guide. The KJS website www.thekjs.essex.sch.uk/yates/ contains lots of additional coursework resources that you should refer to when planning and implementing ICT6 (and ICT3) projects. FatMax January 2002 [email protected] Introduction This project

  • Word count: 10992
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

IT Security. In this practical we focus on digital signing based on RSA and ElGamal. We also look at the Digital Signature Standard and the use of hashing when signing.

SIT392 PUBLIC KEY CRYPTOGRAPHY 2011 TRIMESTER 1 PRACTICAL SESSION 4 SOLUTIONS In this practical we focus on digital signing based on RSA and ElGamal. We also look at the Digital Signature Standard and the use of hashing when signing. A. Using RSA to sign. . Alice uses an RSA scheme based on the modulus 1081357. She only signs messages with 6 digits (base 10) and odd numbers, but only Alice knows this. You receive a signed message claiming to be from her which is 725226. You look up her public key: 17. Is the message really from Alice? Solution. To retrieve the message, you compute 725226^17 mod (phi(n))= mod (1079260) and get 029556. So the message is not from Alice and could not have been computed using her private key. You should check with Alice in any case. B. Using El Gamal to sign. . Alice derives an El Gamal signature scheme using p = 5023, a = 5 and y = 5a = 3796. Her computations yield b = 5r = 2294 and g = (444 - 2294 a)r-1 = 3740, where m = 444 is the message. Determine if Bob should accept the signed message as valid. Solution. Bob checks by computing 5444 (mod 5023) = 4678 and also ybbg (mod p) =3796229422943740 = 728. So no, Bob should not accept the message as being validly signed by Alice. C. The questions in this section deal with attacking the El Gamal scheme. . In this case, Oscar, the attacker, uses Alice's scheme set-up parameters p =

  • Word count: 973
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

INFORMATION SYSTEMS DEVELOPMENT - questions and answers

INFORMATION SYSTEMS DEVELOPMENT ASSIGNMENT 2003-04 . What are some of the major advantages of organizing information in a database as opposed to the file management approach? There are many advantages of organizing information in a database as opposed to the file management approach. The most obvious advantage is perhaps the fact that you will no longer need filing cabinets. If there is a lot of information involved to be managed, the use of a database will save a lot of space and ease the workload for the users. But there are a lot of other advantages like consistency of data. Unlike the file management approach, each item of data in a database is only held once, this means that there is no danger of an item being updated on one system and not on another. And that brings us to another major advantage, control over redundancy. In a non-database system, the same information may be held on several files. This wastes space and makes updating more time-consuming. A database system minimises these effects. Data independence is another benefit of the database approach. In short, data independence means that the data is held in such a way that changes to the structure of the database do not affect any of the programs used to access the data. Other advantages that organizing information in a database brings are integrity of data and greater security of data. With a database

  • Word count: 946
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Power Source.

Power Source Due to the remote location of the Rangers House, supplying the residence with power from a standard electricity supply would not be impossible but would in it create a major project. This is due to the main supply cables would need to come from the local grid, which would mean more traditionally supplying the cable through a series of telegraph poles. As laying the cable underground would firstly not be economical to just one dwelling, due to the amount of work involved in excavating the ground and recovering the area would create a very large amount of energy and be very costly. The power source for the dwelling would be far more energy efficient if the power was to be created by natural sources, hence making it self sufficient, listed below are some possible options. Solar Power - This is power created from natural light such as the sun, which transfers the suns light rays into electricity from solar panels, which are normally located on the roofs of premises. This power does not just create electricity for lighting purposes but also generates enough power for hot water storage and heating systems, which will be a main requirement for the ranger's house. Initially when solar power was first introduced it was prominently utilised in countries, which had a greater number of sunlight hours, as the power generated could not be stored. But with the introduction

  • Word count: 1389
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

How does Socio-economic type Affect housing stock?

How does Socio-economic type Affect housing stock? Planning and Data Collection Aim The aim of my project is to investigate the relationship between housing stock and the socio-economic characteristics of the resident population of 2 neighbouring wards in North-West Edinburgh. Planning I predict there will be a strong link between socio-economic grouping and housing choice. Granton and Trinity are 2 residential areas separated by a single road. I chose these as they are in close proximity to the school and from my visual perception there are marked differences between them. There should be differences between amenities, environment and housing quality and type. These differences will be used as an indicator of quality. First hand collection (primary data) This took the form of an environmental survey, a pedestrian count and a traffic count. The environmental survey used stratified sampling and was taken in the form of a grading system for several different environmental factors. The traffic and pedestrian count were also taken. I have also used photos which I have taken Second Hand Collection (secondary data) This is data from the Edinburgh 1991 census and ESPC estate agent house prices. As well as information from the internet. This data will be used to make accurate conclusions about my primary data and verify it is correct. Map of Edinburgh

  • Word count: 1309
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Windows Communication foundatio

Windows Communication Foundation Assignment: 2 Year: 3 Date In: 20th May 2008 To: Stephen Hole From: Julian Moruzzi Table of Contents Page Section Description . Cover 2. Table Of Contents 3. Table Of Figures 4. Introduction 5. . 'Maths' Application Development 6. .1 Creating the WCF 8. .2 'Maths' Host 0. .3 'Maths' Client 2. .4 Database 3. .5 Testing 7. .6 'Search' application 21. .7 Summary 22. 2. Hosting a WCF using Internet Information Services 27. Bibliography Table of Figures Figure Page Description . 7. Service.vb code from the MathsHost project 2. 8. Maths Host - Main Form 3. 9. Form design: Host 4. 0. 'Maths' form design 5. 1. Client Form Code 6. 2. Database Structure 7. 3. Database Row View 8. 3. Test 1 Filling Form - Pythagoras 9. 4. Test 1 Filling Form - Pythagoras 0. 5. Test 1 - Information entered into the database 1. 5. Test 2 - Stopping the Host 2. 6. Test 2 - Error occurred 3. 7. Search Host 4. 8. Error When Search Host is not running 5. 9. SearchService.vb code in the WCF Host 6. 20. svcutil command 7. 21. Grid view of retrieved database information 8. 24. Code for enabling meta data. Introduction This small report has been produced to support an application that has been developed in the area of Distributed Web Applications. It is contained on a CD

  • Word count: 3730
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Secondary Sources for Geographical Information.

Assignment 2: Secondary Sources for Geographical Information To answer the title question that our group decided "Flood risks on the Rheidol floodplain", I choose two secondary data sources to help answer the question. The first data source was local published history sources which I found located in the National library of Wales and the Hugh Owen library. The second data source was local newspapers; I used the internet to search for local newspaper websites which allowed me to search there server for relevant articles. Before you are able to use the National library of Wales you need to register so that you are able to use this resource, once you have registered you are then able to request literature for reading. To search for relevant books and journals you have to use the national library of Wale's catalogue, this allows user to search the main database for reading material which will be useful. Once you have found a book or journal that you would like to read, you have to request title; this tells the library staff that you would like to look at the literature and you are required to specify a date and time when you would like to read book's or journals. The books which are in the national library must all be viewed inside the building; no books are allowed to be loaned. The National library of Wales also contains all the journals which have been published in the United

  • Word count: 968
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay