Category: Computer science and IT assignments

Basic Game Development in Python

Requirements:

For this assignment, you are tasked to develop a game called Guess the Word, which allows two players to participate in turn. The game should contain the following key elements of play:

1.    The game should start by prompting Player 1 to enter a word of their choice via the Python console screen for Player 2 to guess (assume that Player 2 looks away and does not see).
2.    The Python console should then be cleared so as to hide the word from Player 2.
3.    Player 2 must now guess the word by typing one letter into the Python console following a suitable prompt.
4.    For each guess, the game needs to determine if the guessed letter is present in the word that has been set by Player 1. If the guess is incorrect, one element of an ambulance should be drawn onto the game/Turtle screen (see video for example of how elements may be drawn and further detail below).
5.    The process then repeats from Step 3 (i.e. Player 2 is asked to enter another letter, assuming they have not used up their total number of guesses, as below).
6.    Player 2 is allowed a total of 8 incorrect guesses, and hence will lose the game if all 8 attempts have been used.
7.    As consistent with the above, the drawing of the ambulance should take 8 strokes in total to complete on the game/Turtle screen. Therefore, if the picture of the ambulance is fully drawn, this means Player 2 loses the game, and a message is displayed on the screen to confirm.
8.    The game should provide a suitable graphical interface to enhance the users experience and increase the games appeal.

Data Structures Assignment 4 and 5

I need help doing two of my data structures assignments. Attached are the assignment, textbook, source codes, and mock assignment. The textbook is included is the 2nd edition while the course uses the 4th edition so chapter and question numbers will be different. Assignment should be done in java.

Filo IO Assignment

In this assignment, you will practice using recursion, as well as file operations. Submit a single ZIP file called assignment6.zip containing your IntelliJ project. This assignment has 50 marks see the marking scheme posted on cuLearn for details.
Assume that we have an assembly line that can take a picture of a machine part which moves along a conveyor belt. The picture (or image) is represented as a 2D grid of pixels which are either black or white. The pixels can be accessed by specifying the row and column of the pixel where rows and columns are specified by an integer value. The machine examines the images and attempts to determine whether or not the parts are broken. A broken part will appear as a set of black pixels which are not all connected together (i.e., there is a separation between one or more sets of black pixel groups. Here are some examples of four possible images. Note that (c) and (d) represent images of broken parts. The red border represents the perimeter of a part composed of black pixels.

Basic Object Orientated Management System

Modelling a management system for a depo
The model needs to have classes for:

Drivers (Driver extension for managers)
Vehicles (Vehicle extension for Tankers and Trucks)
Work Schedule (to be assigned) to the drivers and vehicles.

The system must:
Enable the reading, and writing of existing and new drivers
Enable the reading and writing of existing and new work
Enable managers to assign work to drivers and trucks
Enable drivers to see their assigned work
Have a log in system for drivers to see work, and managers to see and assign work.

There must be examples of Object Orientated code, so classes for most things, use of linked lists containing objects and etc

Note:

Linux Final Project

I have included a PDF of the options. He gave us 4 options for the assignments which are all Linux/Unix based and then we have to write a paper regarding the assignment and create a presentation. I am looking for help with only the first two aspects, creating the project and writing the paper. The professor is giving us 4 options for a final project, only 1 is required so whichever you feel you are more comfortable doing and since this is basically Linux 101 I would imagine it wouldn’t take all that long time do as well. I can write the majority of the paper as well if I can get some notes, I am a bit behind in this class due to Covid issues and my grandmother passing so as long as I get some notes surrounding the process of setting up the project I can write the paper. However, if you want to write the paper I am willing to pay for that portion as well just let me know price.

Cybersecurity Price negotiable

Task 1 1000 to 1400 words

You are required to write a report for T1 Electros Chief Information Officer, the report should contain the following sections:

    Explain in your own words what a VPN is and in general terms how they work.

    Research the various VPN technologies that could be used to secure a site-to-site connection. Compare and contrast these VPN technologies looking at speed, ease of configuration and security. Hint: PPTP, L2TP and IPSec are the main types to focus on.

    VPNs make use of symmetric and asymmetric encryption for critical phases of their operation. Explain using clear, concise and technically accurate descriptions the difference between symmetric and asymmetric encryption. Explain which phase of the VPN establishment uses symmetric encryption and which phase use asymmetric encryption and crucially why VPNs operate this way. Ensure that you provide an example of each form of encryption, these should be the same as the encryption algorithms you used in your Site-to-Site VPN in task 2.

Task 2

Implement an IPSec Site-to-Site VPN between the main site edge router and the server farm edge router. Company policy dictates that this network requirement should be designed, implemented and tested in an advanced network simulation application before it is rolled out on the live network. You should use the prototype you configured in assignment 1 of WAN Protocols and Cybersecurity as the starting point for the new prototype.

Make use of Cisco Packet Tracer, in order to demonstrate how the new network structure will work. A physical topology of the network has been provided below. The additional IP addressing for the Site-to-Site VPN is completely your responsibility.

Add a section to your report that uses commented screenshots to describe the configuration and testing of the Site-to-Site VPN. – 400 to 600 words.

Requirements:

    You will need to configure the network according to the proposed design. The network will be tested using functionality testing. Your tutor will ping and trace across various paths, they will also use Cisco show commands to verify the correct operation of the Site-to-Site VPN. Again, this will require good research skills and some experimentation using Packet Tracer to configure successfully.

Cybersecurity

Requirements:

    You will need to study the network diagram on the previous page in order to understand and interpret the physical topology. This physical topology has not been created by you, so you will need to ask questions in order to fully understand what is required from you. A list of meaningful questions will need to be written and submitted with the written part of the assignment. The questions will be answered in a 15-minutes one-to-one meeting with the client representative (your tutor).

    You will need to configure the network according to the proposed design. The network will be tested using functionality testing. Your tutor will ping and trace across various paths, they will also use Cisco show commands to verify the correct operation of PPP, eBGP and the remote access VPN. This last task is quite a challenging configuration that makes use of AAA, encryption and hashing technologies and will require good research skills and some experimentation using Packet Tracer to configure successfully.

    You need to provide a report of 1200-1600 words where you show:

o    A list of meaningful questions that you prepared for the meeting with the client in order to clarify the requirements and a rationale showing your understanding and interpretation of the requirements. Your questions should demonstrate an understanding of the technical requirements that should be considered in order to implement the technologies you will be configuring. Five questions should be asked and each question can receive a maximum of two marks, therefore a total of ten marks can be achieved for the questions.

o    A detailed IP addressing scheme for the new additions to the T1 Electro network that is carefully and clearly explained.

o    An explanation of router configurations required to meet the customer requirements and commented screenshots of testing the connections on Packet Tracer Simulator command line option. Ensure that you include a screenshot of the remote access VPN in its fully connected state, this can be achieved by using ipconfig on the remote workers PC and an appropriate Cisco CLI show command(s) on the R3 router.
For reporting on router configuration, just copying and pasting some commands is not enough. The syntax of the commands can change from one platform to another and from one manufacturer to another, it is the process that needs to be explained. You will be using Cisco router commands to explain configuration steps that can otherwise be done on any other types of routers but just with different syntax. As you will need to do some research of BGP, PPP and RA VPNs, you need to use Harvard referencing to cite your sources.

Scheme Interpreter

C coding project that needs a rework.  Works up to part 3 but i included parts 1,2,3 for context.  There are bugs that need to be fixed for part 3 and comments on how the code works need to be added. PLEASE ONLY QUOTE FOR coding part 4!  Communicate further if you want to do it.

To compile in terminal, go into directory and hit ‘make’/make clean to run/clean makefile.

implement the product quantization method with ?1 L 1 distance as the distance function

only this function is given in solution file
def pq(data, P, init_centroids, max_iter):
    pass
please read the attached doc file for exact question and instructions!
doc file is the question
(lx_pq is a slide to help)

A barrier is a thread-synchronization mechanism

A barrier is a thread-synchronization mechanism that forces the threads to wait until all have reached a certain point (the barrier). Once all threads have reached this point, they may all continue. An interface for a barrier appears as follows:
public interface Barrier{
/**Each thread calls this method when it reaches the barrier. All threads are released to continue processing when the last thread calls this method.*/
public void waitForOthers();
/** Release all threads from waiting for the barrier. Any future calls to waitForOthers() will not wait until the Barrier is set again with a call to the constructor.*/
public void freeAll(); }
The following code segment of the Factory class establishes a barrier and creates 10 Worker threads that will synchronize according to the barrier:
final int THREADCOUNT = 10;
Barrier barrier = new BarrierImpl(THREAD COUNT); for (int i = 0; i < THREAD COUNT; i++)
(new Worker(barrier)).start();
Note that the barrier must be initialized to the number of Worker threads that are being synchronized and that each Worker thread has a reference to the same barrier object barrier. Each Worker will run as follows:
// All threads have access to this barrier
Barrier barrier;
// do some work for a while . . . // now wait for the others barrier.waitForOthers();
// now do more work . . .
When a thread invokes the method waitForOthers(), it will block until all threads have reached this method. Once all threads have reached the method, they may all proceed with the remainder of their code. The freeAll() method bypasses the need to wait for threads to reach the barrier; as soon as freeAll() is invoked, all threads waiting for the barrier are released.
Submit the java project HW5 having the full code of the following:
The interface Barrier,
The classes BarrierImpl implementing the Barrier interface,
The class Worker extending the class Thread
The class Factory