Write program to generate digital signature using DSA private key for text “This is final exam of 21SP” and store it in a file called exam.txt. Explain briefly the following commands keytool -genkey -alias sdo -keyalg RSA keytool -certreq -alias sdo -file sdoCSR.cer keytool -import -file sdo.cer -alias sdo –trustcacerts keytool -import -alias sdo -file fromsdo.cer
Q: The information of all students taking the programming course is kept in a random access file with…
A: Answer is given below .
Q: Would you help me with this batch file . I'm trying to sort this table by column , but I don't…
A: echo "Sort the file by column: " echo "choose from below to sort" echo "i | n | w | l | c | a" read…
Q: What is the output of the following javascript code segment ? var s="253510530"; var…
A: GIVEN:
Q: Write a program that will prompt the user for a username and validate that username is in the…
A: The question above does not specifically mention any particular programming language to be used for…
Q: Which of the following is a difference between running key cipher and vigenere cipher? a) they use…
A: Q- Which of the following is a difference between running key cipher and vigenere cipher? Answer is…
Q: Would you help me with this batch file . I'm trying to sort this table by column , but I don't…
A: User will sort the column of table data.txt ID Name Weight Long Class Age012 Eric…
Q: By observing the file permissions on the Accounting.txt file and the two directories. Are Alice and…
A: The answer is YES Linux as a multi-user program uses permissions and IDs for security. There are…
Q: and print the the result as follows: the files and the database file (Export/ Export work with a…
A: Below is the required PHP program. Program Approach: Create a table as addresses with four…
Q: After getting data from that request which is done in first part, please copy that data in abc.json…
A: Required:- After getting data from that request which is done in the first part, please copy that…
Q: This is the Source code of the KNN Algorithm by taking the Data and Training file. Question: I…
A: # k-nearest neighbors on the Iris Flowers Dataset from random import seed from random import…
Q: Which of the following items is correct about record structures? I. There are two ways of making…
A: I. There are two ways of making fixed-length records: fixed length fields and variable lengths II.…
Q: write a batch file which sort a table by column where the user can choose sort by any column.…
A: echo "Sort the file by column: " echo "choose from below to sort" echo "i | n | w | l | c | a" read…
Q: Write a command that will print the number of lines in the file shortlist that contain the string…
A: The C++ language is an object oriented language that uses the principle of abstraction and keeps…
Q: Task D: Using the fixed length field file called famous.dat, make a one-line Unix command - using…
A: Make a one-line Unix command - using pipe(s) - to display the number of files in your home directory…
Q: What is the value of the sum variable for the fifth observation (MAY98)? Report your answer to one…
A: Answers The Internet is a stateless medium. A client request to a server has no knowledge of…
Q: In the input file, transfers are indicated by listing two account handles and an amount, like lines…
A: In this question, the coding language is not specified then we are doing this question in the CPP…
Q: 1. Create a file called states.txt with 10 US states, their abbreviations, capitals and time zones…
A: According to our guidelines i am solving first three:…
Q: uaw rhe given infornmation to Write the MongoDB Shell code to add 3 documents to the books…
A: To insert multiple documents in MongoDB: Insert operations are used in MongoDB to add new documents…
Q: s there anything wrong with the following Spark code?
A: As mentioned in the question, the size of the file is much larger. The size of file.txt is 100 GB.…
Q: Takes(studentid, courseCode, mark) Course(courseCode, title, credits,deptno) Student(studentld,…
A:
Q: ate key for text “This is final exam of 21SP” and store it in a file called exam.txt.
A: Write program to generate digital signature using DSA private key for text “This is final exam of…
Q: leWrong.txt 5 5 7 H 1 1 MILK White liquid produced by the mammals H 2 1 IN Used to indicate…
A: the code is an given below :…
Q: Select all of the following Bash filename patterns that would only match the following filenames…
A:
Q: write a linux shell script to sort a table by column from a text file the text file : ID…
A: $ cat Filename ID Namn Vikt L B H052 Hyllplan 1200…
Q: This function does the reverse of save_friendsdb -- it takes a single argument, filename, and opens…
A: We need to define a function called load_friendsdb() that accept a file name, read the content of…
Q: The command that is written to execute the segment below is: Directory of D:\ 05.Te3ebt_Mennak.mp3…
A: Option c: dir\s There is no such command. The command is dir/s So option c is wrong -----------…
Q: java ,write method(totalassests()) that would create a file money.txt and writes bbanks totals…
A: Code to write return value of totalAssets() function to money.txt file: import java.io.FileWriter;…
Q: Create a data file with 1,000 lines. Each line in the fileconsists of a faculty member’s first name,…
A: Purpose of the program: This program creates a text file containing the details like the faculty…
Q: The information of all students taking the programming course is kept in a random access file with…
A: Actually, c is a easiest programming language. It is a high level language.
Q: MySQL Create the DISPLAY_PROPERTY_OWNER procedure which obtains the office location number,…
A: Introduction A stored procedure during a relational database is sort of a stored function which 0…
Q: Please write this small R code: In the setup chunk,, add code to load the following 3 packages:…
A: To load packages in R, the syntax used is library(package_name) To load packages tidyverse, plotly,…
Q: ISBN Title Author 12345678 The Hobbit J.R.R. Tolkien 45678912 DaVinci Code Dan Brown Your student ID…
A: Hey there, I am writing the required solution based on the above given question. Please do find the…
Q: We have a text data file with 9 records. Each record has a name, a midterm score, and a final exam…
A: We have to write a python code in which the text is to be read, write and updated with new student…
Q: 1) The stress intensity factor K at a crack is given by Co na where o is the far-field stress, a is…
A: clcclear %a/b ratio vectorab = 0:0.05:0.95; C = 0.265.*(1 - ab) + (0.857 + 0.265.*ab) ./ (1 -…
Q: ow do I write code in python to search a given dictionary txt file for a password (which is a single…
A: import sys import os import re file = open("dictionary.txt", "r") # read the file, and check if…
Q: Which code snippet below correct ly writes the values in the list to a file, one value per line…
A: I have given an answer in step 2.
Q: Create a script file that will accept the length of the sides of cyclic quadrilateral and will…
A: Given a quadrilateral , we have asked to calculate its area and radius using the given formula on…
Q: In R’s built-in datasets library is the data frame quakes. Make sure you can access this object and…
A: R refers to datasets as dataframes A dataframe could be a matrix-like structure, wherever the…
Q: Suppose I have a data frame New1 loaded with the data from some file. If I want to delete all the…
A: dropna() in pandas is used to drop all the rows in data frame. It can also used to delete all rows…
Q: Write a program that will prompt the user for a username and validate that username is in the…
A: logic read username set f=0 iterate each key value in approvedUsers dictionary. check if…
Q: The given text files represent a list of account numbers and associated balances. Balances change…
A: here in the question ask for read data from a file and perform some operation on it and display it…
Q: The information of all students taking the programming course is kept in a random access file with…
A:
Q: Given a X509 certificate contained in the file sdo.cer, write a program to import and print out…
A: Code for the programming language If the content of your X905 certificate is in the source file…
Q: How can I change this function ? I need to open the file and can write the name I want to delete .…
A: Changes in function to be performed are: void removeContact(){browse(); //-------------Replace the…
Q: Update Record Code: Dim line, data(1) As String Dim updateJag As String = txtJagNumber. Text Dim…
A: Files are read using IO streamreader and streamwriter classes in .NET. A stream is sequential data…
Q: Using the python code below. Identify the Variabale, Conditional Statement,Operators,Loops and…
A: We need to identify the Variabale, Conditional Statement,Operators,Loops and Functions used in the…
Q: Write a program that prompts the user to enter a text file name (either mbox.txt or mbox-short.txt),…
A: #file name input name = input("Enter file:") fh = open(name) #dict mails ids and count master =…
Q: The information of all students taking the programming course is kept in a random access file with…
A: Code : #include <stdio.h>#include<string.h>struct student{int number;float midterm;char…
Q: i have create a cl program called PGM1 in ibmi , and the program is in library "310" i can call it…
A: Control language (CL) allows system programmers and system administrators to write programs using…
Q: Suppose you have a file Monster.txt that lists the Monster Energy Drinks the company offers, on one…
A: Code: #include <iostream>#include <fstream>#include <string.h>#include…
Step by step
Solved in 4 steps with 2 images
- We will use the file classlist.txt. Note that it contains a list of usernames. 3. Write a script called finduser that is to be called as follows, where classlist is the name of the classlist file, and username is a particular student's username, either first name or last time. ./finduser classlist username The script should check that the correct number of arguments was received and print an error message if not, check whether the classlist file exists and print an error message if not, print the line of the given username in the classlist file If you have not been doing so all along, you should now add some comments to your script and thoroughly test it! 4. Write the script into your lab report.Modify the SalesReport2.java program to use the BadData.txt file. You will input integers from this file and continue on if there is a bad record. If a record is bad (nonnumeric), display the file name. Do not just put the filename in quotes, display what file the program used. Change what displays in the catch statements. Add a finally clause. Do something in this clause. See when it is run. Remember: in Eclipse a file must be added to the project, not the src folder. Naming: Name the Java project: LastFProjectAssign09 Name the driver program (main): LastFAssign09.java Where Last is your last name and F is the first initial of your first name. Ex: OgleD Save in a file folder on your storage device SALESREPORT2.JAVA PROGRAM BELOW import java.io.*; // For File class and FileNotFoundExceptionimport java.util.*; // For Scanner and InputMismatchException /** * This program demonstrates how exception handlers can * be used to recover from errors. */public class SalesReport2{public…In this lab, you will read two files. Firstly, the ‘AccountData.csv’ file has the name and account number.Use each account number to scan the ‘BankData.csv’ file for a matching account number to get a ‘balance’from the account transactions. You must repeatedly open, read the ‘BankData.csv’ file and close it for eachaccount number in the ‘AccountData.csv’ file unless you wish to store its entire contents in a static array.(More code and may not be enough time to complete.) import java.io.*;import java.nio.file.Files;import java.nio.file.Path;import java.nio.file.Paths;import java.util.ArrayList;import java.time.format.DateTimeFormatter; public class BankDataProcessing { static DateTimeFormatter formatter = DateTimeFormatter.ofPattern("MM-dd-yyyy HH:mm"); static ArrayList<BankAccount> Accounts = new ArrayList<>(); public static void main(String[] args) { try { Path path = Paths.get("src/AccountData.csv"); readAccounts(path, true);…
- Please make a procedure that takes two parameters and prints a list of students from the first parameter as a student ID to the last parameter which is another student ID. If student is not found, then process an exception NO_DATA_FOUND.The history teacher at your school needs help in grading a True/False test. The students’ IDs and test answers are stored in a file. The first entry in the file contains answers to the test in the form:TFFTFFTTTTFFTFTFTFTTEvery other entry in the file is the student ID, followed by a blank, followed by the student’s responses. For example, the entry:ABC54301 TFTFTFTT TFTFTFFTTFTindicates that the student ID is ABC54301 and the answer to question 1 is True, the answer to question 2 is False, and so on. This student did not answer question 9. The exam has 20 questions, and the class has more than 150 students. Each correct answer is awarded two points, each wrong answer gets one point deducted, and no answer gets zero points. Write a program that processes the test data. The output should be the student’s ID, followed by the answers, followed by the test score, followed by the test grade. Assume the following grade scale:90%–100%, A; 80%–89.99%, B; 70%–79.99%, C; 60%–69.99%, D; and…Implement a ROT13 simple replacement cipher as described in this article. You can limit your transformation to just the upper and lowercase letters (i.e., you do not have to transform punctuation or spaces). Requirements Similar to the earlier parts of this assignment, use the provided template file p4 3.py I to implement the encrypt and decrypt functions. Use the tests provided in CodingRooms to verify your solution. Hint: You may wish to use the Python string maketrans function, but it's not required - as long as you correctly handle all uppercase and lowercase letters. Example doctests output: python -m doctest p4_3.py -v Trying: decrypt('Qb be qb abg. Gurer vf ab gel.') Expecting: 'Do or do not. There is no try.' ok Trying: decrypt('Nubl, gurer!') Expecting: 'Ahoy, there!' ok Trying: encrypt('Do or do not. There is no try.') Expecting: "Qb be qb abg. Gurer vf ab gel.' ok Trying: encrypt('Ahoy, there!') Expecting: 'Nubi, gurer!' ok 3 items had no tests: p4_3 p4_3. get_rot13 p4_3.…
- Create a program for caesar cipher in which the user enters a string of lowercase alphabets and the shift. The program should display the encoded string in the output. You can use the programming language of your choice but add the output screenshot in the file and test your code for the test case "fzyxtnavhal".Consider the data contained in the text file data1.txt. The first row of this file contains the column names. The remaining rows have one number for each column. The numbers are separated by a tab character. You can work in your command window. No need to create a matlab file for this question. Download the data file. Use importdata() function to load data into Matlab. What is the average of the numbers contained in the third column of this data? Data1: col1 col2 col3 col4 col5 906 552 743 348 45 676 229 425 661 558 469 642 430 384 773 913 485 125 628 312 105 152 25 22 179 746 782 291 911 339 737 101 318 801 211 562 295 654 746 511 185 238 957 814 907 598 531 936 384 629 300 92 458 618 102 135 406 241 576 391 213 105 764 531 55 895 113 760 276 502 72 785 741 249 432 243 292 744 452 998 54 604 106 228 812 442 965 682 805 486 14 433 464 987 895 898 695 213 30 138 197 759 99 536 391 94 433 824 88 928 308 656 176 803 918 457 110 164 990 714 102 934 666 67 619 996 188 895 940 344 333 267…This is sample data from my JSON file: "firstName" : "Juan","middleName" : "Dela""lastName" : "Cruz","username" : "JuanDelaCruz","password" : "1234", I already have a JAVA GUI that displays the data of each user in a table format. I need the part of my program that will allow the server to either accept or reject the user. If the user is accepted, the credentials of the user will be saved in another JSON file. If rejected, the server will do nothing.
- ScenarioI want to create an INDEXCEPTION value of the unique vowels and unique consonants that the name that was given to you can create.InputA string of the name that was GIVEN TO YOU. CASE SENSITIVE.ProcessStep 1: For every unique vowel of a name, you need to get the first index of that vowel from the original string.Step 2: For each vowel index you get from step 1, you will get the unique consonant from that position. if the index is out of scope of the consonant array, ignore that vowel index.Step 3: For each unique consonant that you get from step 2, you need to get the first index of that consonant from the original string.Step 4: Get the value of indexception by adding all index you get from step 3.OutputTO BE DISPLAYED- 2 lists that consists of unique vowels and unique consonants- The vowel, the vowel index, the consonant, the consonant indexFINAL OUTPUT- The total indexception value of the name that was given to you.Write a program that generates student records in a database file. Your program should be able to generate at least 10 records. The format in the database should be: student name, student id The first student id should be 20180001, second id will be 20180001 and so forth. Show screenshot of scriptWrite a script studhts that will first attempt to open the file 'studhts.dat' created in Q-3. If the file open is not successful, an error message should be printed. If it is successful, the script will read the data into strings, one line at a time. Print for each person the name in the form 'last, first followed by the height. Also, calculate and print the number of students having heights less than 160. Finally, print whether or not the file close was successful. For example, the result of running the script would look like this: Shukla, Anubhav 143.5 Jindal, Ram 156.9 Singh, Saurav Number of students having heights less than File closed successfully. 175