During the cyber security activity conducted in class by


During the cyber security activity conducted in class by Renee Etoty, you were asked to identify systems that were conducting or experiencing cyber attacks. You will use the data provided during this activity to develop a program to display all the systems involved in the activity in alphabetical order using a linked list. Open up the data file using Excel and examine the information in the file. This file is a comma separated value file, meaning each field is simply separated by a comma. You are interested in the "Src Entity" and "Dst Entity" fields which indicate entities that send information to other entities.

Write a program to read the data in the "Src Entity" and "Dst Entity" fields and store the information in a linked list. Each node in the list consists of the name of the entity and a reference to the next entity. As each source/destination entity pair is read, you will insert the node in the proper sequence of the list without duplication. Display the final list. The image to the right only shows the first dozen or so entries. Note that your alphabetical sequence doesn't have to be case insensitive (‘A' is not the same as ‘a').

Request for Solution File

Ask an Expert for Answer!!
Electrical Engineering: During the cyber security activity conducted in class by
Reference No:- TGS0562395

Expected delivery within 24 Hours