Choose the best answer from among the choices given.
The key exchange problem ______________________.
is a problem that affects all types of ciphers.
is the problem of sharing public keys in a public key cryptosystem.
is the problem of sharing a secret key among two or more people who
want to send secret messages.
was solved by the invention of the Advanced Encryption Standard.
all of the above.
A simple substitution cipher based on the 18-letter Hawaiian
alphabet would have ________________ possible keys.
18
182
1818
18!
218
Suppose you wanted to double each of the N numbers in a
list. For example, if you started with the list (1,2,3), you would
want to produce the list (2, 4, 6) as a result. The number of operations
required to solve this problem is proportional to ________________.
a logarithmic function of N.
a linear function of N.
a quadratic function of N.
an exponential function of N.
a brute force search.
In which of the following arrangements are the function types ordered from "slowest growing" to "fastest growing"?
exponential, linear, quadratic, logarithmic
logarithmic, linear, quadratic, exponential
logarithmic, linear, exponential, quadratic
linear, logarithmic, quadratic, exponential
exponential, quadratic, linear, logarithmic
Choose all answers that apply.
Choose all answers that apply: The Traveling Salesman
Problem ________________
is the problem of finding the shortest route among N cities, visiting each city exactly once.
is an example of an intractable problem.
is the type of problem that cannot be solved even in theory.
can be solved in theory by searching through all of the N! possible paths through N cities.
can be solved approximately using what's known as a heuristic solution.
Which of the following are true statements about the World Wide Web (Choose all that apply)
The Web is a network of networks.
The Web is an application, not a network.
The Web uses the HTTP protocol.
The Web was invented by Tim Berners Lee.
The Web is owned by Google.
Choose all the apply. Which of the following is a true
statement about public key cryptography (PKC) ?
PKC solves the key exchange problem.
Without PKC secure online credit card purchases would be extremely difficult.
PKC was used by Julius Caesar during the Gallic campaign.
PKC is a variant of the classical simple substitution cipher.
PKC was invented by Bill Gates.
Consider the following list named List: [234,"Jones",
[90,70, 80,], 2014]. Which of the following is a true statment about
this list? (Choose all that apply.)
The length of the list is 7.
The third item on the list is [90, 70, 80].
The expression Select_list_item ( List, 4) would pick out the value 90.
An App Inventor list cannot contain strings and numbers.
The length of the list is 4.
Which of the following statements is true about the TinyWebDb
that stores the tags and values shown here:
Tag
Value
courses
[cpsc110, math101, psyc101]
cpsc110
TR 8:30
math101
TR 10:00
psyc101
MWF 9:00
TinyWebDb.GetValue(cpsc110) would retrieve the value "TR 8:30"
TinyWebDb.GetValue(courses) would retrieve the value cpsc110
TinyWebDb.StoreValue(cpsc110, "MWF 10:00") would add a fifth row
to the TinyWebDb.
A tag, such as courses cannot be associated with a list.
To change the meeting time of math101 (in the database) you would
use the statement: TinyWebDb.StoreValue(math101, MWF 11:00)
Choose all the apply. Which of the following is an example of
an application layer Internet protocol?