One disadvantage of symmetric cryptography is Select one it is not scalable Ob. tis not efficient Two key needs to be memortzed d. Keys can be kept secure always e None of these given options c. 00000

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question
One disadvantage of symmetric cryptography is
Select one:
a.
It is not scalable
b. It is not efficient
Two key needs to be memorized
C.
d. Keys can be kept secure always
e.
None of these given options
ure
One of the disadvantages of UEFI compared with BIOS is
Select one:
O a. UEFI is limited to hard disk size of a few terabytes
b. UEFI can include additional restrictions on the particular OS installed on the system
C. Unlike BIOS, UEFI can only begin network connections after the user has logged in
d. UEFI takes longer to start up hardware devices compared with BIOS
e. None of these options
Public key cryptography can protect the confidentiality of a message. Which key is used to decrypt
such a message and by whom?
Select one:
Oa private key, by recipient
Ob. public key, by sender
Oc.
shared key, by both recipient and sender
Od.
everyone seeing the message
e private key, by sender
The main function of a multiplexer is to
Select one:
a. compare the current contents of the AC register to the value zero.
b. transform a set of digital input signals into an equivalent decimal code at its output.
c. select one of several inputs based on selector binary combination to output.
d. activate one output based on a binary number.
e. None of these options
00000
00000
00000
Transcribed Image Text:One disadvantage of symmetric cryptography is Select one: a. It is not scalable b. It is not efficient Two key needs to be memorized C. d. Keys can be kept secure always e. None of these given options ure One of the disadvantages of UEFI compared with BIOS is Select one: O a. UEFI is limited to hard disk size of a few terabytes b. UEFI can include additional restrictions on the particular OS installed on the system C. Unlike BIOS, UEFI can only begin network connections after the user has logged in d. UEFI takes longer to start up hardware devices compared with BIOS e. None of these options Public key cryptography can protect the confidentiality of a message. Which key is used to decrypt such a message and by whom? Select one: Oa private key, by recipient Ob. public key, by sender Oc. shared key, by both recipient and sender Od. everyone seeing the message e private key, by sender The main function of a multiplexer is to Select one: a. compare the current contents of the AC register to the value zero. b. transform a set of digital input signals into an equivalent decimal code at its output. c. select one of several inputs based on selector binary combination to output. d. activate one output based on a binary number. e. None of these options 00000 00000 00000
Find the mantissa bits (23 bits) for 32.25 using single precision IEEE 754 Floating Point Standard.
Select one
01000000000000000000000
O a
b. 00000010000000000000000
Oc. 00000100000000000000000
Od. 00000000000000000000000
O. None of these options
How many wires does an address bus need in order to address 4n words of memory?
Select one:
O a. m
Ob. 2*n
O. Log2(n+1)
Od. 2n
e. 4'n
If p=7, q=17, what is the RSA public key represented as (e, n)?
Ser one
Oa (5 119)
O 7 119)
Oc (5 77)
Od. (5. 117)
Oe None of these options
Rep
回 @
In a firewall rule, which information identifies the service that should be allowed to be accessed
from outside the network?
Select one:
O a. Destination IP address
b. Source IP address
Oc. Geo information related to the IP addressed
d. Destination port
Oe Source port
In Process Management, what is Turnaround time?
tone
Oa the total waiting time for a process to finish execution
O. the total time spent in the ready queue
Oc the total time spent in the running queue
O4 the total time from the completion till the submission of a process
Oe none of these options
22242 e
is a method that synchronizes the CPU with an 1/O device in which the device
sends a signal when it is ready.
Select one:
O a Direct memory access (DMA)
Ob. Interrupt
O. Memory mapping
Od. Polling
Oe None of these options
Transcribed Image Text:Find the mantissa bits (23 bits) for 32.25 using single precision IEEE 754 Floating Point Standard. Select one 01000000000000000000000 O a b. 00000010000000000000000 Oc. 00000100000000000000000 Od. 00000000000000000000000 O. None of these options How many wires does an address bus need in order to address 4n words of memory? Select one: O a. m Ob. 2*n O. Log2(n+1) Od. 2n e. 4'n If p=7, q=17, what is the RSA public key represented as (e, n)? Ser one Oa (5 119) O 7 119) Oc (5 77) Od. (5. 117) Oe None of these options Rep 回 @ In a firewall rule, which information identifies the service that should be allowed to be accessed from outside the network? Select one: O a. Destination IP address b. Source IP address Oc. Geo information related to the IP addressed d. Destination port Oe Source port In Process Management, what is Turnaround time? tone Oa the total waiting time for a process to finish execution O. the total time spent in the ready queue Oc the total time spent in the running queue O4 the total time from the completion till the submission of a process Oe none of these options 22242 e is a method that synchronizes the CPU with an 1/O device in which the device sends a signal when it is ready. Select one: O a Direct memory access (DMA) Ob. Interrupt O. Memory mapping Od. Polling Oe None of these options
Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Encryption and decryption
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education