Friday , 22 November 2024

CS101 Assignments # 5 Solution Spring 2012

Question No.  1:                              [10 marks]

(5 * 1 = 5) for column “a” and (5 * 0.5 = 2.5) for column “b “and (5 * 0.5 = 2.5) for column “c”.

A Comparison table is given below showing different technologies. You have to fill the columns a, b and c respectively by using given instructions:

Instructions for Column “a” to “c”:

a)      The latest “technology” or “version” name.

b)     You will define portability in “Yes” or “No”.

c)      Is it “H/w” or S/w based?

      Solution:



Name a) Latest Technology/version

b) Portability

c) H/w or S/w

Bluetooth

Usb bluetooth

yes

H/W

Windows

Windows 8

yes

S/W

3G

4G

No

S/W

Modem

Usb modem/dongle

yes

H/W

RAM

Ddr3

yes

H/W

Question No. 02                         [10 marks]

 

(3 * 1 = 3) for column Key length and (3 * 1.33 = 4) for column Symmetric/asymmetric and (5 * 0.5 = 2.5) for column Year proposed.

 

The data of few organizations are very sensitive and can create problems if it is compromised. Organizations take different measures to protect their sensitive data. Cryptography is a process of securing our sensitive data on computer networks. Different algorithms are used to protect our data from misuse by other users. Some of the popular algorithms are given below. You are required to read these algorithms and fill the following table after your research.

Solution:

SNO Key length Symmetric/asymmetric Year proposed
RSA 1,024 to 4,096 bitshttp://en.wikipedia.org/wiki/Key_size Public/asymmetric 1978
AES 128, 192 or 256 bits Private/symmetric 1998
Serpent encryption algorithm 128, 192 or 256 bits symmetric 1998

 

 

 

 

 

Check Also

CS101 Assignment no 01 fall 2013 solution has been uploaded

Assignment No. 01 Semester: Fall 2013 Introduction to Computing-CS101   Total Marks: Non-Graded   Due …

Leave a Reply

Your email address will not be published. Required fields are marked *

*