"LOVE YOU ALL"

love

propads

Wednesday 4 July 2012

cs 101 assiment 5 solution


Question No.  1:                              [10 marks]

A Comparison table is given below showing different technologies. You have to fill the columns a, b and c respectively by using given instructions:

Instructions for Column “a” to “c”:
a)      The latest “technology” or “version” name.
b)     You will define portability in “Yes” or “No”.
c)      Is it “H/w” or S/w based?
SOLUTION

Name
Column A
Column B
Column C
Bluetooth
8.1
Yes
H/W
Window
Windows 7
No
S/W
3G
I OS 5.1.1
No
S/W
Modem
Modem Booster 8.0
Broadband Modems
Yes
H/W
RAM
DDR3 & DDR4
Yes
H/W

Question No. 02                         [10 marks]

The data of few organizations are very sensitive and can create problems if it is compromised. Organizations take different measures to protect their sensitive data. Cryptography is a process of securing our sensitive data on computer networks. Different algorithms are used to protect our data from misuse by other users. Some of the popular algorithms are given below. You are required to read these algorithms and fill the following table after your research.
SOLUTION
SNO
Key length
Symmetric/asymmetric
Year proposed
RSA
2048 bits
Asymmetric
1983
AES
128 bits
Symmetric
2002
Serpent Encryption Algorithm
256 bits
Symmetric
1998

No comments:

Post a Comment