Question No. 1: [10 marks]
A Comparison table is
given below showing different technologies. You have to fill the columns a, b
and c respectively by using given instructions:
Instructions for
Column “a” to “c”:
a)
The latest “technology” or “version”
name.
b)
You will define portability in “Yes”
or “No”.
c)
Is it “H/w” or S/w based?
SOLUTION
Name
|
Column A
|
Column
B
|
Column
C
|
Bluetooth
|
8.1
|
Yes
|
H/W
|
Window
|
Windows 7
|
No
|
S/W
|
3G
|
I OS 5.1.1
|
No
|
S/W
|
Modem Booster 8.0
Broadband Modems
|
Yes
|
H/W
|
|
RAM
|
DDR3 & DDR4
|
Yes
|
H/W
|
Question No. 02 [10 marks]
The data of few organizations are very sensitive and can create problems
if it is compromised. Organizations take different measures to protect their
sensitive data. Cryptography is a process of securing our sensitive data on
computer networks. Different algorithms are used to protect our data from
misuse by other users. Some of the popular algorithms are given below. You are
required to read these algorithms and fill the following table after your
research.
SOLUTION
SNO
|
Key length
|
Symmetric/asymmetric
|
Year proposed
|
RSA
|
2048 bits
|
Asymmetric
|
1983
|
AES
|
128 bits
|
Symmetric
|
2002
|
Serpent Encryption Algorithm
|
256 bits
|
Symmetric
|
1998
|
No comments:
Post a Comment