How many distinct stages are there in DES algorithm, which is parameterized by a 56-bit key ? (A) 16 (B) 17 (C) 18 (D) 19

1 Answer

Answer :

(D) 19

Related questions

Description : Triple DES uses a. 168 bit keys on 64-bit blocks of plain text b. Working on 64-bit blocks of plain text and 56 bit keys by applying DES algorithm for three rounds. c. Works with 144 bit ... algorithm once. d. Uses 128 bit blocks of plain text and 112 bit keys and apply DES algorithm thrice. 

Last Answer : b. Working on 64-bit blocks of plain text and 56 bit keys by applying DES algorithm for three rounds. 

Description : DES using 56 bit keys a. Cannot be broken in reasonable time using presently available computers b. Can be broken only if the algorithm is known using even slow computers. c. Can be broken with presently available high performance computers. d. It is impossible to break ever.

Last Answer : c. Can be broken with presently available high performance computers. 

Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.

Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.

Description : DES works by using a. permutation and substitution on 64 bit blocks of plain text b. only permutations on blocks of 128 bits c. exclusive ORing key bits with 64 bit blocks d. 4 rounds of substitution on 64 bit blocks with 56 bit keys

Last Answer : a. permutation and substitution on 64 bit blocks of plain text 

Description : In link state routing algorithm after construction of link state packets, new routes are computed using: (1) DES algorithm (2) Dijkstra's algorithm (3) RSA algorithm (4) Packets 

Last Answer : Answer: 2

Description : DES and public key algorithm are combined (i) to speed up encrypted message transmission (ii)to ensure higher security by using different key for each transmission (iii) as a combination is always better than individual system (iv ... e-Commerce a. i and ii b. ii and iii c. iii and iv d. i and iv  

Last Answer : a. i and ii

Description : Message can be sent more securely using DES by a. encrypting plain text by a different randomly selected key for each transmission b. encrypting plain text by a different random key for each ... instead of using hardware d. designing DES with high security and not publicizing algorithm used by it  

Last Answer : b. encrypting plain text by a different random key for each message transmission and sending the key to the receiver using a public key system

Description : Preparedstatement Object in JDBC is used to execute ........................... queries. A) executable B) simple C) high level D) parameterized

Last Answer : D) parameterized

Description : Prepared Statement object in JDBC used to execute........... queries. A) Executable B) Simple C) High level D) Parameterized

Last Answer : D) Parameterized

Description : Compute the value of adding the following two fuzzy integers: A = {(0.3,1), (0.6,2), (1,3), (0.7,4), (0.2,5)} B = {(0.5,11), (1,12), (0.5,13)} Where fuzzy addition is defined as μA+B(z) = maxx+y=z (min(μA(x), μB( ... ,18)} (D) {(0.3,12), (0.5,13), (0.6,14), (1,15), (0.7,16), (0.5,17), (0.2,18)}

Last Answer : (D) {(0.3,12), (0.5,13), (0.6,14), (1,15), (0.7,16), (0.5,17), (0.2,18)} 

Description : To determine the efficiency of an algorithm the time factor is measured by: (A) Counting micro seconds (B) Counting number of key operations (C) Counting number of statements (D) Counting kilobytes of algorithm

Last Answer : (B) Counting number of key operations

Description : 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50'. What number is missing? -Riddles

Last Answer : 22

Description : Find the range of the given data : 25, 18, 20, 22, 16, 6, 17, 15, 12, 30, 32, 10, 19, 8, 11, 20 -Maths 9th

Last Answer : Here, the minimum and maximum values of given data are 6 and 32 respectively. Range = 32 – 6 = 26

Description : Find the range of the given data : 25, 18, 20, 22, 16, 6, 17, 15, 12, 30, 32, 10, 19, 8, 11, 20 -Maths 9th

Last Answer : Here, the minimum and maximum values of given data are 6 and 32 respectively. Range = 32 – 6 = 26

Description : The range of the data 25, 18, 20, 22, 16, 6, 17, 15, 12, 30, 32, 10, 19, 8, 11 and 20 is -Maths 9th

Last Answer : In conclusion, the range of data 25, 18, 20, 22, 16, 6, 17, 15, 12, 30, 32, 10, 19, 8, 11, and 20 is 26.

Description : The mode of given data 15, 14, 19, 20, 14, 15, 16, 14, 15, 18, 14, 19, 15,17 and 15 is -Maths 9th

Last Answer : We first arrange the given data in ascending order as follows 14, 14, 14, 14, 15, 15, 15, 15, 15, 16, 17, 18, 19, 19, 20 From above, we see that 15 occurs most frequently i.e., 5 times. Hence, the mode of the given data is 15.

Description : The range of the data 25, 18, 20, 22, 16, 6, 17, 15, 12, 30, 32, 10, 19, 8, 11 and 20 is -Maths 9th

Last Answer : (d) In a given data, maximum value = 32 and minimum value = 6 We know, range of the data = maximum value – minimum value = 32 – 6 = 26 Hence, the range of the given data is 26.

Description : The mode of given data 15, 14, 19, 20, 14, 15, 16, 14, 15, 18, 14, 19, 15,17 and 15 is -Maths 9th

Last Answer : (b) We first arrange the given data in ascending order as follows 14, 14, 14, 14, 15, 15, 15, 15, 15, 16, 17, 18, 19, 19, 20 From above, we see that 15 occurs most frequently i.e., 5 times. Hence, the mode of the given data is 15.

Description : In the Indian Constitution, the right to equality is granted by following Articles. They are: (1) Article 16 to Article 20 (2) Article 15 to Article 19 (3) Article 14 to Article 18 (4) Article 13 to Article 17

Last Answer : (3) Article 14 to Article 18 Explanation: Article 14 - Equality before Law Article 15 - Prohibition of Discrimination Article 16 - Equality of Opportunity Article 17 - Abolition of untouchability Article 18 - Abolition of titles.

Description : The average age of A and B is 20 years. If C were to replace A, the average would be 19 and id C were to replace B,the average would be 21 . The ages of A, B and C are (in years) (a) 22, 17,16 (b) 22, 18, 20 (c) 30, 18, 15 (d) 23, 17 ,15

Last Answer : 22, 18, 20 Hint : A + B = 2 x 20 C + B = 2 x 19 A + C = 2 x 21

Description : f the temperature falls below 18 degrees, the heating is switched on. When the temperature reaches 21 degrees, the heating is switched off. What is the minimum set of test input values to cover all valid equivalence ... 17, 18, 20 and 21 degrees C. 18, 20 and 22 degrees D. 16 and 26 degrees

Last Answer : A. 15, 19 and 25 degrees

Description : A thermometer measures temperature in whole degrees only. If the temperature falls below 18 degrees, the heating is switched off. It is switched on again when the temperature reaches 21 degrees. What are the best values in degrees to ... and 25. B. 17,18 and19. C. 18, 20 and22. D. 16, 26 and 32.

Last Answer : A. 15,19 and 25.

Description : Insert the missing number: 16/32, 15 /33, 17/31, 14/34, ? (A) 19/35 (B) 19/30 (C) 18/35 (D) 18/30

Last Answer : Answer: D 16/32 then 15/33 means -1/+1, 17/31 means +2/-2, 14/34 means -3/+3 next +4/-4 i.e 18/30

Description : With the Industrial Policy Resolution of 1956, the future development of key industries became the exclusive responsibility of the State. A. 18 B. 17 C. 16 D. 15

Last Answer : B. 17

Description : ripple DES a. Cannot be broken in reasonable time using presently available computers. b. Can be broken only if the algorithm is known using even slow computer. c. Can be broken with presently available high performance computers. d. It is impossible to break ever. 

Last Answer : a. Cannot be broken in reasonable time using presently available computers.  

Description : The inorder traversal of the following tree is: (A) 2 3 4 6 7 13 15 17 18 18 20 (B) 20 18 18 17 15 13 7 6 4 3 2 (C) 15 13 20 4 7 17 18 2 3 6 18 (D) 2 4 3 13 7 6 15 17 20 18 18

Last Answer : Answer: D 

Description : 19/14 x 12/72 x 18/29 x 767 = ? (Take 2 digits after the decimal point) a) 110.69 b) 118.78 c) 111.56 d) None e) 108.98

Last Answer : 19/14 x 12/72 x 18/29 x 767 =? Sol: 1.35 x 0.16 x 0.62 x 767 = ? 102.71 = ? Answer: d)

Description : Float a[15], what is the size of array? A) 17 B) 14 C) 15 D) 16

Last Answer : 16

Description : Let A and B be two fuzzy integers defined as: A={(1,0.3), (2,0.6), (3,1), (4,0.7), (5,0.2)} B={(10,0.5), (11,1), (12,0.5)} Using fuzzy arithmetic operation given by (A) {(11,0.8), (13,1), (15,1)} ( ... ,0.2)} (D) {(11,0.3), (12,0.5), (13,0.6), (14,1), (15,0.7), (16,0.5), (17,0.2)}

Last Answer : (D) {(11,0.3), (12,0.5), (13,0.6), (14,1), (15,0.7), (16,0.5), (17,0.2)}

Description : Consider a disk with 16384 bytes per track having a rotation time of 16 msec and average seek time of 40 msec. What is the time in msec to read a block of 1024 bytes from this disk? (A) 57 msec (B) 49 msec (C) 48 msec (D) 17 msec

Last Answer : Answer: B

Description : kajal rides his scooter 14km at an average speed of 16 km/hr and again travels 16km at an average speed of 14 km/hr. What is her average speed for the entire trip approximately? a) 15.36 km/hr b) 17.46 km/hr c) 13.56 km/hr d) 14.86 km/hr

Last Answer : D Total distance travelled =14+16=30Km Time taken to travel 14 km at an average speed of 16 km/hr =14/16=7/8 Hr Time taken to travel 16 km at an average speed of 14 km/hr =16/14=8/7 hr Total time taken = ... /Total time taken =30/(7/8+8/7) =30/(113/56) =30*56/113=1680/113 =14.86 km/hr

Description : Windows 32 API supports (A) 16-bit Windows (B) 32-bit Windows (C) 64-bit Windows (D) All of the above

Last Answer : (D) All of the above

Description : WOW32 is a: (A) Win 32 API library for creating processes and threads. (B) Special kind of file system to the NT name space. (C) Kernel - mode objects accessible through Win32 API (D) Special execution environment used to run 16 bit Windows applications on 32 - bit machines.

Last Answer : (D) Special execution environment used to run 16 bit Windows applications on 32 - bit machines.

Description : Consider a 32 - bit microprocessor, with a 16 - bit external data bus, driven by an 8 MHz input clock. Assume that the microprocessor has a bus cycle whose minimum duration equals four input clock cycles. What ... (A) 8x106 bytes/sec (B) 4x106 bytes/sec (C) 16x106 bytes/sec (D) 4x109 bytes/sec 

Last Answer : (B) 4x106 bytes/sec

Description : The character set used in Windows 2000 operating system is .... (A) 8 bit ASCII (B) Extended ASCII (C) 16 bit UNICODE (D) 12 bit UNICODE

Last Answer : (C) 16 bit UNICODE

Description : Write an algorithm to subtract two 16 bit numbers (With borrow) in 8086 microprocessor.

Last Answer : Algorithm for 16 bit numbers subtraction with borrow: 1. Load 0000H into CX register (for borrow) 2. Load the first number into AX(accumulator) 3. Load the second number into BX register 4. Subtract ... . Move data from AX(accumulator) to memory 8. Move data from CX register to memory 9. Stop

Description : The number of distinct binary images which can be generated from a given binary image of right M × N are (A) M + N (B) M × N (C) 2M + N (D) 2MN

Last Answer : (D) 2MN

Description : Consider the table Student(stuid, name, course, marks). Which one of the following two queries is correct to find the highest marks student in course 5? Q.1. Select S.stuid From student S Where not exists (select * from student ... ) Q.1 (B) Q.2 (C) Both Q.1 and Q.2 (D) Neither Q.1 nor Q.2

Last Answer : (B) Q.2 Explanation: First query gives stuid of students whose marks are greater than all students taking course 5. Second query gives stuid of students whose marks are greater than any student taking ... comparison is between maximum of marks by any student in course 5. So the answer is option D.

Description : How many stages are required to store a 16-bit word?

Last Answer : 16.

Description : What are the two distinct stages of message transmission in the two step flow theory? -Technology

Last Answer : The Two Step Flow theory proposed by Paul Lazarsfeld, states that messages from the media get transmitted in two distinct stages:1. Through Opinion Leaders who pay close attention to the mass ... 2. These opinion leaders then pass their own interpretations in addition to the actual media content.

Description : The responsibility of a certification authority for digital signature is to authenticate the a. hash function used b. private keys of subscribers c. public keys of subscribers d. key used in DES 

Last Answer : c. public keys of subscribers  

Description : While sending a signed message, a sender a. sends message key using public key encryption using DES and hashed message using public key encryption b. sends message using public key encryption ... and hashed message using DES d. sends both message and hashed message using public key encryption

Last Answer : a. sends message key using public key encryption using DES and hashed message using public key encryption  

Description : Triple DES a. is a symmetric key encryption method b. guarantees excellent security c. is implementable as a hardware VLSI chip d. is public key encryption method with three keys. 

Last Answer : b. guarantees excellent security  

Description : DES (i) is a symmetric key encryption method (ii)guarantees absolute security (iii) is implementable as hardware VLSI chip (iv) is a public key encryption method a. i and ii b. ii and iii c. i and iii d. iii and iv

Last Answer : c. i and iii 

Description : Find the magnetization of the field which has a magnetic moment 16 units in a volume of 1.2 units. a) 16.67 b) 13.33 c) 15.56 d) 18.87

Last Answer : b) 13.33

Description : The following article of the Indian Constitution abolished the practice of untouchability. (1) Article 14 (2) Article 18 (3) Article 17 (4) Article 19

Last Answer : (3) Article 17 Explanation: Article 17 of the constitution abolishes the practice of untouchability. Practice of untouchability is an offense and anyone doing so is punishable by law. The Untouchability Offences ... a person from entering a place of worship or from taking water from a tank or well.

Description : The Bharat-Ratna & Padmasree award have been constituted by the Govt. under a) Art-17 b) Art-18 c) Art-19 d) Art-29

Last Answer : b) Art-18