_________ and _________ saves the publish and subscribe keys that we have  generated with the PubNub Admin portal.
a) public_key and subscribe_key
b) Public-key and subscribe-key
c) publickey and subscribekey
d) Key_public and key_subscribe

1 Answer

Answer :

a) public_key and subscribe_key

Related questions

Description : By clicking which key the PubNub will display public, subscribe, and secret keys. a) Pane b) Demo Keyset c) Portal d) Network

Last Answer : b) Demo Keyset

Description : PubNub publishes and subscribes _________ in order to send and receive messages. a) Network b) Account c) Portal d) Keys

Last Answer : d) Keys

Description : MQTT is: A. Based on client-server architecture B. Based on publish-subscribe architecture C. Based on both of the above D. Based on none of the above

Last Answer : B. Based on publish-subscribe architecture

Description : MQTT is: a. Based on client-server architecture b. Based on publish-subscribe architecture c. Based on both of the above d. Based on none of the above

Last Answer : b. Based on publish-subscribe architecture

Description : Which is not an IoT communication model. A. Request-Response B. Publish-Subscribe C. Push-Producer D. Exclusive Pair

Last Answer : a

Description : MQTT is: A. Based on client-server architecture B. Based on publish-subscribe architecture C. Based on both of the above D. Based on none of the above

Last Answer : B. Based on publish-subscribe architecture 

Description : By symmetric key encryption we mean a. one private key is used for both encryption and decryption b. private and public key used are symmetric c. only public keys are used for encryption d. only symmetric key is used for encryption

Last Answer : D

Description : What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software

Last Answer : b. Public key encryption

Description : Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to ... the _____ key. a. encryption, decryption b. private, public c. encryption, public d. public, private

Last Answer : d. public, private

Description : In cheque payment protocol, the purchase order form is signed by purchaser using a. his public key b. his private key c. his private key using his signature hardware d. various public keys

Last Answer : c. his private key using his signature hardware  

Description : The responsibility of a certification authority for digital signature is to authenticate the a. hash function used b. private keys of subscribers c. public keys of subscribers d. key used in DES 

Last Answer : c. public keys of subscribers  

Description : Public key system is useful because a. it uses two keys. b. there is no key distribution problem as public key can be kept in a commonly accessible database. c. private key can be kept secret. d. it is a symmetric key system. 

Last Answer : b. there is no key distribution problem as public key can be kept in a commonly accessible database.  

Description : Public key encryption method is a system a. which uses a set of public keys one for each participant in e-Commerce b. in which each person who wants to communicate has two keys; a private key known to him ... him. c. which uses the RSA coding system. d. which is a standard for use in e-Commerce.  

Last Answer : b. in which each person who wants to communicate has two keys; a private key known to him only and a public key which is publicized to enable others to send message to him.

Description : Triple DES a. is a symmetric key encryption method b. guarantees excellent security c. is implementable as a hardware VLSI chip d. is public key encryption method with three keys. 

Last Answer : b. guarantees excellent security  

Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.

Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.

Description : ______ is used by public and private enterprises to publish and share financial information with each other and industry analysis across all computer platforms and the Internet. a) Extensible ... Language c) Enterprise Application Integration d) Sales Force Automation Software e) None of these

Last Answer : b) Extensible Business Reporting Language

Description : How many control keys are there on the key board ?

Last Answer : Usually there are 2 o'clock. In some cases it is 1 o'clock.

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption

Description : In MS-Excel, which of the following keys helps you to selects all cells below the current selection, up to the edge of the current data region: a) Ctrl + Shift + Down Arrow Key b) Ctrl + Shift + Right Arrow Key c) Ctrl + Shift + D d) None of These

Last Answer : a) Ctrl + Shift + Down Arrow Key

Description : ________located on the right corner of the keyboard, is a separate set of number keys for quick input of numbers: a) Numeric Keypad b) Arrow Pad c) Symbolic Key Pad d) None of These

Last Answer : a) Numeric Keypad

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption

Description : Which of the following statement is true? (1) A Primary key is also a candidate key (2) Each relation has at least one foreign key (3) Foreign keys can’t have null values (4) A Primary key is also an alternate key

Last Answer : Foreign keys can’t have null values

Description : Which of the following is incorrect: a) Print Preview - Displays what the document will look like when you print it b) Save - Saves the active document to a specified location c) Open - Displays the open dialog box so that you can retrieve an existing document d) None of These

Last Answer : d) None of These

Description : ________ method saves the received arguments in three attributes. a) __Init b) Init__ c) __Init__ d) _init_

Last Answer : c) __Init__

Description : SATAN stands for_ a. Security Advanced Tool for Analysis Networks b. Security Admin Tool for Analysis Networks c. Security Administrator Tool for Analysis Networks d. Security Administrator Tool for Analysing Network

Last Answer : c. Security Administrator Tool for Analysis Networks

Description : What is an appropriate place to publish an open letter to a public website?

Last Answer : First try to work with the organization by going to the board members. You could send a letter to each of them, See if you can work something out if it involves you. If not it is a ... friends together and video your response and put on UTube If it is a journal situation post an online rebuttal.

Description : Does a homeowner's association have master keys or a master key to all the houses or condos?

Last Answer : I have never heard of a HOA having that kind of access. I am sure they don’t have keys.

Description : I've just lost the keys to my 2006 Honda Accord (both the key I normally use and my spare key). Now what?

Last Answer : Call the dealer. Your key-code is associated with your VIN, and they will cut and program you a new one. It ain’t cheap.

Description : Is there a function key or series of keys that will insert the current date and time?

Last Answer : Geesh, I’m sorry I missed it!

Description : My f key sticks and doesn't press down like the rest of the keys . It does type but I'm not sure why it won't press down. It?

Last Answer : Samethinghappenswithmyspacebaroften.

Description : Suppose you want to send in the mail a valuable object to a friend. You have a box which is big enough to hold the object. The box has a locking ring which is large enough to have a lock attached ... you send the valuable object, locked, to your friend - so it may be opened by your friend? -Riddles

Last Answer : Send the box with a lock attached and locked. Your friend attaches his or her own lock and sends the box back to you. You remove your lock and send it back to your friend. Your friend may then remove the lock she or he put on and open the box.

Description : You want to send a valuable object to a friend. You have a box which is more than large enough to contain the object. You have several locks with keys. The box has a locking ring which is more than ... do it? Note that you cannot send a key in an unlocked box, since it might be copied. -Riddles

Last Answer : Attach a lock to the ring. Send it to her. She attaches her own lock and sends it back. You remove your lock and send it back to her. She removes her lock.

Description : Suppose you want to send in the mail a valuable object to a friend. You have a box which is big enough to hold the object. The box has a locking ring which is large enough to have a lock attached ... you send the valuable object, locked, to your friend - so it may be opened by your friend? -Riddles

Last Answer : Send the box with a lock attached and locked. Your friend attaches his or her own lock and sends the box back to you. You remove your lock and send it back to your friend. Your friend may then remove the lock she or he put on and open the box.

Description : What is the utility of primary key in database? Write distinct features of primary keys. -Technology

Last Answer : The primary key is used to uniquely identify the record in a database. It can be a column or a set of columns in the table.Main features of the primary key are as follows:1. It must contain a unique value for each record of the table.2. It does not contain null values.

Description : key - on board How many function keys ?

Last Answer : Key - on board Function Key 12

Description : Describe how to retrieve the ASCII key code from a keystroke. How would you retrieve key combinations for non-ASCII keys?

Last Answer : Keystrokes can be intercepted by handling the KeyPress and KeyDown events. Both of these events relay information to their handling methods in the form of their EventArgs. The KeyPressEventArgs, ... you would handle the KeyDown event and use the properties exposed by the KeyEventArgs instance.

Description : Which of the following keys of personal computer is not available in the key board of traditional typewriters? (1) Tab (2) Spacebar (3) Enter (4) Backspace

Last Answer : (3) Enter

Description : DES works by using a. permutation and substitution on 64 bit blocks of plain text b. only permutations on blocks of 128 bits c. exclusive ORing key bits with 64 bit blocks d. 4 rounds of substitution on 64 bit blocks with 56 bit keys

Last Answer : a. permutation and substitution on 64 bit blocks of plain text 

Description : A key-board has at least: (A) 91 keys (B) 101 keys (C) 111 keys (D) 121 keys

Last Answer : (B) 101 keys

Description : Based on the cardinality ratio and participation ............... associated with a relationship type, choose either the Foreign Key Design, the Cross Referencing Design or Mutual Referencing Design. (A) Entity (B) Constraints (C) Rules (D) Keys

Last Answer : (B) Constraints

Description : If h is chosen from a universal collection of hash functions and is used to hash n keys into a table of size m, where n ≤ m, the expected number of collisions involving a particular key K is (A) less than 1 (B) less than lg n (C) greater than 1 (D) greater than lg n

Last Answer : (A) less than 1

Description : Which of the following statements is FALSE about weak entity set ? (A) Weak entities can be deleted automatically when their strong entity is deleted. (B) Weak entity set avoids the data ... weak entity set are not partitioned according to their relationship with tuples in a strong entity set.

Last Answer : (D) Tuples in a weak entity set are not partitioned according to their relationship with tuples in a strong entity set.

Description : If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be: (A) N (B) (N-1) (C) N(N-1)/2 (D) N(N+1)/2

Last Answer : (C) N(N-1)/2 

Description : Consider the following database table having A, B, C and D as its four attributes and four possible candidate keys (I, II, III and IV) for this table: I: {B} II: {B, C} III: {A, D} IV: {C, D} If ... the database table? (A) I and III only (B) III and IV only (C) II only (D) I only

Last Answer : (C) II only

Description : If h is chosen from a universal collection of hash functions and is used to hash n keys into a table of size m, where n≤m, the expected number of collisions involving a particular key x is less than ................... (1) 1 (2) 1/n (3) 1/m (4) n/m

Last Answer : Answer: 1

Description : The messageChannel class declares the _________ class attribute that defines the key string. a) command_key b) command-key c) commandkey d) Key_command

Last Answer : a) command_key

Description : Kotak Mahindra Bank has enabled which of the following banks online shopping portal on its mobile banking app to provide seamless shopping experience for its customers? A) Flipkart B) Snapdeal C) Amazon India D) Ebay India E) Mytra

Last Answer : A) Flipkart Explanation: Private sector lender Kotak Mahindra Bank has enabled online shopping portal Flipkart in its mobile banking application in order to ensure a seamless shopping experience for its ... mode. Through this integration the bank will try to solve that problem for our customers.

Description : Data is sent to all computers on the _____: a) Addressal b) Trunk c) Portal d) None of These

Last Answer : b) Trunk

Description : What is an organisation’s introductory web page called? (1) Portal (2) Vortal (3) Homepage (4) Web site

Last Answer : Web site