chevron_left
0 points
15 11 8

Q1. Which of the following provides a visual representation of the patterns of an algorithm? a) Flow analysis b) Flowchart c) Pseudocode d) Gantt chart

Answers:

Flowchat

Q2. If using the MD5 hashing algorithm, what is the length to which each message is padded?

Answers:

512 bits

Q3. “Why is IPsec considered to be a transparent security protocol? - Ipsec packets can be viewed by anyone - IPsec is designed to not require modifications of programs, or additional training, or additional client setup. - Ipsec‘s design and packet header contents are open sourced technologies - IPsec uses the Transparent Encryption (TE) algorithm.“

Answers:

IPsec is designed to not require modifications of programs, or additional training, or additional client setup.

Q4. Which of these is NOT a characteristic of a secure hash algorithm? A) Collisions should be rare. B) The results of a hash function should not be reversed. C) The hash should always be the same fixed size. D) A message cannot be produced from a predefined hash.

Answers:

Collisions should be rare.

Q5. Which of the following is NOT an encryption algorithm used by SSH?

Answers:

SHA-2

Q6. A genetic algorithm is an approach to solving problems based on the _____.

Answers:

theory of evolution

Q7. What two key lengths are the most popular for the SHA-2 hashing algorithm?

Answers:

256, 512

Q8. Regardless of the algorithm being used, a search through an array is always performed a. from lowest to highest element b. from highest to lowest element c. beginning with the middle element d. using a binary search e. None of these

Answers:

None of these

Q9. What is the term used for the value that is searched for in a search algorithm? A ) stringValue B ) searchValue C ) matchValue D ) flag E ) None of these

Answers:

searchValue

Q10. A key that is generated by a symmetric cryptographic algorithm is said to be a: Private key Public Key Symmetric key Shared key

Answers:

Private Key

Q11. What causes the economy to move from its short-run equilibrium to its long-run equilibrium? The government increases taxes to curb aggregate demand. Nominal wages, prices, and perceptions adjust upward to this new price level. The government increases spending to increase aggregate demand. Nominal wages, prices, and perceptions adjust downward to this new price level.

Answers:

Nominal wages, prices, and perceptions adjust downward to this new price level.

Q12. Which sorting algorithm moves elements to their final sorted position in the array?

Answers:

selection

Q13. Which sorting algorithm moves elements to their final sorted position in the array?

Answers:

selection

Q14. The QuickSort algorithm works on the basis of A) three sublists B) two sublists and a pivot C) two pivots and a sublist D) three pivots E) None of these

Answers:

B) two sublists and a pivot

Q15. Suppose that a country‘s inflation rate increases sharply. As a result, the inflation tax on holders of money ???.

Answers:

increases

Q16. Popular cryptosystems use a hybrid combination of symmetric and asymmetric algorithms.

Answers:

TRUE

Q17. What is the mass % of carbon in dimethylsulfoxide (C2H6SO) rounded to three significant figures? A) 25.4 B) 28.6 C) 30.7 D) 7.74 E) 78.1

Answers:

C

Q18. What is the mass % of carbon in dimethylsulfoxide (C2H6SO) rounded to three significant figures? A) 25.4 B) 28.6 C) 30.7 D) 7.74 E) 78.1

Answers:

C

Q19. A sorting algorithm can be used to arrange a set of ________ in ________ order. a) strings, ascending b) numeric values, descending c) numeric values, ascending d) strings, descending e) All of the above

Answers:

e) All of the above

Q20. Which refers to a text-based approach to documenting an algorithm?

Answers:

Pseudocode

Q21. What statement regarding the different versions of the SHA hashing algorithm is accurate? a. SHA-0 is the most secure version of SHA. b. SHA-1 supports a 128-bit hash function. c. SHA-2 only supports a 256-bit hash. d. SHA-2 and SHA-3 both support the same hash lengths.

Answers:

SHA-2 and SHA-3 both support the same hash lengths.

Q22. Which algorithm is used by the OSPF routing process to construct the SPF tree on a router?

Answers:

Dijkstra‘s algorithm Refer to curriculum topic: 5.3.1 OSPF routing process uses Dijkstra‘s algorithm to construct the SPF tree. DUAL algorithm is used by the EIGRP routing protocol. Bellman-Ford algorithm is used by RIP routing protocol. Path vector protocol is the protocol used by BGP.

Q23. Which of the following is a sorting algorithm?

Answers:

All of the above

Q24. Show the effect of the following event on the market for minivans: Engineers develop new automated machinery for the production of minivans.

Answers:

Supply curve shifts to the right

Q25. A sorting algorithm is used to locate a specific item in a larger collection of data. True False

Answers:

FALSE

Q26. What is NOT a valid encryption key length for use with the Blowfish algorithm?

Answers:

32 bits 64 bits 256 bits *512 bits*

Q27. Security mechanisms typically do not involve more than one particular algorithm or protocol.

Answers:

FALSE

Q28. Security mechanisms typically do not involve more than one particular algorithm or protocol.

Answers:

FALSE

Q29. Indicate whether each of the following allocations is efficient or inefficient. Allocations A B C D

Answers:

A= Efficient B= Efficient C= Inefficient D= Inefficient

Q30. In a sequential search algorithm, the Boolean variable used as a flag is initialized to TRUE. - True - False

Answers:

FALSE

Q31. What does the variable middle represent in a binary search algorithm?

Answers:

Subscript of the midpoint

Q32. It is the responsibility of a routing algorithm to find a datagram‘s path through a network.

Answers:

TRUE

Q33. Which hashing algorithm below is used with NTLMv2‘s Hashed Message Authentication Code?

Answers:

MD5

Q34. Which of the following is not a way of representing algorithms? A. Stepwise refinement B. Pseudocode C. Flowchart D. Programming language

Answers:

A. Stepwise refinement

Q35. The process of ethical decision-making or ethical algorithm typically begins with:

Answers:

identifying which stakeholders a decision would affect and in what ways.

Q36. Translating an algorithm into a programming language is called ________.

Answers:

coding

Q37. The first-come, first-served (FCFS) algorithm is fine for most ____ systems. Answers: a. batch b. user initiated c. interactive d. multiuser

Answers:

Batch

Q38. You should express the complexity of an algorithm in terms of it: a) space requirements b) execution time c) problem size d) overall complexity

Answers:

c) problem size

Q39. A database can best be described as:

Answers:

a collection of data that can be sorted and searched using search algorithms.

Q40. A data-flow diagram provides a visual representation of an algorithm.

Answers:

FALSE

Q41. The ________ design technique can be used to break down an algorithm into functions.

Answers:

top-down

Q42. Product cipher is an encryption algorithm that has no corresponding decryption algorithm. True or False?

Answers:

FALSE

Q43. The most basic type of cryptographic algorithm is a ____ algorithm.

Answers:

hash

Q44. which of the following is the strongest hashing algorithm

Answers:

sha - 1

Q45. In your encryption algorithm, you removed every third letter. Which algorithm did you use? -expansion -compaction -transposition -substitution

Answers:

compaction

Q46. Which of the following is true about general knowledge? It is both excludable and rival in consumption. It is not excludable but rival in consumption. It is neither excludable nor rival in consumption. It is excludable and not rival in consumption.

Answers:

It is neither excludable nor rival in consumption.

Q47. An algorithm is a guiding rule used to solve problems or make decisions.

Answers:

f

Q48. This type of algorithm rearranges the values stored in an array in some particular order.

Answers:

Sorting Algorithm

Q49. You must always use the same algorithm to encrypt information and decrypt the same information.

Answers:

FALSE

Q50. The asymmetric cryptography algorithm most commonly used is:

Answers:

RSA

Q51. Which of the following is NOT an encryption algorithm used by SSH?

Answers:

SHA-2

Q52. A cryptovariable is a value representing the application of a hash algorithm on a message. A) True B) False

Answers:

B) False

Q53. What type of cryptographic algorithm creates a unique digital fingerprint of a set of data?

Answers:

A. Hash

Q54. The ARCfour encryption algorithm uses variable-length keys up to 2048 bits in length.?

Answers:

TRUE

Q55. What type of encryption algorithm uses two keys to encrypt and decrypt data?

Answers:

asymmetric

Q56. The Linux page replacement algorithm is an expanded version of the ____ replacement policy. a. clock page c. page clock b. clock d. page

Answers:

A

Q57. Which searching algorithm requires the array to be ordered?

Answers:

Binary

Q58. List and describe the characteristics a hashing algorithm must have to be considered secure.

Answers:

Fixed size: All data produces the same size digest. Unique: Two different sets of data cannot produce the same digest, which is known as a collision. Changing a single letter in one data set should produce an entirely different digest. Original: It should be impossible to produce a data set that has a desired or predefined hash. Secure: The resulting digest can‘t be reversed in order to determine the original plaintext.

Q59. Another way to express an algorithm is with pseudocode.

Answers:

TRUE

Q60. The binary search algorithm is an example of an algorithm in which of the following classes?

Answers:

Θ(log2n)

Q61. What is the average compression ratio for the gzip utility using the LZ77 compression algorithm? a. 40%-50% b. 50%-60% c. 60%-70% d. 70%-80%

Answers:

C

Q62. The row reduction algorithm applies only to augmented matrices for a linear system. Is this statement true or​ false?

Answers:

The statement is false. The algorithm applies to any​ matrix, whether or not the matrix is viewed as an augmented matrix for a linear system.

Q63. A retina scanner has become the most common type of standard biometrics.

Answers:

FALSE

Q64. UNIX uses the ____ page replacement algorithm. a. least recently used c. priority b. round robin d. oldest first

Answers:

A

Q65. Which of the following is an advantage of the Keccak algorithm?

Answers:

It is a compact algorithm that could be considered ideal for smaller devices and appliances

More Posts

Top 57 Algorithm Quiz Question and Answer Part 2 Lalit Kumar - Jan 21
Top 57 Algorithm Quiz Question and Answer Lalit Kumar - Jan 21
Google Quiz Questions and Answers usman - Feb 8
Google Quiz Questions and Answers usman - Feb 8
Google Quiz Questions and Answers usman - Feb 3
Important Arrays Quiz Questions and Answers To Learn in 2020-21 Lalit Kumar - Jan 21
Excel Quiz Questions and Answers To Make You Job Ready Lalit Kumar - Jan 21
50+ Top Excel Tricks Quiz Questions and Answers Lalit Kumar - Jan 21
50+ Linux Questions and Answers For Quiz Lalit Kumar - Jan 21
Top Database Quiz Questions and Answers - Computer Science Lalit Kumar - Jan 20