# Quizzes On Algorithm: Solved Questions and Answers

posted Jan 21 9 min read

Flowchat

512 bits

### Q3. “Why is IPsec considered to be a transparent security protocol? - Ipsec packets can be viewed by anyone - IPsec is designed to not require modifications of programs, or additional training, or additional client setup. - Ipsec‘s design and packet header contents are open sourced technologies - IPsec uses the Transparent Encryption (TE) algorithm.“

IPsec is designed to not require modifications of programs, or additional training, or additional client setup.

### Q4. Which of these is NOT a characteristic of a secure hash algorithm? A) Collisions should be rare. B) The results of a hash function should not be reversed. C) The hash should always be the same fixed size. D) A message cannot be produced from a predefined hash.

Collisions should be rare.

SHA-2

### Q6. A genetic algorithm is an approach to solving problems based on the _____.

theory of evolution

256, 512

None of these

searchValue

Private Key

### Q11. What causes the economy to move from its short-run equilibrium to its long-run equilibrium? The government increases taxes to curb aggregate demand. Nominal wages, prices, and perceptions adjust upward to this new price level. The government increases spending to increase aggregate demand. Nominal wages, prices, and perceptions adjust downward to this new price level.

Nominal wages, prices, and perceptions adjust downward to this new price level.

selection

selection

### Q14. The QuickSort algorithm works on the basis of A) three sublists B) two sublists and a pivot C) two pivots and a sublist D) three pivots E) None of these

B) two sublists and a pivot

increases

TRUE

C

C

### Q19. A sorting algorithm can be used to arrange a set of ________ in ________ order. a) strings, ascending b) numeric values, descending c) numeric values, ascending d) strings, descending e) All of the above

e) All of the above

Pseudocode

### Q21. What statement regarding the different versions of the SHA hashing algorithm is accurate? a. SHA-0 is the most secure version of SHA. b. SHA-1 supports a 128-bit hash function. c. SHA-2 only supports a 256-bit hash. d. SHA-2 and SHA-3 both support the same hash lengths.

SHA-2 and SHA-3 both support the same hash lengths.

### Q22. Which algorithm is used by the OSPF routing process to construct the SPF tree on a router?

Dijkstra‘s algorithm Refer to curriculum topic: 5.3.1 OSPF routing process uses Dijkstra‘s algorithm to construct the SPF tree. DUAL algorithm is used by the EIGRP routing protocol. Bellman-Ford algorithm is used by RIP routing protocol. Path vector protocol is the protocol used by BGP.

All of the above

### Q24. Show the effect of the following event on the market for minivans: Engineers develop new automated machinery for the production of minivans.

Supply curve shifts to the right

FALSE

### Q26. What is NOT a valid encryption key length for use with the Blowfish algorithm?

32 bits 64 bits 256 bits *512 bits*

FALSE

FALSE

### Q29. Indicate whether each of the following allocations is efficient or inefficient. Allocations A B C D

A= Efficient B= Efficient C= Inefficient D= Inefficient

FALSE

### Q31. What does the variable middle represent in a binary search algorithm?

Subscript of the midpoint

TRUE

MD5

### Q34. Which of the following is not a way of representing algorithms? A. Stepwise refinement B. Pseudocode C. Flowchart D. Programming language

A. Stepwise refinement

### Q35. The process of ethical decision-making or ethical algorithm typically begins with:

identifying which stakeholders a decision would affect and in what ways.

coding

Batch

c) problem size

### Q39. A database can best be described as:

a collection of data that can be sorted and searched using search algorithms.

FALSE

top-down

FALSE

hash

sha - 1

compaction

### Q46. Which of the following is true about general knowledge? It is both excludable and rival in consumption. It is not excludable but rival in consumption. It is neither excludable nor rival in consumption. It is excludable and not rival in consumption.

It is neither excludable nor rival in consumption.

f

### Q48. This type of algorithm rearranges the values stored in an array in some particular order.

Sorting Algorithm

FALSE

RSA

SHA-2

B) False

A. Hash

TRUE

asymmetric

A

Binary

### Q58. List and describe the characteristics a hashing algorithm must have to be considered secure.

Fixed size: All data produces the same size digest. Unique: Two different sets of data cannot produce the same digest, which is known as a collision. Changing a single letter in one data set should produce an entirely different digest. Original: It should be impossible to produce a data set that has a desired or predefined hash. Secure: The resulting digest can‘t be reversed in order to determine the original plaintext.

TRUE

Θ(log2n)

C

### Q62. The row reduction algorithm applies only to augmented matrices for a linear system. Is this statement true or​ false?

The statement is false. The algorithm applies to any​ matrix, whether or not the matrix is viewed as an augmented matrix for a linear system.

FALSE