Get premium membership and access questions with answers, video lessons as well as revision papers.
Cryptography is a technique to encrypt the plain-text data which makes it difficult to understand and interpret. There are several cryptographic algorithms available including;
1) Secret Key Encryption - Both sender and receiver have one secret key. This secret key is used to encrypt the data at sender’s end. The data is sent on the public domain to the receiver. Because the receiver knows and has the Secret Key, the encrypted data packets can easily be decrypted.
2) Public Key Encryption - In this encryption system, every user has its own Secret Key and it is not in the shared domain. The secret key is never revealed on public domain. Along with secret key, every user has its own but public key. Public key is always made public and is used by Senders to encrypt the data. When the user receives the encrypted data, he can easily decrypt it by using its own Secret Key.
3) Message Digest - In this method, actual data is not sent; instead a hash value is calculated and sent. The other end user, computes its own hash value and compares with the one just received. If both hash values are matched, then it is accepted; otherwise rejected.
anmwat answered the question on March 26, 2019 at 07:42
- Explain the advantages of fiber optic cables as used in networking
(Solved)
Explain the advantages of fiber optic cables as used in networking
Date posted: March 26, 2019. Answers (1)
- Explain the concept of distributed processing in networking
(Solved)
Explain the concept of distributed processing in networking
Date posted: March 26, 2019. Answers (1)
- Outline the computer IP security architecture groups.(Solved)
Outline the computer IP security architecture groups.
Date posted: March 15, 2019. Answers (1)
- Explain the THREE stages of a computer software testing.(Solved)
Explain the THREE stages of a computer software testing.
Date posted: March 13, 2019. Answers (1)
- What is computer software testing?(Solved)
What is computer software testing?
Date posted: March 13, 2019. Answers (1)
- Explain FOUR main components of computer software design.(Solved)
Explain FOUR main components of computer software design.
Date posted: March 13, 2019. Answers (1)
- Discuss the specifications a computer engineer should consider during computer software process model engineering.(Solved)
Discuss the specifications a computer engineer should consider during computer software process model engineering.
Date posted: March 13, 2019. Answers (1)
- State and outline 2 types of constants in c language.(Solved)
Constant is any value that cannot be changed during program execution.in c language any single character number or character string is refered to as a constant.
Constants are of two types;primary and secondary constants.
Date posted: March 12, 2019. Answers (1)
- Give the rules used for naming an identifier(Solved)
Identifier are user defined words used to name entities like variables,arrays,function,structures e.t.c
Date posted: March 12, 2019. Answers (1)
- Give 2 uses of a comment line as used in c language.(Solved)
Comment line indicates the purpose of the program and is represented as /*..........*/.
Comment line can be single or multiple line but should not be nested,can be anywhere in a program except inside a string and character constant.
Date posted: March 12, 2019. Answers (1)
- Explain the characteristics of a computer Relational Model concept.(Solved)
Explain the characteristics of a computer Relational Model concept.
Date posted: March 12, 2019. Answers (1)
- Discuss types of computer ER Model concepts. (Solved)
Discuss types of computer ER Model concepts.
Date posted: March 12, 2019. Answers (1)
- Explain a two tier client server architecture and a three tier client architecture found in computers(Solved)
Explain a two tier client server architure and a three tier client architecture found in computers.
Date posted: March 12, 2019. Answers (1)
- Describe the main Main Characteristics of the Database Approach as used in database models.(Solved)
Describe the main Main Characteristics of the Database Approach as used in database models.
Date posted: March 9, 2019. Answers (1)
- State types of databases used in computer science.(Solved)
State types of databases used in computer science.
Date posted: March 9, 2019. Answers (1)
- Write a java program that allows user to input three numbers and output the largest of the three number after program compilation (Solved)
Write a java program that allows user to input three numbers and output the largest of the three number after program compilation.
Date posted: March 5, 2019. Answers (2)
- Compare and contrast Multiprogramming, Multitasking and Multiprocessing(Solved)
Compare and contrast Multiprogramming, Multitasking and Multiprocessing
Date posted: March 5, 2019. Answers (1)
- Write a C function that has three inputs which are integers. The function returns true if the
first number raised to the power of the second...(Solved)
Write a C function that has three inputs which are integers. The function returns true if the
first number raised to the power of the second number equals the third number.
Date posted: March 5, 2019. Answers (1)
- Write a C function that computes that maximum of a specific row R in a 2D array of size 6 by 5.(Solved)
Write a C function that computes that maximum of a specific row R in a
2D array of size 6 by 5.
Date posted: March 5, 2019. Answers (1)
- What will be the output of the following c program?(Solved)
#include
int *p, x;
int a[5]={100,200,300,400,500};
int *p2;
int main()
{
p=NULL;
x=500;
p=&x;
printf("1) %d %d \n",x,*p,p,&x,&p);
p2=a;
*(p2+1)=*p;
*p= *p2 + *(p2+2);
printf("2) %d %d \n",x,*p,*p2);
return 0;
}
Date posted: March 5, 2019. Answers (1)