____ is a block cipher designed by Xuejia Lai and James L. Massey in 1991.

A. AES
B. IDEA
C. Blowfish
D. RC4


Answer: B

Computer Science & Information Technology

You might also like to view...

The command ________ executes a Java application.

a. run b. javac c. java d. None of the above

Computer Science & Information Technology

Which of the following errors is synchronous?

a. Divide by zero. b. Arithmetic overflow. c. Unsuccessful memory allocation. d. All of the above.

Computer Science & Information Technology

Which of the following statements is false?

a. Streams are objects that implement interface Stream (from the package java.util.stream) and enable you to perform functional programming tasks. b. Streams move elements through a sequence of processing steps—known as a stream pipeline—that begins with a data source, performs various intermediate operations on the data source’s elements and ends with a terminal operation. c. A stream pipeline is formed by chaining method calls. d. An advantage of streams over collections is that streams have their own storage, so once a stream is processed, it can be reused, because it maintains a copy of the original data source.

Computer Science & Information Technology

In a single linked list, what is the number of pointers affected by an insertion operation in the middle of the list?

a. 1 b. 0 c. 2 d. 4

Computer Science & Information Technology