____ is a block cipher designed by Xuejia Lai and James L. Massey in 1991.
A. AES
B. IDEA
C. Blowfish
D. RC4
Answer: B
You might also like to view...
The command ________ executes a Java application.
a. run b. javac c. java d. None of the above
Which of the following errors is synchronous?
a. Divide by zero. b. Arithmetic overflow. c. Unsuccessful memory allocation. d. All of the above.
Which of the following statements is false?
a. Streams are objects that implement interface Stream (from the package java.util.stream) and enable you to perform functional programming tasks. b. Streams move elements through a sequence of processing steps—known as a stream pipeline—that begins with a data source, performs various intermediate operations on the data source’s elements and ends with a terminal operation. c. A stream pipeline is formed by chaining method calls. d. An advantage of streams over collections is that streams have their own storage, so once a stream is processed, it can be reused, because it maintains a copy of the original data source.
In a single linked list, what is the number of pointers affected by an insertion operation in the middle of the list?
a. 1 b. 0 c. 2 d. 4