Answer the following statements true (T) or false (F)

1. A widely used technique for pseudorandom number generation is an algorithm known as the linear congruential method.
2. A cryptographically secure pseudorandom bit generator is defined as one that passes the least significant bit test.
3. The security of Blum, Blum, Shub is based on the difficulty of factoring n.
4. The stream cipher is similar to the one-time pad with a difference being that a one-time pad uses a pseudorandom number stream and a stream cipher uses a genuine random number stream.
5. The longer the keyword the more difficult the cryptanalysis.


1. TRUE
2. FALSE
3. TRUE
4. FALSE
5. TRUE

Computer Science & Information Technology

You might also like to view...

Function _________ is used to set the random number seed to randomize a program.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What is the proper format of an external reference to a workbook or worksheet thats name contains spaces; source and destination files are in the same folder?

A) Worksheet'!Cell B) [WorkbookName]Worksheet!Cell C) '[WorkbookName]Worksheet'!Cell D) ''[WorkbookName]Worksheet''!Cell

Computer Science & Information Technology

Match each item with a statement below.

A. a backup designed to allow restoring the system disk directly from backup media without having to install the OS and backup software first B. documenting and managing network changes, including IP addressing and moving devices C. doesn't mark files as backed up D. does mark files as backed up E. a step in the troubleshooting process in which the technician must call in additional people F. a business continuity option in which a physical location has all the infrastructure in place and configured, and data is synchronized and up to date G. a time set aside for schedule updates, upgrades, and other network maintenance procedures H. measures the total cable length I. issues an electrical signal on a wire, and a probe detects the signal J. instructions on how to undo the upgrade if problems occur during or after the upgrade

Computer Science & Information Technology

Compare and contrast grid computing and the power grid. Explain how the analogy makes sense. Also, explain how the analogy breaks down.

What will be an ideal response?

Computer Science & Information Technology