Describe an autokey cipher and use it with initial key K1=6 to
encrypt a plaintext “Information”.
2. Describe Random Mapping Cipher and use the following table
to encrypt a plaintext ‘tutorial’ and ‘Homework’
3. Use the additive cipher with K=10 to encrypt a plaintext
“Homework”.
Note that: Operation is in modulo 26
4. Describe Playfair Cipher, and use the following table to encrypt
a plaintext ‘university’
Explain and Use Vigenere cipher to encrypt the message
“homework” using keyword “student”.
6. Use an affine cipher with K=(7,2) to encrypt “security”.
Explain and Use Unkey Transpositional ciphering to encrypt the
message “Information Technology”
Note that both parties agreed on the number of columns which
is 4
8. Explain and Use Keyed columnar transposition cipher to encrypt
a plaintext “Meet me at the park” with key “Study”
Note: both parties agreed on the number of columns is 5.
1. Describe an operating system and discuss three main objectives/functions.
2. Describe the four main elements of a computer system.
3. Distinguish between two main categories of processor registers; and give examples to illustrate your answer.
4. Discuss the three input-output communication techniques that are used in computer systems.
5. Explain the steps involved in executing an instruction in a computer system.
As the network administrator for your organization, you have been tasked to create a new network for newly set up workstations.
a. What network topology will you adopt? Explain your reasons, compare the chosen topology to 2 other topologies, and establish why the one you chose is better than the rest.
b. What type of IP addressing will you use, when assigning IP addresses to the workstations on the network? Explain your answer with practical examples.
c. Assuming your organization recommended that you adopt the star topology, which network device will u use as the central connection point, and why.
Explain different between data and information provide geographical examples for each
1. Objectives
The main objective of this project is to let you know in more detail the design and description process of a Management Information Base (MIB). A simple case will be studied and treated with the formalism dictated by SMI-v2 described by RFC 1213.
2. Introduction
SMI-v2 uses only a very small subset of ASN.1 and has few templates to formally describe an information base.
RFC 1213 gives the formalism to use a description of a MIB that will be handled with the SNMP protocol. This project will therefore ask you to familiarize yourself with this RFC.
3. Presentation of the context and design of the MIB
You should design a private Management Information Base to supervise a host. The goal is to use SNMP to communicate the information to a network management application and to be able to automatically control the state, generate useful reports and possibly detect performance or security issues.
- What information would be required to manage a host?
- Distinguish between the simple variables and their types, and the tables necessary for this information base.
4. Formal description of the MIB
For this part, we will offer you a simplified MIB in the Appendix. According to an informal description, you must format this MIB in accordance with the SMI-v2 standard. Pay particular attention to how a table should be described, and to the DESCRIPTION field of each object.
- Name the module containing the MIB using the following format: studentName-StudentID-MIB,
- Choose the OID (Object Identifier) of each element,
- Define a coherent tree structure,
- Use the ASN.1 syntax for the types of the elements.
-Write the complete MIB in text format using the SMI-v2 standard (refer to the tutorial of SMI)
5. Appendix
The elements to consider for the design of the MIB are:
1- Percentage of free CPU "freeCPULoad"
2- Percentage of unallocated memory "freeMemoryLoad"
3- If the workstation is an "isWebServer" web server
4- The operating system version "version"
5- The old start date of the "lastHostReboot" system
6- The number of current users that are logged into the "usersNumber" workstation
7- A table of these users: "usersTable"
8- The user's login name, "userId"
9- The date of the opening of the session, "userLoginDate"
Provide a sentence or two explaining the different between data and information provide a geographical examples to aid you explanation
Design a communication model that will be used to deploy a wan for your firm.., using ABCD as the branches
Design a communication model that will be used to deploy a wan for your firm.., using ABCD as the branches
As a system analyst, Design a communication model that will be used to deploy a wan for your firm.., using ABCD as the branches
1. Objectives
The main objective of this project is to let you know in more detail the design and description process of a Management Information Base (MIB). A simple case will be studied and treated with the formalism dictated by SMI-v2 described by RFC 1213.
2. Introduction
SMI-v2 uses only a very small subset of ASN.1 and has few templates to formally describe an information base.
RFC 1213 gives the formalism to use a description of a MIB that will be handled with the SNMP protocol. This project will therefore ask you to familiarize yourself with this RFC.
3. Presentation of the context and design of the MIB
You should design a private Management Information Base to supervise a host. The goal is to use SNMP to communicate the information to a network management application and to be able to automatically control the state, generate useful reports and possibly detect performance or security issues.
- What information would be required to manage a host?
- Distinguish between the simple variables and their types, and the tables necessary for this information base.
4. Formal description of the MIB
For this part, we will offer you a simplified MIB in the Appendix. According to an informal description, you must format this MIB in accordance with the SMI-v2 standard. Pay particular attention to how a table should be described, and to the DESCRIPTION field of each object.
- Name the module containing the MIB using the following format: studentName-StudentID-MIB,
- Choose the OID (Object Identifier) of each element,
- Define a coherent tree structure,
- Use the ASN.1 syntax for the types of the elements.
-Write the complete MIB in text format using the SMI-v2 standard (refer to the tutorial of SMI)
5. Appendix
The elements to consider for the design of the MIB are:
1- Percentage of free CPU "freeCPULoad"
2- Percentage of unallocated memory "freeMemoryLoad"
3- If the workstation is an "isWebServer" web server
4- The operating system version "version"
5- The old start date of the "lastHostReboot" system
6- The number of current users that are logged into the "usersNumber" workstation
7- A table of these users: "usersTable"
8- The user's login name, "userId"
9- The date of the opening of the session, "userLoginDate"