Other Programming & Computer Science Answers

Questions: 1 727

Answers by our Experts: 1 357

Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Search & Filtering

We will now analyze a pseudorandom number sequence generated by a LFSR characterized by (p2 = 1, p1 = 1, p0 = 1). 

a. Draw the LFSR diagram.

b. What is the sequence generated from the initialization vector (s2 = 1, s1 = 0, s0 = 0)? 

c. What is the sequence generated from the initialization vector (s2 = 0, s1 = 1, s0 = 1)? 

d. How are the two sequences related?



Refer to https://en.wikipedia.org/wiki/DES_supplementary_material for the s-boxes in DES to answer the following questions:

What is the output of the first round of the DES algorithm when the plaintext and the key are both all zeros? (List transition steps to justify your answer)

a. What’s the 64-bit value of IP(x)?

b. What’s the 48-bit subkey k1 of after PC-1?

c. What’s the 48-bit value of E(R0) after expansion?

d. What’s the 48-bit value after E(R0) XOR k1?

e. What’s the 32-bit value after S-boxes operations?

f. What’s the 64-bit (L1, R1) value after permutation P?


 Suppose 8 bit registers have following contents

X=00001111

Y=10101010

Z= 11011011

W=00110011

What will be the 8 bit values of each register after execution of following sequences of

microoperations ?

X ← 𝑋 + 𝑌

Z←Z⋀ 𝑊, 𝑌 ← 𝑌 + 1

X←X-Z


The "SUPER GOODS " Pvt. Ltd. manufactures spices for the export market. In the factory, there are two machines called A and B. The following table shows a sample production of each machine in seven days. Day1 Day2 Day3 Day4 Day5 Day6 Day 7 Production of Machine A 160 180 150 110 190 140 165 Production of Machine B 180 100 115 170 155 165 195

Write a program in pseudocode to

• Declare a two-dimensional array to store these data and get user input to load the array. • Find the total production of machine A in the entire week. • Display the highest production and name of the machine that produced it.


2.1 By default, when you store, use, share or communicate your data in the cloud, usually, your data is in a raw, unencrypted format, known as ‘plaintext’, unless you have encrypted your data before being saved or transmitted. If you leave your data unencrypted, you will face the risk that anyone who gains access to your account can read, copy or delete your data. This leaves your data leaked or exposed to unauthorized individuals and entities. Thus, end-to-end data encryption including your emails if stored in Cloud servers, at rest, in-use and in motion, is a must. Discuss various methods of encryption that can secure data in storage and in transit. 


2.2 In NOT less than three pages, critically discuss how Cloud computing and remote access has supported the COVID-19 response. (You are to conduct independent research and consult other academic materials/ articles to corroborate your discussion. Include all references consulted). 


1. 20% of people are vegetarians. 70% of vegetarians like broccoli. 20% of vegetarians like
carrot. 10% of vegetarians like cucumber. 40% of meat eaters like broccoli. 60% of meat
eaters like carrot. What is the probability that a man who likes carrot is a meat eater?
2. Tossing 2 coins together, if at least one head comes roll a die else toss again. Find the
probability distribution for the random variable X which represents the number of tail as
output.
3. What is the coefficient of x⁹y⁶ in (x-y)

Write Verilog code to perform 8-bit division using non restoring algorithm.


Identify ways to safeguard computer against each of the following risk viruses, worms, 

Trojan horses, botnets, denial of service attacks, back doors and spoofing


By default, when you store, use, share or communicate your data in the cloud, usually, your data is saved or transmitted. If you leave your data unencrypted, you will face the risk that anyone who gains access to your account can read, copy or delete your data. This leaves your data leaked or exposed to unauthorized individuals and entities. Thus, end-to-end data encryption including your emails if stored in Cloud servers, at rest, in-use and in motion, is a must. Discuss various methods of encryption that can secure data in storage and in transit


Write a program that allows the user to input two numbers. Use NUM1 & NUM2 as variables. The program should output 4 answers using 4 different operators which are +, ‐, /, * and MOD. Your Screen should look something like this:

Ans1 =

Ans2 =

Ans3 =

Ans4 =

*using netbeans*


LATEST TUTORIALS
New on Blog
APPROVED BY CLIENTS