Distinguish message authentication and entity authentication.
In RSA, why cant Bob choose 1 as the public key e?
In an asymmetric public key cipher, which key is used for encryption? Which key is used for decryption? a. Public key b. Private key
Consider the following problems related to the exponential Fourier series. (a) The exponential Fourier series of a periodic signal x(t)of fundamental period T 0 is i. Determine the value of the...
Change Figure 31.23 to allow bidirectional authentication. Alice needs to be authenticated for Bob and Bob for Alice.
Why do you think asymmetric-key cryptography is used only with small messages.
If Alice and Bob need to communicate using asymmetric-key cryptography, how many keys do they need? Who needs to create these keys?
In a modern block cipher, we often need to use a component in the decryption cipher that is the inverse of the component used in the encryption cipher. What is the inverse of each of the following...
According to the definitions of stream and block ciphers, find which of the following ciphers is a stream cipher. a. Additive b. Monoalphabetic c. Autokey
If we have a single integer key in Example 31.1 and 31.2 in the text, how many integer keys do we have in Example 31.3 in the text?
Assume Alice and Bob use an additive cipher in modulo 26 arithmetic. If Eve, the intruder, wants to break the code by trying all possible keys (bruteforce attack), how many keys should she try on...
The swap operation is one of the components of the modern block ciphers. a. Swap the word (10011011) 2 . b. Swap the word resulting from part a. c. Compare the results of part a and part b to show...
In a cipher, all As in the plaintext have been changed to Ds in the ciphertext and all Ds in the plaintext have been changed to Hs in the ciphertext. Is this a monoalphabetic or polyalphabetic...
Assume we have a very simple message digest. Our unrealistic message digest is just one number between 0 and 25. The digest is initially set to 0. The cryptographic hash function adds the current...
Which of the following technique(s) is (are) used for scheduling? a. FIFO queuing b. Priority queuing c. Leaky Bucket
Rank the following applications based on their sensitivity to reliability: 1. HTTP 2. SNMP 3. SMTP 4. VoIP
Starting with the Fourier transform pair and using no integration, indicate the properties of the Fourier transform that will allow you to compute the Fourier transform of the following signals (do...
In the following problems we want to find the Fourier transform of the signals. (a) For the signal find its Fourier transform by using the Fourier transform of x(t) = 0.5e at u(t) 0.5e at u(t), a >...
Consider the following problems related to the modulation and power properties of the Fourier transform. (a) The carrier of an AM system is cos(10t), consider the following message signals i. m(t) =...
Consider the sign signal (a) Find the derivative of s(t) and use it to find S(Ω) = F(s(t)). (b) Find the magnitude and phase of S(Ω). (c) Use the equivalent expression s(t) =...
The following problems relate to the modulation property of the Fourier transform: (a) Consider the signal x(t) = p(t) + p(t) cos(Ï t) where p(t) = u(t + 1) u(t 1) i. Use the modulation property...
Consider the raised cosine pulse x(t) = [1 + cos( t)] (u(t + 1) u(t 1)) (a) Carefully plot x(t). (b) Find the Fourier transform of the pulse p(t) = u(t + 1) u(t 1) (c) Use the definition of the...
The transfer function of a filter is (a) Find the poles and zeros of H(s) and use this information to sketch the magnitude response |H(jΩ)|of the filter. Indicate the magnitude response...
An analog averager is characterized by the following relationship where x(t) is the input and y(t) the output. If x(t) = u(t) 2u(t 1) + u(t 2), (a) find the Fourier transform of the output...
A pure tone x(t) = 4 cos(1000t) is transmitted using an amplitude mod-ulation communication system with a carrier cos(10000t). The output of the AM system is y(t) = x(t) cos(10000t) At the receiver,...
The transfer function H(s) = 1/(s + 1) 2 of a filter is to be implemented by cascading two first order filters H i (s) = 1/(s + 1), i = 1, 2. (a) Implement Hi(s) as a series RC circuit with input v i...
You are given a state-variable realization of a second-order system hav-ing the following matrix and vectors (a) Find an invertible matrix F that can be used to transform the given state and output...
Professor Newman thinks that he has worked out a simpler proof of correctness for Dijkstras algorithm. He claims that Dijkstras algorithm relaxes the edges of every shortest path in the graph in the...
The Pade approximant provides an exact matching of M + N 1 values of h[n], where M and N are the orders of the numerator and denominator of the rational approximation. But there is no method for...
What is 5NF?
The following problems relate to the response of LTI discrete-time systems. (a) The unit-step response of a LTI discrete-time system is found to be s[n] = (3 3(0.5) n+1 )u[n]. Use s[n] to find the...
Encrypt the message this is an exercise using additive cipher with key = 20. Ignore the space between words. Decrypt the message to get the original plaintext.
Suppose that tables T1 and T2 have a 1:N relationship. Show the SQL statements necessary to fill an intersection T1_T2_INT. Make up your own names for primary and foreign keys.
Consider the signals x(t) = u(t) u(t 1), and y(t) = r(t) 2r(t 1) + r(t 2) (a) Is any of these signals band-limited? Explain. (b) Use Parsevals energy result to determine maximum frequency for...
Consider the periodic signals x 1 (t) = cos(2 t), x 2 (t) = cos((2 + )t) (a) Let = 4, show that if we sample these signals using T s = 0.5 we get the same sample values from the two signals. Is any...
Suppose that a table contains two nonkey columns: AdvisorName and AdvisorPhone. Further suppose that you suspect that AdvisorPhone AdvisorName. Explain how to examine the data to determine if this...
Write a DELETE statement that will delete the row for the employee named Smith. Do not run this statement. What happens if this employee has rows in ASSIGNMENT?
Write an SQL statement to create a view named CustomerSalesView based on the the CUSTOMER_04 and SALE_02 tables. In this view, include the values of Customer ID, LastName as CustomerLastName,...
A desirable signal x(t) = cos(100t) 2 cos(50 t) is recorded as y(t) = x(t) + cos(120r t), i.e., as the desired signal but with a 60 Hz hum. We would like to get rid of the hum and recover the...
Consider a second-order analog filter with transfer function (a) Determine the dc gain of this filter. Plot the poles and zeros; determine the magnitude response |H(jΩ)|of this filter and...
Consider a filter with a transfer function (a) Determine the magnitude of this filter at Ω = 0, 1, and . What type of filter is it? (b) Show that the bandwidth of this filter is BW =...
The form and report in Figure 5-15 show specific instances, but not the full range of possible relationship values between MEMBER and LOCKER. For example, unassigned LOCKERs may not show up on the...
Give examples of M-M, M-O, O-M, and O-O relationships (other than those presented in this chapter). Draw two E-R diagrams for each of your examples: one using the traditional diamond notation and one...
In Figure 28.31, what is the amount of data in the playback buffer at each of the following times? Figure 28.31 a. 00:00:17 b. 00:00:20 c. 00:00:25 d. 00:00:30 At time 00:00:08 Arrival Playback 7 At...
What is the role of the secret key added to the hash function in Figure 31.17 in the text (MAC)? Explain. Figure 31.17 Figure 31.17 Message authentication code Alice Bob M: Message K: A shared secret...
If the one-time pad cipher (Figure 31.12 in the text) is the simplest and most secure cipher, why is it not used all of the time? Figure 31.12 Random sequence bit generator Secure key-exchange...
Figure 31.9 in the text shows that DES creates 16 different 48-bit keys, one for each round. Why do we need 16 different keys? Why cant we use the same key in each round? Figure 31.9 64-bit plaintext...
In Figure 31.10 in the text, why do we need an expansion P-box? Why cant we use a straight or a compression P-box? Figure 31.10 In 32 bits Expansion P-box 48 bits XOR 4 - K; (48 bits) [48 bits f(R1....
In each round of DES, we have all components defined in Figure 31.8 in the text. Which components use a key and which components do not? Figure 31.8 4 2. 3. Straight permutation Compression...
A permutation block (P-box) in a modern block cipher is an example of a keyless transposition cipher. What does this statement mean? (See Figure 31.8 in the text.) Figure 31.8 2 3. 2 Straight...
Show how to represent the relation in your answer to question 4.23 with two tables.
A Butterworth low-pass discrete filter of order N has been designed to satisfy the following specifications: Sampling period T s =100 sec max = 0.7 dB for 0 f f p = 1000 Hz min = 10 dB for f st...
Consider a LTI system with transfer function (a) Determine if the system is BIBO stable or not. (b) Let the input be x(t) = cos(2t) u(t) find the response y(t)and the corresponding steady-state...
a. What is the purpose of dynamic routing protocols? 12a.) Dynamic ________ protocols allow routers to transmit routing table information to one another. a. Routing b. Transport c. Synchronization d....
How does pipelining improve CPU efficiency? Whats the potential effect on pipelinings efficiency when executing a conditional BRANCH instruction? What techniques can be used to make pipelining more...
a. In MPLS, is selecting the best interface for each packet at each router done when the packet enters the network or before? 17a.) In MPLS, the router interface to send the packet back out will be...
In this problem, we prove a probabilistic (n lg n) lower bound on the running time of any deterministic or randomized comparison sort on n distinct input elements. We begin by examining a...
In this problem, we prove that the average depth of a node in a randomly built binary search tree with n nodes is O(lg n). Although this result is weaker than that of Theorem 12.4, the technique we...
The following problems are about energy and power of signals. (a) Plot the signal x(t) = e t u(t) and determine its energy. What is the power of x(t)? (b) How does the energy of z(t) = e £ t...
Why is it a good practice to divide a project into separate iterations?
What is the difference between visibility and affordance?
Go to the campus placement office to gather some information on companies that recruit information systems graduates. Try to find any information about the companies approaches to developing systems....
1. Given the system goals, requirements, and scope as they are currently understood, is the project schedule reasonable? Why or why not? 2. How well understood are the system requirements at the...
The Community Board of Realtors Multiple Listing Service (MLS) will be a Web-based application with extensions to allow wireless interaction between the agents and their customers using cell phones,...
What are the main steps to follow when solving a problem?
Consider the issue of documenting a system by using only electronic models developed with an integrated development tool, such as Microsoft Visual Studio or Oracle J Developer. The advantages are...
Law enforcement agencies thrive on information. In previous eras, it was sufficient to receive information through the police dispatch radio. Today, much more than voice based information is...
Describe in your own words how an object-oriented program works.
Whats the difference between a world state, a state description, and a search node? Why is this distinction useful?
The Board of Realtors Multiple Listing Service (MLS) system isnt very large in terms of use cases and domain classes. In that respect, the functional requirements are simple and well understood. MLS...
1. Create a System Vision Document. 2. Review all the use cases that you identified in Chapter 2 and then enhance the list to achieve a complete solution based on the narratives that you have read in...
Assume that the Multiple Listing Service that is under development will replace an existing system developed many years ago. The database requirements and design for the old and new systems are very...
In Chapter 3, you identified use cases and considered the domain classes for the State Patrol Ticket Processing System. Review the descriptions in Chapter 3 for the use case Record a traffic ticket....
The traveling salesperson problem (TSP) can be solved with the minimum-spanning tree (MST) heuristic, which estimates the cost of completing a tour, given that a partial tour has already been...
Define in your own words the terms constraint, backtracking search, arc consistency, back jumping, min-conflicts, and cycle cutset.
We introduced Sudoku as a CSP to be solved by search over partial assignments because that is the way people generally undertake solving Sudoku problems. It is also possible, of course, to attack...
On page 68, we said that we would not consider problems with negative path costs. In this exercise, we explore this decision in more depth. a. Suppose that actions can have arbitrarily large negative...
Redo the probability calculation for pits in [1,3] and [2,2], assuming that each square contains a pit with probability 0.01, independent of the other squares. What can you say about the relative...
Consider the Allais paradox described : an agent who prefers B over A (taking the sure thing), and C over D (taking the higher EMV) is not acting rationally, according to utility theory. Do you think...
For the DBN specified in Exercise 15.13 and for the evidence values e 1 = not red eyes, not sleeping in class e 2 = red eyes, not sleeping in class e 3 = red eyes, sleeping in class perform the...
Can the SQL DELETE statement be used with the PopularShows view? Why or why not?
Examine the data in the Veterinary Office ListVersion Two in Figure 1-31 (see page 55), and state assumptions about functional dependencies in that table.
Explain how primary keys and foreign keys are denoted in this book.
Why are the values of surrogate keys normally hidden from users on forms, queries, and reports?
Assume 151 and 214 are unsigned 8-bit integers. Calculate 151 + 214 using saturating arithmetic. The result should be written in decimal. Show your work.
It is quite often useful to consider the effect of some specific propositions in the context of some general background evidence that remains fixed, rather than in the complete absence of...
Equation (14.1) on page 513 defines the joint distribution represented by a Bayesian network in terms of the parameters θ(X i |Parents(X i )). This exercise asks you to derive the...
What is 4365 - 3412 when these values represent unsigned 12-bit octal numbers? The result should be written in octal. Show your work.
For each MIPS instruction, show the value of the opcode (OP), source register (RS), and target register (RT) fields. For the I-type instructions, show the value of the immediate field, and for the...
Consider the network shown in Figure 14.22 (ii), and assume that the two telescopes work identically. N {1, 2, 3} and M 1 , M 2 {0, 1, 2, 3, 4}, with the symbolic CPTs as described in Exercise 14.12....
Translate function f into MIPS assembly language. If you need to use registers $t0 through $t7, use the lower numbered registers first. Assume the function declaration for func is int f(int a, int...
The MetropolisHastings algorithm is a member of the MCMC family; as such, it is designed to generate samples x (eventually) according to target probabilities Ï(x). (Typically we are interested...
Consider the 101 Ã 3 world shown in Figure 17.14(b). In the start state the agent has a choice of two deterministic actions, Up or Down, but in the other states the agent has one deterministic...
You must compile classes written in Java into ____________. a. Bytecode b. Source code c. javadoc statements d. Object code
Let us examine the behavior of the variance update in Equation (15.20). a. Plot the value of Ï 2 t as a function of t, given various values for Ï 2 x and Ï 2 z . b. Show that the...
Garden Glory is a partnership that provides gardening and yard maintenance services to individuals and organizations. Garden Glory is owned by two partners. They employ two office administrators and...
Which of the following data types can store the value 0 using the least amount of memory? a. short b. long c. int d. byte
The equal to relational operator is _____________. a. = b. == c. != d. !!
When you perform arithmetic with values of diverse types, Java _____________. a. Issues an error message b. Implicitly converts the values to a unifying type c. Requires you to explicitly convert the...
You use a _____________ to explicitly override an implicit type. a. Mistake b. Type cast c. Format d. Type set