Question: Please answer Part 1 - ASAP. PART 1: Multiple Choices questions [20 Marks] This part consists of 10 questions carrying a WEIGHT OF 2 marks
Please answer Part 1 - ASAP.

PART 1: Multiple Choices questions [20 Marks] This part consists of 10 questions carrying a WEIGHT OF 2 marks for each. Answer the questions by choosing the most correct choice. You should dedicate approximately 15 minutes for this part. 1- The equivalent decimal number of the unsigned binary number 11001 is: a-9 C. 25, b. +9 d. None of the above. 2- Which of the below statements is a feature of the Random-Access Memory? a. It is volatile c. Accessing any location in RAM takes the b. It is non-volatile same amount of time. d. Both a and c. 3- What is the output of the Python statement: print{3+8/4%29? | LA Cbbi Ylseng a. 7.0 C. 5 b. 3.0 5.0 20 DEC 2021 4- What is the output of print(a[5:10]) if a = "Hello, AOUers!"? a. AOU AOU b. AQUE d. AQUer 5- Which of the following statements is incorrect? a. In Python, Lists are written as comma-separated items within squared brackets. b. Compilers translate all the source code in one go. c. The operating system is not responsible for the management of memory. d. Key stretching increases the required time amount for even the fastest CPUs to create a hash. 6- To open and read text file that is named StdRec.txt that exists in folder D:\python. Which of the following statements could be used to read this file, given that the Python program is NOT located under the same folder: a. file = open('StdRec.txt', 'Y') c. file = open("Studentinfo.txt') b. file = open('D:\python Std Rec.txt', 'r') d. file = open('D:\python Std Rec.txt', '') 7- Decryption is: a. The process of converting plaintext to ciphertext. b. The process of reverting ciphertext to plaintext. C. The algorithm used to turn plaintext into ciphertext and restore ciphertext to plaintext. d. None of the given choices. 8- Which of the following statements is correct? a. In cloud architecture, we have three independent layers: Application, Platform, and Infrastructure b. NFC offers protection against eavesdropping. c. It is always possible to transform the hash back into the original data. d. Each platter of a hard disk is divided into several concentric Tracks. 9. Hashing alone can: a. authenticate the creator or sender of data. b. confirm data has not been changed since the hash was generated. c. guarantee the confidentiality of data. d. confirm that data has never been changed. 10-Which of the following Islare correct? a. ALU: arithmetic and logic unit b. SIM subscriber identity memory c. GPU: Global processing unit d. a and b
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
