Sponsored Links


Results 1 to 2 of 2

Thread: CS101 Introduction to Computing Assignment No. 5 Semester Spring 2012

Threaded View

Previous Post Previous Post   Next Post Next Post
  1. #1
    Administrator Vuhelper's Avatar
    Join Date
    Apr 2011
    Posts
    9,578

    18 CS101 Introduction to Computing Assignment No. 5 Semester Spring 2012



    CS101 Introduction to Computing Assignment No. 5 Semester Spring 2012


    Assignment No. 05
    Semester: Spring 2012
    Introduction to Computing-CS101
    Total Marks: 20

    Due Date: 03-07-2012

    Objective: Emerging Trend Assignment

    Instructions:
    Please read the following instructions carefully before solving & submitting assignment:

    o Assignment should be done by your own efforts not copied from net, handouts or books.
    o You should submit your MS Word File via assignment interface at VULMS.
    o Assignment sent via Email will not be replied and accepted/graded in any case.
    o The assignment submitted after due date will not be accepted/graded.
    o If the submitted assignment does not open or file is corrupt then it will not be accepted/graded.
    o If the Student ID is not mentioned in the assignment file then the assignment will not be accepted/graded.

    For any query about the assignment

    GOOD LUCK


    Question No. 1: [10 marks]

    A Comparison table is given below showing different technologies. You have to fill the columns a, b and c respectively by using given instructions:

    Instructions for Column “a” to “c”:
    a) The latest “technology” or “version” name.
    b) You will define portability in “Yes” or “No”.
    c) Is it “H/w” or S/w based?


    Name Column a Column b Column C
    Bluetooth
    Window
    3G
    Modem
    RAM











    Question No. 02 [10 marks]

    The data of few organizations are very sensitive and can create problems if it is compromised. Organizations take different measures to protect their sensitive data. Cryptography is a process of securing our sensitive data on computer networks. Different algorithms are used to protect our data from misuse by other users. Some of the popular algorithms are given below. You are required to read these algorithms and fill the following table after your research.



    SNO Key length Symmetric/asymmetric Year proposed
    RSA
    AES
    Serpent encryption algorithm





    Sponsored Links




    Attached Files Attached Files

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. Replies: 4
    Last Post: 12-13-2014, 12:23 AM
  2. Replies: 1
    Last Post: 04-25-2013, 05:57 PM
  3. Replies: 0
    Last Post: 11-05-2012, 08:38 PM
  4. Replies: 6
    Last Post: 06-25-2012, 09:54 PM
  5. Replies: 3
    Last Post: 06-28-2011, 10:49 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
-: Vuhelp Disclaimer :-
None of the files shown here are hosted or transmitted by this server. The links are provided solely by this site's users. The administrator's or staff of Vuhelp.net cannot be held responsible for what its users post, or any other actions of its users. You may not use this site to distribute or download any material when you do not have the legal rights to do so. It is your own responsibility to adhere to these terms. If you have any doubts about legality of content or you have any suspicions, feel free to contact us.
Online Education | JhelumSoft