View more random threads:
- PHY101 Physics Assignment No.1 Fall Semester 2012
- ENG101 English Comprehension Assignment No. 4 Semester...
- MTH401 First Assignment idea solution October, fall 2012
- CS101 Introduction to Computing Assignment No.03 Spring...
- IT430 Assignment No 4 Spring 2012 solution virtual...
- CS605 Software Engineering-II VU Current Assignment No. 4...
- CS610 First Assignment idea solution October, fall 2012
- CS101 Introduction to Computing Assignment No. 2 Solution...
- MTH101 Calculus And Analytical Geometry Assignment No.2...
- CS201 Introduction to Programming Assignment No.1 Solution...
CS101 Introduction to Computing Assignment No. 5 Semester Spring 2012
Assignment No. 05
Semester: Spring 2012
Introduction to Computing-CS101
Total Marks: 20
Due Date: 03-07-2012
Objective: Emerging Trend Assignment
Instructions:
Please read the following instructions carefully before solving & submitting assignment:
o Assignment should be done by your own efforts not copied from net, handouts or books.
o You should submit your MS Word File via assignment interface at VULMS.
o Assignment sent via Email will not be replied and accepted/graded in any case.
o The assignment submitted after due date will not be accepted/graded.
o If the submitted assignment does not open or file is corrupt then it will not be accepted/graded.
o If the Student ID is not mentioned in the assignment file then the assignment will not be accepted/graded.
For any query about the assignment
GOOD LUCK
Question No. 1: [10 marks]
A Comparison table is given below showing different technologies. You have to fill the columns a, b and c respectively by using given instructions:
Instructions for Column “a” to “c”:
a) The latest “technology” or “version” name.
b) You will define portability in “Yes” or “No”.
c) Is it “H/w” or S/w based?
Name Column a Column b Column C
Bluetooth
Window
3G
Modem
RAM
Question No. 02 [10 marks]
The data of few organizations are very sensitive and can create problems if it is compromised. Organizations take different measures to protect their sensitive data. Cryptography is a process of securing our sensitive data on computer networks. Different algorithms are used to protect our data from misuse by other users. Some of the popular algorithms are given below. You are required to read these algorithms and fill the following table after your research.
SNO Key length Symmetric/asymmetric Year proposed
RSA
AES
Serpent encryption algorithm
Sponsored Links