InterviewSolution
Bookmark
Saved Bookmarks
→
ISRO
→
Isro Cs 2007 in Isro
→
An example of poly-alphabetic substitution is(A) P...
1.
An example of poly-alphabetic substitution is(A) P-box(B) S-box(C) Caesar cipher(D) Vigenere cipher
Answer»
Show Answer
Discussion
No Comment Found
Post Comment
Related InterviewSolutions
If the page size in a 32-bit machine is 4K bytes then the size of page table is(A) 1 M bytes(B) 2 M bytes(C) 4 M bytes(D) 4 K bytes
What is the meaning of RD’signal in Intel 8151 A?(A) Read (when it is low)(B) Read (when it is high)(C) Write (when it is low)(D) Read and Write (when it is high)
A system is having 8 M bytes of video memory for bit-mapped graphics with 64-bit colour. What is the maximum resolution it can support?(A) 800 x 600(B) 1024 x 768(C) 1280 x 1024(D) 1920 x 1440
Which of the following statements about peephole optimization is False?(A) It is applied to a small part of the code(B) It can be used to optimize intermediate code(C) To get the best out of this, it has to be applied repeatedly(D) It can be applied to the portion of the code that is not contiguous
In Java, after executing the following code what are the values of x, y and z?int x,y=10; z=12;x=y++ + z++;(A) x=22, y=10, z=12(B) x=24, y=10, z=12(C) x=24, y=11, z=13(D) x=22, y=11, z=13
The broadcast address for IP network 172.16.0.0 with subnet mask 255.255.0.0 is(A) 172.16.0.255(B) 172.16.255.255(C) 255.255.255.255(D) 172.255.255.255
How many edges are there in a forest with v vertices and k components?(A) (v + 1) − k(B) (v + 1)/2 − k(C) v − k(D) v + k
An example of poly-alphabetic substitution is(A) P-box(B) S-box(C) Caesar cipher(D) Vigenere cipher
A context model of a software system can be shown by drawing a(A) LEVEL-0 DFD(B) LEVEL-1 DFD(C) LEVEL-2 DFD(D) LEVEL-3 DFD
Which RAID level gives block level striping with double distributed parity?(A) RAID 10(B) RAID 2(C) RAID 6(D) RAID 5
Reply to Comment
×
Name
*
Email
*
Comment
*
Submit Reply