Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

FOUNDATIONS OF COMPUTER SCIENCE FINAL 220 QUESTIONS WITH VERIFIED ANSWERS 2025/2026,100%CORRECT

Rating
-
Sold
-
Pages
32
Grade
A+
Uploaded on
24-01-2026
Written in
2025/2026

FOUNDATIONS OF COMPUTER SCIENCE FINAL 220 QUESTIONS WITH VERIFIED ANSWERS 2025/2026 ordinary text - CORRECT ANSWER plaintext "unreadable" encrypted text - CORRECT ANSWER ciphertext plaintext to ciphertext - CORRECT ANSWER encryption ciphertext to plaintext - CORRECT ANSWER decryption an algorithm used to encrypt and decrypt text - CORRECT ANSWER cipher a set of particular parameters that guide the cipher algorithm - CORRECT ANSWER key 1. Substitution cipher 2. Transposition cipher - CORRECT ANSWER 2 big types of ciphers replacing one character with another not very secure b/c easy to break by figuring out "e" then "the" etc. - CORRECT ANSWER Substitution cipher type of substitution cipher used between Caesar and his generals done by shifting a certain number of positions up/down the alphabet spaces can be omitted or represented by character(s) punctuation could be included easy to crack - CORRECT ANSWER Caesar cipher rearranging the order of existing characters easy to crack but not as easy as substitution ciphers - CORRECT ANSWER Transposition cipher encryption = characters laid out in grid and then moved into a string of letters by following a particular route around the grid decryption = string of letters written on grid via the reversal of the route and then read - CORRECT ANSWER route cipher the process of "breaking" an encryption figuring out the plaintext without knowing the cipher or key - CORRECT ANSWER cryptanalysis

Show more Read less
Institution
FOUNDATIONS OF COMPUTER SCIENCE
Course
FOUNDATIONS OF COMPUTER SCIENCE

Content preview

FOUNDATIONS OF COMPUTER SCIENCE FINAL 220
QUESTIONS WITH VERIFIED ANSWERS 2025/2026


ordinary text - CORRECT ANSWER plaintext


"unreadable" encrypted text - CORRECT ANSWER ciphertext


plaintext to ciphertext - CORRECT ANSWER encryption


ciphertext to plaintext - CORRECT ANSWER decryption


an algorithm used to encrypt and decrypt text - CORRECT ANSWER cipher


a set of particular parameters that guide the cipher algorithm - CORRECT ANSWER
key


1. Substitution cipher
2. Transposition cipher - CORRECT ANSWER 2 big types of ciphers


replacing one character with another
not very secure b/c easy to break by figuring out "e" then "the" etc. - CORRECT
ANSWER Substitution cipher


type of substitution cipher used between Caesar and his generals

,done by shifting a certain number of positions up/down the alphabet
spaces can be omitted or represented by character(s)
punctuation could be included
easy to crack - CORRECT ANSWER Caesar cipher


rearranging the order of existing characters
easy to crack but not as easy as substitution ciphers - CORRECT ANSWER
Transposition cipher


encryption = characters laid out in grid and then moved into a string of letters by
following a particular route around the grid
decryption = string of letters written on grid via the reversal of the route and then
read - CORRECT ANSWER route cipher


the process of "breaking" an encryption
figuring out the plaintext without knowing the cipher or key - CORRECT ANSWER
cryptanalysis


they've tried/are trying (idk) to force citizens to hand over deciphering keys
they also want "back door" access to certain secure sites which poses a risk to the
information on those sites as they would then be easier to hack - CORRECT
ANSWER FBI issues


father of computers
worked for Britain's code-breaking center

,during WWII, he was a key player in breaking the German military's code (known
as Enigma) - CORRECT ANSWER Turing


(idk if this is aka RSA or if RSA is an example)
2 mathematically related public and private keys
most secure be extremely difficult to decrypt - CORRECT ANSWER public-key
cryptography


an asymmetric code created with a trapdoor function which makes it easy to
encrypt messages but difficult to decrypt them - CORRECT ANSWER RSA algorithm
definition


cod mod n = m - CORRECT ANSWER RSA private key


2+ numbers that share no factors other than 1 - CORRECT ANSWER coprime


Φ
created by Euler
Φ(n) would be all the numbers less than n which are also coprime (with n, I
think...idk if it means coprime with each other)
{ I wrote if n > 7, Φ = usually prime - 1, but if what I meant } - CORRECT ANSWER
totient


the quotient left over in a closed number system

, ex: time = on a closed system of 12 hour cycles, it's 10 AM and I want to know
what time it'll be in 4 hours 10 + 4 = 14 ==> 14/12 has a remainder of 2 so it'll be 2
o'clock; 14 mod 12 = 2 - CORRECT ANSWER modulo operation


usually begin with 192.168. - CORRECT ANSWER home network IP addresses


making it look like something came from some other device - CORRECT ANSWER
spoofing


didn't exist b/c it was only used by a small number of military branches and
educational institutions so why would they need encryption - CORRECT ANSWER
ARPAnet encryption


used in written messages in the US military during way as a way of sending
messages without encryption - CORRECT ANSWER Navajo


a collection of computing devices connected to share info + resources - CORRECT
ANSWER computer network


connected via radio waves to a wireless access point (which is at least one node in
the network which allows others to access one another wirelessly) - CORRECT
ANSWER wireless


any device in the network - CORRECT ANSWER node/host


speed; data transfer rate w/in network - CORRECT ANSWER bandwidth

Written for

Institution
FOUNDATIONS OF COMPUTER SCIENCE
Course
FOUNDATIONS OF COMPUTER SCIENCE

Document information

Uploaded on
January 24, 2026
Number of pages
32
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$17.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
paulhans Chamberlain College Of Nursing
Follow You need to be logged in order to follow users or courses
Sold
792
Member since
6 year
Number of followers
641
Documents
7407
Last sold
4 days ago
SECUREGRADE

Professional Academic Support – A+ Standard: I provide high-quality assistance for assignments, exams, and homework across all levels of complexity, delivering well-researched, structured, and original work with timely and reliable service, all aligned to meet academic standards and support top-grade (A+) performance; contact me for dependable and professional academic support.

3.5

135 reviews

5
49
4
30
3
23
2
11
1
22

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions