Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

FOUNDATIONS OF COMPUTER SCIENCE FINAL 220 QUESTIONS WITH VERIFIED ANSWERS 2025/2026,100%CORRECT

Beoordeling
-
Verkocht
-
Pagina's
32
Cijfer
A+
Geüpload op
24-01-2026
Geschreven in
2025/2026

FOUNDATIONS OF COMPUTER SCIENCE FINAL 220 QUESTIONS WITH VERIFIED ANSWERS 2025/2026 ordinary text - CORRECT ANSWER plaintext "unreadable" encrypted text - CORRECT ANSWER ciphertext plaintext to ciphertext - CORRECT ANSWER encryption ciphertext to plaintext - CORRECT ANSWER decryption an algorithm used to encrypt and decrypt text - CORRECT ANSWER cipher a set of particular parameters that guide the cipher algorithm - CORRECT ANSWER key 1. Substitution cipher 2. Transposition cipher - CORRECT ANSWER 2 big types of ciphers replacing one character with another not very secure b/c easy to break by figuring out "e" then "the" etc. - CORRECT ANSWER Substitution cipher type of substitution cipher used between Caesar and his generals done by shifting a certain number of positions up/down the alphabet spaces can be omitted or represented by character(s) punctuation could be included easy to crack - CORRECT ANSWER Caesar cipher rearranging the order of existing characters easy to crack but not as easy as substitution ciphers - CORRECT ANSWER Transposition cipher encryption = characters laid out in grid and then moved into a string of letters by following a particular route around the grid decryption = string of letters written on grid via the reversal of the route and then read - CORRECT ANSWER route cipher the process of "breaking" an encryption figuring out the plaintext without knowing the cipher or key - CORRECT ANSWER cryptanalysis

Meer zien Lees minder
Instelling
FOUNDATIONS OF COMPUTER SCIENCE
Vak
FOUNDATIONS OF COMPUTER SCIENCE

Voorbeeld van de inhoud

FOUNDATIONS OF COMPUTER SCIENCE FINAL 220
QUESTIONS WITH VERIFIED ANSWERS 2025/2026


ordinary text - CORRECT ANSWER plaintext


"unreadable" encrypted text - CORRECT ANSWER ciphertext


plaintext to ciphertext - CORRECT ANSWER encryption


ciphertext to plaintext - CORRECT ANSWER decryption


an algorithm used to encrypt and decrypt text - CORRECT ANSWER cipher


a set of particular parameters that guide the cipher algorithm - CORRECT ANSWER
key


1. Substitution cipher
2. Transposition cipher - CORRECT ANSWER 2 big types of ciphers


replacing one character with another
not very secure b/c easy to break by figuring out "e" then "the" etc. - CORRECT
ANSWER Substitution cipher


type of substitution cipher used between Caesar and his generals

,done by shifting a certain number of positions up/down the alphabet
spaces can be omitted or represented by character(s)
punctuation could be included
easy to crack - CORRECT ANSWER Caesar cipher


rearranging the order of existing characters
easy to crack but not as easy as substitution ciphers - CORRECT ANSWER
Transposition cipher


encryption = characters laid out in grid and then moved into a string of letters by
following a particular route around the grid
decryption = string of letters written on grid via the reversal of the route and then
read - CORRECT ANSWER route cipher


the process of "breaking" an encryption
figuring out the plaintext without knowing the cipher or key - CORRECT ANSWER
cryptanalysis


they've tried/are trying (idk) to force citizens to hand over deciphering keys
they also want "back door" access to certain secure sites which poses a risk to the
information on those sites as they would then be easier to hack - CORRECT
ANSWER FBI issues


father of computers
worked for Britain's code-breaking center

,during WWII, he was a key player in breaking the German military's code (known
as Enigma) - CORRECT ANSWER Turing


(idk if this is aka RSA or if RSA is an example)
2 mathematically related public and private keys
most secure be extremely difficult to decrypt - CORRECT ANSWER public-key
cryptography


an asymmetric code created with a trapdoor function which makes it easy to
encrypt messages but difficult to decrypt them - CORRECT ANSWER RSA algorithm
definition


cod mod n = m - CORRECT ANSWER RSA private key


2+ numbers that share no factors other than 1 - CORRECT ANSWER coprime


Φ
created by Euler
Φ(n) would be all the numbers less than n which are also coprime (with n, I
think...idk if it means coprime with each other)
{ I wrote if n > 7, Φ = usually prime - 1, but if what I meant } - CORRECT ANSWER
totient


the quotient left over in a closed number system

, ex: time = on a closed system of 12 hour cycles, it's 10 AM and I want to know
what time it'll be in 4 hours 10 + 4 = 14 ==> 14/12 has a remainder of 2 so it'll be 2
o'clock; 14 mod 12 = 2 - CORRECT ANSWER modulo operation


usually begin with 192.168. - CORRECT ANSWER home network IP addresses


making it look like something came from some other device - CORRECT ANSWER
spoofing


didn't exist b/c it was only used by a small number of military branches and
educational institutions so why would they need encryption - CORRECT ANSWER
ARPAnet encryption


used in written messages in the US military during way as a way of sending
messages without encryption - CORRECT ANSWER Navajo


a collection of computing devices connected to share info + resources - CORRECT
ANSWER computer network


connected via radio waves to a wireless access point (which is at least one node in
the network which allows others to access one another wirelessly) - CORRECT
ANSWER wireless


any device in the network - CORRECT ANSWER node/host


speed; data transfer rate w/in network - CORRECT ANSWER bandwidth

Geschreven voor

Instelling
FOUNDATIONS OF COMPUTER SCIENCE
Vak
FOUNDATIONS OF COMPUTER SCIENCE

Documentinformatie

Geüpload op
24 januari 2026
Aantal pagina's
32
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

€15,52
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
paulhans Chamberlain College Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
792
Lid sinds
6 jaar
Aantal volgers
641
Documenten
7409
Laatst verkocht
5 dagen geleden
SECUREGRADE

Professional Academic Support – A+ Standard: I provide high-quality assistance for assignments, exams, and homework across all levels of complexity, delivering well-researched, structured, and original work with timely and reliable service, all aligned to meet academic standards and support top-grade (A+) performance; contact me for dependable and professional academic support.

3,5

135 beoordelingen

5
49
4
30
3
23
2
11
1
22

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen