csp final

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of these is not dependent on public key encryption for its security?

A teenager looks up information on a medical website in incognito mode, and won't have to see advertisements related to that medical condition in the future.

Leanne decides to use the Caesar Cipher encryption scheme to send a secret message to her classmate. Her process: Leanne shares the key (the number 13) with her classmate. Using the key, Leanne turns the message "Underground" into "Haqretebhaq". Leanne sends a letter with "Haqretebhaq" to her classmate. Using the key, her classmate turns the message "Haqretebhaq" back into "Underground". Which of the steps could be labeled the "decryption" step?

Step 4

Assuming US copyright laws, is Huang allowed to use audio recordings of retro songs for his music videos?

He can use the audio recordings if they are explicitly licensed for re-use, like with a Creative Commons license, and he follows the conditions of that license.

A software developer is looking for code that they can use to calculate the distance between two points on the Earth's surface. They find a library online called point2point which includes the following license file: Copyright 2019 Nikita Choi Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. What is an implication of this library's open source license?

The software engineer is legally allowed to use the code in a software application that they sell to customers.

The code relies on the built-in constant PI. After running the code, centerY stores 14.120226551112957. Their colleague checks the result by running the same calculation on their own computer. Their program results in a centerY of 14.120226551112925. The two values are very close, but not quite the same. Which of these is the most likely explanation for the difference?

"The two computers represent the constant PI with a different level of precision, due to their rounding strategy or size limitations."

That code relies on a built-in procedure SQRT() that calculates the square root of a number. After running the code, area stores 15.588457268119894. Their classmates runs the same calculation on their own computer. Their program results in an area of 15.58845726804. The two values are very close, but not quite the same. Which of these is the most likely explanation for the difference?

"The two computers represent the result of SQRT(3) with a different level of precision, due to their rounding strategy or size limitations."

Consider a computer that uses 5 bits to represent positive and negative integers, using 1 bit for the sign and 4 bits for the actual value. Which of the following operations would result in integer overflow?

1+15 8×2

Consider a computer that uses 5 bits to represent positive integers and uses all 5 bits to represent the value. Which of the following operations would result in integer overflow?

18+14

Which of the following situations is made possible thanks to public key encryption?

A customer enters their credit card number on a website, and the server securely receives the number without the possibility of cybercriminals seeing the credit card number.

For a long time, mathematicians weren't sure that asymmetric encryption was possible. Fortunately, cryptographers discovered the necessary mathematical innovation in the 1970s and invented public key encryption. If public key encryption was never invented, what wouldn't be possible today?

A customer logging into their bank website, with their password and secure code, without the risk of cybercriminals stealing their login information.

Which of the following best describes symmetric encryption?

An encryption scheme where the sender and receiver use the same shared key for encrypting and decrypting data.

A scientist is researching the effects of magnesium supplements on depression, and is considering how to publish their research. They would love for their research to be read by: researchers at universities doctors all around the world mental health counselors anyone with a history of depression Which decision would best support the scientist's goals?

An online open access journal

A team of researchers is studying the rate of glaciers melting in the Himalayas over the last three decades and discovers a recent increase in the melting rate. They would like their discovery to reach a wide audience, including other researchers, journalists, politicians, and laypeople interested in climate change. They particularly want to make sure the research is seen by people who live around the Himalayas. Where can they publish their research to reach that wide audience?

An open access journal about climate change

Computer A is sending data securely to Computer B using public key encryption. In order for Computer A to encrypt the data, they need to use information from Computer B in a mathematical operation. What information from Computer B is used in that operation?

Computer B's public key

Computer A wants to send data securely to Computer B using public key encryption. What information do they need from Computer B before Computer A can send the data?

Computer B's public key

Which of the following is the best description of the process of decryption?

Decoding data to reveal the original message

Felipe is a videographer that enjoys recording videos of local birds in his free time. Felipe is a big fan of remix culture, so he wants other film-makers to be able to use his recordings but only if they allow their films to be remixed by others. What approach will allow other film-makers to reuse his videos only if they allow reuse of their own remix?

Felipe should write "This work is licensed under a Creative Commons Attribution ShareAlike license" under each recording.

Eino is composing a short film about climate change which he plans to display at a science museum and on his public YouTube channel. He searches a video streaming website and finds a video clip with a time lapse of melting ice caps that would be perfect for the film. Assuming US copyright laws, is Eino allowed to use the video clip for his film?

He can use the video clip if it is explicitly licensed for re-use, like with a Creative Commons license, and he follows the conditions of that license.

In the classic arcade game Donkey Kong, the code calculates the time allowed per level by multiplying the current level by 10 and adding 40. On level 22, that calculated time is 260. However, the game displays a time of 4 instead of 260. It is impossible for anyone to complete the level in just 4 seconds, so no player ever makes it past level 22. What is the most likely cause of the level 22 bug?

Integer overflow error

Then the viral hit "Gangnam Style" received more than 2,147,483,647 views (more than any other video at that time), and YouTube could not display an accurate number of views until they changed their code. What is the best explanation of what happened?

Integer overflow error

Rin doesn't want her parents to read her letters to her sister, so she uses a Vigenère cipher to make the letters secret. Her process: Rin shares the key ("BANANA") with her sister. Using the key, Rin turns the message "Ice cream time" into "Jcr ceebm gize". Rin sends a letter with "Jcr ceebm gize" to her sister. Using the key, her sister turns the message "Jcr ceebm gize" back into "Ice cream time". Which of these lists show an appropriate label for each step?

Key-sharing Encryption Communication Decryption

This short program displays the winning result in the Greenpeace whale naming contest: DISPLAY ("Mister") DISPLAY ("Splashy") DISPLAY ("Pants") Part 1: How many statements are in the above program? Part 2: What does the program output?

Mister Splashy Pants

An environmental engineer is researching a new kind of biodegradable plastic and finds exciting results for the rate of decomposition. The engineer wants to make sure that their findings will be available to a diverse audience. Their hope is that journalists, professionals from other industries, and future environmental engineers will be able to read them. Which type of publication would best support the engineer's goals?

Open access journal about environmental engineering

A startup is developing a new web browser with a focus on accessibility for visually impaired users. The startup founder is considering the benefits and drawbacks of releasing the code online under an open source license. What would be a consequence of releasing the code with an open source license?

Other companies and individuals would be able to view and use the code according to the conditions of the open source license.

Karla is making a website about the fluffiest dogs. She discovers this photo of a dog on a social media account: Assuming US copyright laws, is Karla allowed to use the photo on her website?

She can use the photo if it is explicitly licensed for re-use, like with a Creative Commons license, and she follows the conditions of that license.

A photographer puts their photos online and encourages their fans to make memes with the photos by overlaying funny captions. What approach will allow fans to legally make memes of the photos?

The photographer should write "This work is licensed under a Creative Commons Attribution license."

When a computer wants to use public key cryptography to send data securely to another computer, those computers need to start a multi-step exchange of information. What is the first information exchanged?

The sending computer sends along metadata about the data, like its length and content type.

Ms. O'Keefe is a high school computer science teacher that is developing robotics projects for her class and publishing them online. She wants other teachers to be able to use and adapt the projects for their classrooms, but she doesn't want companies to be able to sell the project plans for a profit. What approach will allow other teachers to use the projects but not allow companies to make a profit off them?

The teacher should write "This work is licensed under a Creative Commons Attribution NonCommercial license."

In symmetric encryption, what key does the receiver need in order to decrypt data from a sender?

They need the key that was used for encrypting the data.

They're surprised to see that final stores the value 0.49999999999999994 instead of 0.5. What is the best explanation for that result?

Thus, the best explanation is that floating-point arithmetic resulted in a round-off error.

They're surprised to see that total stores the value 11.639999999999999 instead of 11.64. What is the best explanation for that result?

Thus, the best explanation is that floating-point arithmetic resulted in a round-off error.

In symmetric encryption, how many keys are needed to encrypt the data between a sender to a receiver?

Two keys: one for the sender to encrypt/decrypt and one for the receiver to encrypt/decrypt


Conjuntos de estudio relacionados

Chapter 9 Storms and Forecasting

View Set

Chapter 40: Care of Patients with Hematologic Problems

View Set

Introduction to fractional reserve banking/Required reserves, excess reserves, and bank behavior/The money multiplier and the expansion of the money supply

View Set

Animation is the representation of motion in graphics Advance computer system This diagram has the parts of a Gaming Computer! One or two small things added to a normal PC Computer based instruction refers to applications that train or teach using the com

View Set

Principles of Conservation Biology Set

View Set

4A- 3 - U.S. Anti-Discrimination Laws

View Set