1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ivann1987 [24]
4 years ago
14

What is your understanding of the difference between a stream cipher and a block cipher?

Computers and Technology
1 answer:
Mars2501 [29]4 years ago
4 0

Answer:

In a stream cipher, the information is ciphered byte-by-byte.

In a block cipher, the information is ciphered block by block.

Explanation:

Suppose I have the following text:

Buffalo Bills New England Patriots

New York Jets Miami Dolphins

Each line is one byte, so, on the stream cipher, i am going to apply the ciphering algorithm on:

The letter B

The letter u

The letter f

Until

The letter s(of Miami Dolphins)

Now for the block cipher, i am saying that each line is a block, so the algorithm is going to be applied.

First on: Buffalo Bills New England Patriots

Then: New York Jets Miami Dolphins

You might be interested in
// This pseudocode is intended to describe
ddd [48]

Applying given information of a computational language in pseudocode, a code may be written to represent computing the price of an item on sale for 10% off.

<h3>What is a pseudocode?</h3>

A pseudocode can be considered as a depiction of the steps represented in an algorithm, usually in plain (natural) language.

<em>//This </em><em>pseudocode </em><em>is intended to describe</em>

<em>//computing the </em><em>price </em><em>of an </em><em>item </em><em>on </em><em>sale </em><em>for 10% off</em>

<em>START</em>

<em>  input origPrice</em>

<em>  </em><em>discount </em><em>= origPrice * 0.10</em>

<em>  </em><em>finalPrice </em><em>= origPrice - discount</em>

<em>  output finalPrice</em>

<em>STOP</em>

<em>//This pseudocode is intended to </em><em>compute </em><em>the number</em>

<em>//of miles per </em><em>gallon </em><em>you get with your car.</em>

<em>START</em>

<em>  input milesTraveled</em>

<em>  input gallonsOfGasUsed</em>

<em>  milesPerGallon = milesTraveled / gallonsOfGasUsed</em>

<em>     //milesPerGallon is computed using </em><em>division</em>

<em>  output milesPerGallon</em>

<em>     //miles is misspelled, and the P in </em><em>milesPerGallon </em><em>should be uppercase</em>

<em>STOP</em>

<em>  //</em><em>Program </em><em>should end with stop</em>

<em>//This pseudocode is intended to describe</em>

<em>//computing the </em><em>per day cost </em><em>of your rent</em>

<em>//in a 30-day month</em>

<em>START</em>

<em>  input rent</em>

<em>  costPerDay = rent / 30</em>

<em>     // Comment indicates 31-day month</em>

<em>  output costPerDay</em>

<em>     // output should be </em><em>costPerDay</em>

<em>STOP</em>

Learn more about the pseudocode here :

brainly.com/question/13208346

#SPJ1

3 0
1 year ago
What specific record type is found in every zone and contains information that identifies the server primarily responsible for t
ValentinkaMS [17]

The SOA is the specific record type found in every zone and contains information that identifies the sever primarily responsible for the zone as well as some operational properties for the zone.

Explanation:

The Start of Authority Records (SOA) has the following information they are

Serial Number: This number is used to find when zonal information should be replicated.

Responsible person: The Email address of a person is responsible for managing the zone.

Refresh Interval: It specifies how often a secondary DNS server tries to renew its zone information.

Retry Interval: It specifies the amount of time a secondary server waits before retrying the zone information has failed.

Expires After: IT specifies the amount of time before a secondary server considers its zone data if it can't contact with the primary server.

Minimum TTL: It specifies the default TTL value for a zone data when a TTL is not supplied.

4 0
3 years ago
A database planner names a field “Organic ingredients_3”. Why would this name Create possible problems in programming?
o-na [289]

Answer:

I think the answer is 2.

hope it will help you

4 0
3 years ago
Read 2 more answers
For each problem listed below, use the drop-down menu to select the field of the professional who can help solve the issue.
Lapatulllka [165]

Answer:

An employee is having trouble opening a file on a computer.

  • → ✔ <u>information services and support</u>

The president of a company wants to give the company website a fresh new look.

  • → ✔ <u>interactive media</u>

An employee wants to work from home but can’t connect to the network from there.

  • → ✔ <u>network systems administration</u>

The vice president of sales would like help designing a new software program to keep track of sales.

  • → ✔<u> programming and software development</u>

<u>OAmalOHopeO</u>

5 0
3 years ago
Read 2 more answers
Question 2Write a MIPS assembly implementation of the following C/C++ code. Assume small, unsigned integer arithmetic (no range
Licemer1 [7]

Answer:

Please kindly check explainations for the code.

Explanation:

lw $t1, Num1

lw $t2, Num2

lw $t3, Num3

blt $t1, $t2, if

beq $t1, $t2, elseif

else:

add $t0, $t3, 5

sw $t0, Result

endif:

#.....other statements after if-elseif-else

if:

sw $t1, Result

b endif

elseif:

ble $t2, $t3, if2

or $t0, $t1, $t3

sw $t0, Result

b endif

if2:

and $t0, $t2, $t3

sw $t0, Result

b endif

Go to attachment for the onscreen code.

4 0
4 years ago
Other questions:
  • Following a company on likedin is most similar to
    8·1 answer
  • What is the IEEE standard for the Wi-Fi Protected Access 2 (WPA2) security protocol?
    6·1 answer
  • Dinah is using an IDE to write, modify, and save code. Which tool should she use?
    11·2 answers
  • What is the Default path for SYSVOL?
    14·1 answer
  • The___provides access to the internet; may also be internal
    11·1 answer
  • What happens when a computer gets a virus?
    6·2 answers
  • In a cron table entry, what field specifies the absolute pathname to a command that is to be executed?
    10·1 answer
  • Compare mini and mainframe computer in terms of speed,memory and storage​
    15·1 answer
  • Pls say correct guyz pls pls pls
    7·1 answer
  • What type of malicious software technology is used to download and install software without the user's interaction?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!