ANSWERS GRADED A+
What is a key that is used by a sender to encrypt a message using asymmetric
encryption?
Public
What is a key that is used by a recipient to decrypt a message encrypted with
asymmetric encryption?
Private
What is the benefit of asymmetric cryptography?
No need to exchange secret keys
What is the benefit of symmetric cryptography?
Uses the same secret key for both encryption and decryption.
,In a Windows terminal, what does the * do in the Command Line Interface (CLI)
The asterisk is a wildcard character, which can be substituted for zero or more
characters in a string
Which generation of computers used vacuum tubes and all programming was done
by experts in machine language with no OS support or any other system software?
1st generation
Which generation of computers implemented transistors as smaller and faster
switches and also implemented batch processing and multiprogramming using a
batch OS?
2nd generation
Which generation of computers implemented integrated circuits that allowed the
development of microchips, added an interactive multi-user OS and developed
interrupts that allowed the OS to use time-sharing, keyboard and display terminal
support?
, 3rd generation
Which generation of computers implemented very large scale integration (VLSI)
that allowed the placement of a complete microprocessor on a single chip, leading
to the development of personal computers using desktop and laptop OSs? It also
marked the beginning of user-friendly GUI
4th generation
Which generation of computers enabled networking hardware that allowed the
harnessing of the power of multiple computers? These networks gave rise to the
internet. It led to parallel and distributed computing.
5th generation
The invention of transistors marks the transition to the _____ generation of
computer systems.
2nd generation