Login
Remember
Register
User rahuljain1
Wall
Recent activity
All questions
All answers
Ask a Question
Questions by rahuljain1
0
votes
0
answers
Why to use Natural Language Processing?
asked
Oct 22, 2020
in
NLP using Python
#nlp
#why-nlp
0
votes
0
answers
NLP - Natural Language Processing
asked
Oct 22, 2020
in
NLP using Python
#natural-language-processing
#nlp
0
votes
1
answer
Elements of Data Visualization Aurora
asked
Oct 21, 2020
in
Data Visualization Aurora
#elements-data-visualization-aurora
0
votes
1
answer
What is Data Visualization Aurora
asked
Oct 21, 2020
in
Data Visualization Aurora
#data-visualization-aurora
0
votes
1
answer
Why State Needs Management?
asked
Oct 21, 2020
in
JQuery
#state-needs-management
#state-needs
0
votes
1
answer
What is the active route in a website?
asked
Oct 21, 2020
in
Angular 2 Game Of States
#active-route
0
votes
1
answer
What is State?
asked
Oct 21, 2020
in
Angular 2 Game Of States
#what-is-state
0
votes
1
answer
What is NoSQL?
asked
Oct 21, 2020
in
NoSQL Gnosis
#nosql
0
votes
1
answer
Why NoSQL?
asked
Oct 21, 2020
in
NoSQL Gnosis
#why-nosql
#nosql
0
votes
1
answer
What is Secure Code Review?
asked
Oct 21, 2020
in
Secure Code Review
#secure-code-review
#code-review
0
votes
1
answer
Expain The Significance of Secure Code
asked
Oct 21, 2020
in
Secure Code Review
#secure-code
0
votes
1
answer
What is a Threat?
asked
Oct 21, 2020
in
Threat Hunting
#what-is-threat
#threat
0
votes
1
answer
What is Threat Hunting
asked
Oct 21, 2020
in
Threat Hunting
#threat-hunting
0
votes
1
answer
What is Centrality Measures
asked
Oct 21, 2020
in
Stats with Python
#centrality-measures
0
votes
1
answer
What is Descriptive Statistics
asked
Oct 21, 2020
in
Stats with Python
#descriptive-statistics
0
votes
1
answer
What is Stats with Python?
asked
Oct 21, 2020
in
Stats with Python
#stats-with-python
0
votes
0
answers
Kerchkoff’s principle emphasizes that the cryptosystem should be accessible to the adversary without inconvenience.
asked
Oct 21, 2020
in
The Art of Cryptography
#kerchkoffs-principle
0
votes
0
answers
Based on the network security protocols, which of the following algorithms are used to generate message digests?
asked
Oct 21, 2020
in
The Art of Cryptography
#network-security-protocols
0
votes
0
answers
The idea behind “confusion” in cryptography is to hide the relationship between the plaintext and ciphertext.
asked
Oct 21, 2020
in
Testing
#plaintext
#ciphertext
Testing-questions-answers
0
votes
0
answers
The use of hashing algorithms includes ________.
asked
Oct 21, 2020
in
The Art of Cryptography
#hashing-algorithms
0
votes
0
answers
Transmission errors are propagated in the following modes, except __________.
asked
Oct 21, 2020
in
The Art of Cryptography
#transmission-errors
0
votes
0
answers
Which of the following is widely used in cryptography to create a trapdoor function to facilitate the exchange of keys?
asked
Oct 21, 2020
in
The Art of Cryptography
#cryptography
#trapdoor-function
0
votes
0
answers
Which among the following may be addressed using message authentication?
asked
Oct 21, 2020
in
The Art of Cryptography
#message-authentication
0
votes
0
answers
The primary goal of cryptanalysis is to __________.
asked
Oct 21, 2020
in
The Art of Cryptography
#cryptanalysis
+1
vote
0
answers
The Diffie-Hellman algorithm exploits the computational complexity of the __________ problem.
asked
Oct 21, 2020
in
The Art of Cryptography
#diffie-hellman-algorithm
0
votes
0
answers
The number of keys used in Triple DES algorithm is __________.
asked
Oct 21, 2020
in
The Art of Cryptography
#triple-des-algorithm
0
votes
0
answers
X signs a message digitally and sends it to Y. Which of the following is required for Y to verify the authenticity of the message?
asked
Oct 21, 2020
in
The Art of Cryptography
#x-sign
#y-sign
0
votes
0
answers
The avalanche effect is an undesirable property in cryptographic algorithms.
asked
Oct 21, 2020
in
The Art of Cryptography
#avalanche-effect
0
votes
0
answers
Which among the following is the most resistant to frequency analysis?
asked
Oct 21, 2020
in
The Art of Cryptography
#resistant-to-frequency
#frequency-analysis
+1
vote
0
answers
The Diffie-Hellman algorithm is applicable for the exchange of keys between two parties only.
asked
Oct 21, 2020
in
The Art of Cryptography
#diffie-hellman-algorithm
Page:
« prev
1
...
17
18
19
20
21
22
23
24
25
26
27
...
69
next »
...