Bissoy
Login
Get Advice on Live Video Call
Earn $ Cash $ with
consultations on Bissoy App
The Chi function is defined as ← a XOR ( aXOR 1) AND a) b) a ← a AND ( aXOR 1) AND a) c) a ← a AND ( a XOR a) d) a ← a XOR ( a AND a)
A
a ← a XOR ( aXOR 1) AND a)
B
x
C
x
D
x
Correct Answer:
a ← a XOR ( aXOR 1) AND a)
The Chi function is defined as a ← a XOR ( aXOR 1) AND a).
In AES, to make the s-box, we apply the transformation b’_i = b_i XOR b_(i+4) XOR b(i+5) XOR b_(i+6) XOR b_(i+7) XOR c_i What is c_i in this transformation?
A
c_i is the ith bit of byte c with value 0x63
B
c_i is the ith bit of byte c with value 0x25
C
c_i is the ith bit of byte c with value 0x8F
D
c_i is the ith bit of byte c with value 0x8A
In AES, to make the s-box, we apply the transformation – b’i = bi XOR b(i+4) XOR b(i+5) XOR b(i+6) XOR b(i+7) XOR ci What is ci in this transformation?
A
ci is the ith bit of byte c with value 0x63
B
ci is the ith bit of byte c with value 0x25
C
ci is the ith bit of byte c with value 0x8F
D
ci is the ith bit of byte c with value 0x8A
Which of the following statements are true? i) practical application of XOR linked lists are in environments with limited space requirements, such as embedded devices. ii)xor lists are not suitable because most garbage collectors will fail to work properly with classes or structures that don’t contain literal pointers iii)in order to calculate the address of the next node you need to remember the address of the previous node iv)xor lists are much efficient than single, doubly linked lists and arrays
A
i, ii, iii, iv
B
i, ii, iii
C
i, ii
D
i
The inverse s-box permutation follows, b’_i = b_(i+2) XOR b(i+5) XOR b_(i+7) XOR d_i Here d_i is
A
d_i is the ith bit of a byte ‘d’ whose hex value is 0x15
B
d_i is the ith bit of a byte ‘d’ whose hex value is 0x05
C
d_i is the ith bit of a byte ‘d’ whose hex value is 0x25
D
d_i is the ith bit of a byte ‘d’ whose hex value is 0x51
The inverse s-box permutation follows, b’i = b(i+2) XOR b(i+5) XOR b(i+7) XOR di Here di is –
A
di is the ith bit of a byte ‘d’ whose hex value is 0x15
B
di is the ith bit of a byte ‘d’ whose hex value is 0x05
C
di is the ith bit of a byte ‘d’ whose hex value is 0x25
D
di is the ith bit of a byte ‘d’ whose hex value is 0x51
The dependences of the magnetic susceptibility $$\left( \chi \right)$$ of a material with temperature (T) can be represented by $$\chi \propto \frac{1}{{T - \theta }},$$ where θ is the Curie-Weiss temperature. The plot of magnetic susceptibility versus temperature is sketched in the figure, as curves P, Q and R with curve Q having θ = 0. Which one of the following statements is correct?
A
Curve R represents a paramagnet and Q a ferromagnetic field
B
Curve Q represents a ferromagnet and P an antiferromagnet
C
Curve R represents an antiferromagnet and Q a paramagnet
D
Curve R represents an antiferromagnet and Q a ferromagnet
The $${\chi ^2}$$ (chi-square) test for goodness of fit and independence of attributes come under
A
Parametric tests
B
Non-pararnetric test
C
Both A and B
D
Not classified
A program will have one function prototype for each function defined in the programmer-defined section of the program. (Assume that the programmer-defined section is located below the main function.)
A
True
B
False
In SHA-3, which function does the operation L<- C XOR L XOR ROT(C,1) represent?
A
<- C XOR L XOR ROT(C,1) represent? ] Theta
B
2,3
C
2,3
D
2,3
একটি XOR লজিক গেট নিম্নলিখিত কোন লজিক গেট/ গেটগুলোর সমবায়ে গঠিত হতে পারে? (An XOR logic gate can be constructed from the combination of which of the following logic gate/gates?)
A
OR gate
B
AND gate, OR gate, and NOT gate
C
AND gate and NOT gate
D
OR gate and NOT gate