adplus-dvertising
frame-decoration

Question

A message "COMPUTERNETWORK" encrypted (ignore quotes) using columnar transposition cipher with a key "LAYER". The encrypted message is :

a.

CTTOEWMROPNRUEK

b.

MROUEKCTTPNROEW

c.

OEWPNRCTTUEKMRO

d.

UEKPNRMROOEWCTT

Answer: (c).OEWPNRCTTUEKMRO

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. A message "COMPUTERNETWORK" encrypted (ignore quotes) using columnar transposition cipher with a key "LAYER". The encrypted message is :

Similar Questions

Discover Related MCQs

Q. Suppose a digitized voice channel is made by digitizing 8 kHz bandwidth analog voice signal. It is required to sample the signal at twice the highest frequency (two samples per hertz). What is the bit rate required, if it is assumed that each sample requires 8 bits?

Q. The maximum payload of a TCP segment is :

Q. In a binary Hamming Code the number of check digits is r then number of message digits is equal to :

Q. In a digital transmission, the receiver clock is 0.1 percent faster than the sender clock. How many extra bits per second does the receiver receive if the data rate is 1 Mbps?

Q. Match the following cryptographic algorithms with their design issues:
List-I                                        List-II

a. DES                              i.  Message Digest

b. AES                              ii.  Public Key

c. RSA                              iii. 56-bit key

d. SHA-1                          iv. 128-bit key

Codes:
a       b       c       d

Q. Ten signals, each requiring 3000 Hz, are multiplexed on to a single channel using FDM. How much minimum bandwidth is required for the multiplexed channel ? Assume that the guard bands are 300 Hz wide.

Q. A terminal multiplexer has six 1200 bps' terminals and 'n' 300 bps terminals connected to it. If the outgoing line is 9600 bps, what is the value of n ?

Q. Which of the following is used in the options field of IPv4 ?

Q. Which layers of the OSI reference model are host-to-host layers ?

Q. A network on the Internet has a subnet mask of 255.255.240.0. What is the maximum number of hosts it can handle ?

Q. Four bits are used for packed sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size ?

Q. A Multiplexer combines four 100-Kbps channels using a time slot of 2 bits. What is the bit rate ?

Q. In a fully connected mesh network with 10 computers, total ______ number of cables are required and ____ number of ports are required for each device.

Q. In TCP/IP reference model, the job of ____ layer is to permit hosts to inject packets into any network and travel them independently to the destination.

Q. If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be:

Q. Optical fiber uses reflection to guide light through a channel, in which angle of incedence is _______ the critical angle.

Q. An attacker sits between customer and Banker, and captures the information from the customer and retransmits to the banker by altering the information. This attack is called as ..............

Q. Match the following Layers and Protocols for a user browsing with SSL:

a. Application layer i. TCP
b. Transport layer ii. IP
c. Network layer iii. PPP
d. Datalink layer iv. HTTP

Codes: a b c d

Q. The maximum size of the data that the application layer can pass on to the TCP layer below is .........

Q. A packet whose destination is outside the local TCP/IP network segment is sent to ..............