what is 9 in binary?
1001
Decrypt 'nombizdon' with key 10 (Caesar cypher).
'decrypted'
What does SQL stand for, and what is it used for.
Structured Query Language, and it is used to manage and index databases.
HTML is structured via a series of containers bookended by _____.
Tags
String
What is 2F in decimal?
47
What is a One-Way Hash
An algorithm that encrypts a message, but cannot be decrypted.
What is the standard format of a sequel command?
SELECT column1, column2... FROM table
What does the <head> portion of an html file contain?
Backend information, such as tab text and CSS information.
if x = False, what is the output of the following code?
if Not x:
return(5)
else:
return(4)
5
what is 1101 in hex?
D
What is a vigerene cypher?
A cypher where you put each character through a Caesar cypher, determining the key by the displacement from a letter in a key phrase.
What does COUNT() do?
Returns the number of occurrences rather than their discrete data. It is usually bared with GROUP BY to organize the data.
How many heading tags are there?
6
if x = [0,1,3,5,7,2,4], what is the output of max(x)-min(x))
7
Describe Van Neuman Architecture
There is a command line and a memory list. Commands are written (in binary) on the first four digits of each command line. Each tells it to onload, offload, or alter the data in a temporary variable R, or end the program.
How does block cypher work?
Convert each letter of your message to a number, then align those numbers in a matrix the same length (not height) as your key. Then use matrix multiplication with the message matrix and the key matrix. If you end with numbers greater than 26, mod 26 each number. Convert end numbers back to letters and reformat.
What are wildcard characters?
Command parameters that allow for greater filtering of string/varchar data.
Aesthetics (color, centering, font, etc.)
If you attempt to modify string S, attempting S[x]='new' will throw an error, but attempting S=S[:x] + S[x+1:] will output the desired result. Why is that?
Strings are an immutable data type (meaning they cannot be modified), and the second method is technically constructing a new string from pieces of the old one.
What is elegance as it pertains of Algorithms?
Executing an Algorithm in an efficient of creative way.
What are the variables that go into creating RSA (Public Key Encryption) keys
p/q = random, large prime numbers
n = p X q, m = (p-1)x(q-1)
e = large number that doesn't share any factors with m
d = number between 0 and m that completes (e x d)%m=1
Public key = (n,e) Private key = d
SELECT table1.column1, table1.column2, table2.column1... FROM table 1 JOIN table1.columnx = table2.columny
The outermost 'box' of element formatting is the _____
Margins
Describe Binary Search and why its more efficient than Selection Sort
Take the middle element of the list. If the desired element is greater than it, discard the lower half the list and vice versa. Continue until desired element is found or entire list is discarded.
It is more efficient as it does not have to check every element in the list.