Cs101-1 midterms Flashcards

1
Q

A function can have more than one output for a single input.

T

F

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Every function is a relation, but not every relation is a function.

T

True
F

False

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the output of the function f(x) = x + 3 when x is 2?

Show answer choices

5

3

4

2

A

5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The domain of a function is the set of all possible inputs.

T

True
F

False

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

If a function has an output of -2 for an input of 3, it can also have an output of 3 for the same input.

T

True
F

False

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

If f(x) = x^2, what is f(4)?

Show answer choices

16

12

4

8

A

16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In a function, each input must have exactly one __________

A

output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The range of a function includes all possible outputs.

T

True
F

False

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is domain

A

All possible input in a function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is range

A

All possible outputs from a function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is input

A

The Value you put into the function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is output

A

The result you get from the function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A function can be represented by a table, a graph, or an equation.

T

True
F

False

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following represents a function?

Show answer choices

f(x) = 2x

y^2 = x

x = 5

x + y = 5

A

f(x) = 2x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In modular arithmetic, what is 10 mod 4?

Show answer choices

0

2

1

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Public-key Cryptography

A

Uses pairs of keys, one public and one private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Hash Function

A

Transforms input data into a fixed size string of characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Encryption

A

The process of converting plaintext into ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Decryption

A

The process of converting ciphertext back into plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The first prime number is ____.

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Prime Number

A

A number greater than 1 that has no positive divisors other than 1 and itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Modular Arithmetic

A

Arithmetic that deals with remainders after division by a specific number.

23
Q

Caesar Cipher

A

A method of encryption that shifts letters by a fixed number.

24
Q

Substitution Cipher

A

A method of encryption where each letter is replaced by a different letter.

25
What is the main purpose of a hash function in cryptography? Show answer choices To create a fixed-size output from input data To encrypt data To decrypt data To generate prime numbers
To create a fixed-size output from input data
26
What is one of the main weaknesses of a Caesar cipher? Show answer choices Easily broken through frequency analysis Cannot be used for encryption Requires large keys Only works with numbers
Easily broken through frequency analysis
27
Which of the following operations is used in a Caesar cipher? Show answer choices Rotate Invert Shift Swap
Shift
28
Modular arithmetic can be used to find remainders after division. T True F False
True
29
In modular arithmetic, adding numbers wraps around after reaching a certain _____________
value(notsure) Modulus
30
All prime numbers are odd numbers. T True F False
F
31
Which cipher is considered a symmetric cipher? Show answer choices RSA Substitution Cipher Caesar Cipher Diffie-Hellman
Caesar Cipher
32
Which of the following numbers is a prime number? Show answer choices 10 13 6 4
13
33
1 Caesar Cipher
A simple shift cipher.
34
Transposition Cipher
Rearranges the characters in the plaintext.
35
Block Cipher
Encrypts data in fixed-size blocks.
36
4 Stream Cipher
Encrypts data one bit or byte at a time.
37
What is the result of 7 mod 3? Show answer choices 1 2 3 0
1
38
Frequency analysis is a technique used to break substitution ciphers. T True F False
T
39
A Caesar cipher encrypts data by rearranging the order of letters. T True F False
F
40
What is the primary purpose of a public key in cryptography? Show answer choices To sign messages for authenticity To ensure data integrity without encryption To encrypt data that only the corresponding private key can decrypt To determine the hash of data
To encrypt data that only the corresponding private key can decrypt
41
In cryptography, what does the term 'encryption' specifically refer to? Show answer choices The process of converting plaintext into ciphertext The reverse process of decryption The generation of keys The act of hashing data
The process of converting plaintext into ciphertext
42
Which cipher is considered the simplest form of encryption? Show answer choices Diffie-Hellman AES RSA Caesar cipher
Caesar cipher
43
A hash function can produce the same output for different inputs. (True/False) T True F False
False
44
In context to number theory, what does the term modulo refer to? Show answer choices The remainder after division of one number by another The product of two numbers The total count of prime numbers The sum of digits in a number
The remainder after division of one number by another
45
In a substitution cipher, how is data transformed? Show answer choices By replacing each letter with another letter By rearranging letters By converting letters to numbers By shifting all letters by a fixed amount
By replacing each letter with another letter
46
Which of the following is a characteristic of a prime number? Show answer choices It is an even number It has an infinite number of factors It has exactly two distinct positive divisors: 1 and itself It is divisible by at least one other number
It has exactly two distinct positive divisors: 1 and itself
47
Which property is essential for a function to be considered a hash function? Show answer choices Linearity Randomness Reversibility Determinism
Determinism
48
Why is frequency analysis effective against simple ciphers? Show answer choices It uses brute force to try every possible code It analyzes the frequency of letters or groups of letters to decipher encryption It changes the keys used in encryption It relies on prime numbers to break encryption
It analyzes the frequency of letters or groups of letters to decipher encryption
49
SHA-256 is widely used because it produces a secure fixed-size __________
Hash
50
Binomial Theorem
formula that describes the algebraic expansion of powers of a binomial.
51
Permutations consider the order of items. T True F False
T
52
Binomial Coefficient
Counts ways to choose k elements from n.
53
permutation formula
n!/(n-r)!
54
Combination formula
n!/r!(n-r)!