DSA 1st exam Flashcards
review
a field of study
in which a cryptographic scheme is intentionally tried to breach in order to find flaws and insecurities. It
is used to make sure that the scheme is least vulnerable to attacks.
cryptoanalysis
the operation ~waterTank() in water tank ADT is
a destructor
integers, float and characters are what data type
hardware data type
data types give attention to the WHAT rather than the HOW
Abstract data type
The next oldest item becomes the topmost item after the ____ is performed on stack
POP
The other name for a __________________ algorithm is diminishing decrement sort as the distance between
comparisons decreases as the algorithm runs until the last phase
shell sort
Data Confidentiality, Data Integrity, and Authentication are ___________ of data security
Principles of data security
a type of data structure which enable us to view something as a high-level object while temporarily ignoring the
enormous amount of underlying detail associated with that object
Abstraction
a textual label used to refer to that variable or data in the text of the program
name
a process of packaging together a collection of data values together with the operations on those values
Data encapsulation
Top most element is deleted if ___ is called on a full stack
POP
contains elements only of the same type
array
Quick sort makes partitions of the input array about the pivot in order to implement sorting. Thus, its
method of sorting is called
partitioning
an example of internal sorting because sorting of elements is done internally using an array
shell sort
In cryptography, the order of the letters in a message is rearranged by ______________________. In
____________, the order of letters in a plaintext message is shuffled using a pre-defined method.
Some of such ciphers are Rail fence cipher and Columnar transposition.
transpositional ciphers
In asymmetric key cryptography, the ____________ is kept only by the receiver of the message. Its aim is to
make sure that only the intended receiver can decipher the messages
private key
happens if a PUSH operation is called on a full stack
Stack overflow
an observer operation of the stack ADT which returns the topmost element
stackTop
The university was established in the year
1946
Understanding complex systems and make things easy to absorb and manipulate are the benefits we can gain from using
abstraction
is a leading higher learning institution in the region that provides quality transformative education
serving the nation and the world
the university of mindanao
is an in-place sorting algorithm, it does not require additional storage which is an
advantage of selection sort over other sorting techniques
Selection sort
_______ data type frees programmers from the limits imposed by a given programming language regardless of how interesting or
powerful that language might be.
Abstract data types
is used to find some insecurity in a cryptographic scheme
cryptoanalysis