Sign Up

Have an account? Sign In Now

Sign In

Forgot Password?

Need An Account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question. Please subscribe to paid membership

Forgot Password?

Don't have account, Sign Up Here
Please subscribe to paid membership

Sorry, you do not have permission to ask a question, You must login to ask a question. Please subscribe to paid membership

Forgot Password?

Don't have account, Sign Up Here
Please subscribe to paid membership

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Sign InSign Up

Quearn

Quearn Logo Quearn Logo

Quearn Navigation

  • Home
  • Sili AI
  • Quearn Drive
  • Quearn Academy
  • Guest Post (Lifetime Dofollow Backlink)
  • Blog
  • Free Guest Post Submission
Search
Ask A Question

Mobile menu

Close
Ask A Question
  • Home
  • Sili AI
  • Quearn Drive
  • Quearn Academy
  • Guest Post (Lifetime Dofollow Backlink)
  • Blog
  • Free Guest Post Submission

jangyasinni

Teacher
Ask jangyasinni
10k Visits
0 Followers
3k Questions
Home/ jangyasinni/Answers
  • About
  • Questions
  • Polls
  • Answers
  • Best Answers
  • Followed
  • Favorites
  • Asked Questions
  • Groups
  • Joined Groups
  • Managed Groups
  1. Asked: August 20, 2024In: Education

    Cryptanalysis is used

    jangyasinni
    jangyasinni Teacher
    Added an answer on August 24, 2024 at 10:50 am

    A. to find some insecurity in a cryptographic scheme

    A. to find some insecurity in a cryptographic scheme

    See less
      • 0
  2. Asked: August 20, 2024In: Education

    What is data encryption standard (DES)?

    jangyasinni
    jangyasinni Teacher
    Added an answer on August 24, 2024 at 10:50 am

    A. block cipher

    A. block cipher

    See less
      • 0
  3. Asked: August 22, 2024In: Education

    In cryptography, the order of the letters in a message is rearranged by

    jangyasinni
    jangyasinni Teacher
    Added an answer on August 24, 2024 at 10:47 am

    A. transpositional ciphers

    A. transpositional ciphers

    See less
      • 0
  4. Asked: August 22, 2024In: Education

    Which one of the following algorithm is not used in asymmetric key cryptography?

    jangyasinni
    jangyasinni Teacher
    Added an answer on August 24, 2024 at 10:03 am

    C. electronic code book algorithm

    C. electronic code book algorithm

    See less
      • 0
  5. Asked: August 22, 2024In: Education

    In asymmetric key cryptography, the private key is kept by

    jangyasinni
    jangyasinni Teacher
    Added an answer on August 24, 2024 at 10:03 am

    B. receiver

    B. receiver

    See less
      • 0
  6. Asked: August 22, 2024In: Education

    In cryptography, what is cipher?

    jangyasinni
    jangyasinni Teacher
    Added an answer on August 24, 2024 at 10:02 am

    A. algorithm for performing encryption and decryption

    A. algorithm for performing encryption and decryption

    See less
      • 0
  7. Asked: August 22, 2024In: Education

    Which one of the following is not used in media access control?

    jangyasinni
    jangyasinni Teacher
    Added an answer on August 24, 2024 at 9:57 am

    D. none of the mentioned

    D. none of the mentioned

    See less
      • 0
  8. Asked: August 22, 2024In: Education

    Which protocol assigns IP address to the client connected in the internet?

    jangyasinni
    jangyasinni Teacher
    Added an answer on August 24, 2024 at 9:54 am

    A. dhcp

    A. dhcp

    See less
      • 0
  9. Asked: August 22, 2024In: Education

    Which one of the following is not an application layer protocol used in internet?

    jangyasinni
    jangyasinni Teacher
    Added an answer on August 24, 2024 at 9:10 am

    C. resource reservation protocol

    C. resource reservation protocol

    See less
      • 0
  10. Asked: August 22, 2024In: Education

    Internet works on

    jangyasinni
    jangyasinni Teacher
    Added an answer on August 24, 2024 at 9:08 am

    A. packet switching

    A. packet switching

    See less
      • 0
1 … 88 89 90 91 92 … 110

Sidebar

Stats

  • Questions 10k
  • Answers 10k
  • Best Answers 3k
  • Users 226k
  • Popular
  • Answers
  • priya

    The header length of an IPv6 datagram is _____.

    • 3 Answers
  • Quearn

    How to approach applying for a job at a company ...

    • 7 Answers
  • priya

    In the IPv6 header,the traffic class field is similar to ...

    • 3 Answers
  • Quearn
    Quearn added an answer What Makes Quearn’s Guest Post Service Special? ✅ Permanent Placement –… May 19, 2025 at 6:03 am
  • Anonymous added an answer B. dns resolver May 9, 2025 at 4:37 pm
  • Anonymous added an answer A.CAS May 9, 2025 at 4:37 pm

Top Members

Stevemark

Stevemark

  • 185k Points
Scholar
Ragini

Ragini

  • 76k Points
Professional
Lark Davis

Lark Davis

  • 16k Points
Pundit
prasanjit

prasanjit

  • 5k Points
Teacher
rohit

rohit

  • 1k Points
Begginer

Trending Tags

answer computer current data diode education electric flux igbt machine magnetic mcq network poll power quearn question scr study voltage
Сollaborator

Latest News & Updates

  • Quearn Support

    Smart Cities: Integrating Drones and Autonomous Vehicles

  • Quearn Support

    Water Wars: How Scarcity Is Shaping Global Politics

  • Quearn Support

    Carbon Footprint 101: What It Is and Why It Matters ...

  • Quearn Support

    Cramming and Stress: How All-Nighters Affect the Brain and Body

  • Quearn Support

    What is procrastination: The Hidden Psychology Behind Delaying Tasks

Explore

  • Home
  • Add group
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Users
  • Help

Footer

Quearn

About

Quearn is a social questions & Answers Engine which will help you establish your community and connect with other people.

About Us

  • Blog
  • About Us
  • Contact Us
  • Become a Partner in Quearn
  • Free Guest Post Submission
  • Question Categories
    • AI
    • Analytics
    • Artificial Intelligence
    • Backlinks
    • Blockchain
    • Communication
    • Company
    • Cryptocurrency
    • Education
    • Internet
    • Language
    • Programmers
    • Science
    • SEO
    • University

Legal Stuff

  • Terms & Conditions
  • Privacy Policy
  • DMCA Policy
  • Cancellation & Refund Policy

Help

  • Support
  • FAQs
  • Guest Posting
  • Careers
  • Liberty Wire

Follow

© 2018-2025 All Rights Reserved by Quearn