There are basically two computers (separate nodes). One computer is marked as "CLIENT" and the other is marked as "SERVE

Business, Finance, Economics, Accounting, Operations Management, Computer Science, Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Algebra, Precalculus, Statistics and Probabilty, Advanced Math, Physics, Chemistry, Biology, Nursing, Psychology, Certifications, Tests, Prep, and more.
Post Reply
answerhappygod
Site Admin
Posts: 899603
Joined: Mon Aug 02, 2021 8:13 am

There are basically two computers (separate nodes). One computer is marked as "CLIENT" and the other is marked as "SERVE

Post by answerhappygod »

There are basically two computers (separate nodes). One computer
is marked as "CLIENT" and the other is marked as "SERVER".
There Are Basically Two Computers Separate Nodes One Computer Is Marked As Client And The Other Is Marked As Serve 1
There Are Basically Two Computers Separate Nodes One Computer Is Marked As Client And The Other Is Marked As Serve 1 (27.23 KiB) Viewed 12 times
a) Based on the model iFigure Model for data communication that
"SERVER" should be a "proxy". Expand the model with a third
computer "CLIENT2". In what practical situations is "proxy" used?
Elaborate.
b) Implement a solution in Golang for the following problem: On
the computer "CLIENT" a user can enter an input string in the form
of a string constructed with symbols from the Norwegian alphabet,
specific punctuation and control characters, number symbols (0-9).
Assume that the input string is SECRET = “Meeting in Ålesund 1 June
at 25:59 ”(quotation marks are not included in the string). e ”,“ b
”are replaced by“ f ”etc.
This encrypted version of SECRET should be forwarded to the "proxy"
("SERVER"), which will forward it to "CLIENT2". "CLIENT2" will
decrypt the string. also provided in the answer. A demonstration
that the candidate can create a Githubrepository and write a
functional code is considered very good judgment and a high degree
of independence.
c) How many bytes does the string SECRET when encoded with the
UTF-8 encoding scheme? How many bytes is the encrypted string (ie
when SECRET is encrypted with Caesar cipher where each symbol is
replaced by a single symbol 4 positions to the right in the given
alphabet) when encoded with UTF-8 code schema? D) What is clear
text, key and cipher in this specific case, ie from point b).
UseFigure Encryption and Decryption in your reasoning.
There Are Basically Two Computers Separate Nodes One Computer Is Marked As Client And The Other Is Marked As Serve 2
There Are Basically Two Computers Separate Nodes One Computer Is Marked As Client And The Other Is Marked As Serve 2 (37.35 KiB) Viewed 12 times
KLIENT SERVER SE1 SE2 KE1 KE2 SE3 KE3 SE4 KE4 Figur Modell for datakommunikasjon (KE - KlientElement, SE - ServerElement)
Nakkel (an. kay) Kryptering Klartekst (en. plaintext) Chiffer (en. cipher) Dekryptering Chiffotok (on. ciphertext) Chifter (an. cipher) Nokkel (en. key) Figur Kryptering og Dekryptering Chiffertekst (an. ciphertext) Klartekat (on.plaintokat)
TOUT a b с d e f g i j k | m n 0 р r S t u V W X y Z 80.00 æ å 6,07% 1,47% 0,34 % 4,21 % 15,38 % 2,02 % 3,90 % 1,64 % 6,16% 1,02 % 3,83 % 5,26 % 3,40 % 7,81 % 5,03 % 2,06 % 0,02 % 8,53 % 6,36 % 7,84 % 1,80 % 2,40 % 0,15% 0,05 % 0,74 % 0,04 % 0,20 % 0,76 % 1,50 %
Join a community of subject matter experts. Register for FREE to view solutions, replies, and use search function. Request answer by replying!
Post Reply