Professional Documents
Culture Documents
T215B FINAL 2016-2017 Spring
T215B FINAL 2016-2017 Spring
T215B FINAL 2016-2017 Spring
Final Exam_Key
Spring 2016/2017
a. False acceptance
b. False positive.
c. False non-match
d. False match.
3. Authentication of the server like the bank with the client like the client’s computer is
achieved using __________setup procedure between an HTTPS protected server and a client.
a. TCP/IP
b. TLS/SSL
c. WEP/WPA
d. SMTP/SOA
a. Completely in phase.
b. Identical phase
c. Completely out of phase
d. Similar phase
8. The condenser microphone and the electret microphone are two types of microphone that
use the effect of_______________.
a. Electrostatic induction.
b. Electromagnetic induction
c. Electrodynamic induction
d. Optical induction.
9. When the minimum sampling rate is not respected, another sinewave with a lower frequency
can be drawn through these samples. This phenomenon is known as____________.
a. Amplification.
b. modulation
c. Aliasing
d. Boosting
10. __________is a tool for video production that provides ways of creating, editing and
processing videos.
a. Compiler
b. Interpreter.
c. Paintbrush
d. AviSynth
This part carries 35% of the total examination marks. You should attempt only 5 out of 7
questions in this part. Each question carries 7 marks. You are advised to dedicate approximately
70 minutes to this part.
1. In the context of Cryptography, explain briefly the difference between a code and a cipher?
Solution:
A code replaces whole words, phrases or groups of symbols with alternatives (or code words).
The purpose of creating a code is not always for secrecy.
A code is used simply as an abbreviation.
A code is used to provide an alternative way of communicating information.
A code is the output of an encoding process (the reverse is decoding) and generally relies on sets
of look-up tables (codebooks) for the conversion processes. (3.5 marks)
Ciphers:
A cipher is the output of an encryption process that either replaces data symbols with alternative
symbols, or rearranges existing symbols.
The operation used to create a cipher is systematic (i.e. follows some set rules).
A cipher is almost always created for reasons of secrecy. (3.5 marks)
2. The level of security afforded during a TLS/SSL session depends on a number of factors. List
three of these factors.
Solution:
i. The browser application used at the client (2 marks)
ii. The version of TLS/SSL used to set up the connection (2 marks)
iii. Proper authentication of the digital certificate. (3 marks)
3. In fingerprint matching process, there are many reasons for intra-class variations. Explain
briefly, three of these reasons.
Solution: (any three from the list below are correct)
4. Automated teller machines (ATMs) are often referred as ‘cash machines’. What are the
services that can be provided by ATMs (at least four)? What are their benefits (at least three)?
Solution:
Modern ATMs allow many of the traditional over-the-counter services involving a bank teller to
be accessed through a machine. Some of these services are:
• withdraw cash
• check an account balance
• print out a summary or detailed statement
• pay in cheques, money orders and cash (4 marks)
ATM benefits:
• reduced costs (to banks)
• reduced delays (for customers)
• Extended availability outside normal banking hours. (3 marks)
5. Moving coil microphones is one type of microphones. What are its advantages and
disadvantages? What is its usage?
Solution:
Advantages:
Moving-coil microphones are typically quite rugged.
Moving-coil microphones are able to convert sounds more or less over the full range of audible
frequencies. (3 marks)
Disadvantage:
Moving-coil microphones tend not to be as sensitive as electrostatic microphone types.
(2 marks)
Usage:
Moving-coil microphones are most often used as handheld microphones for singers and
speakers, where ruggedness is more important than sensitivity. (2 marks)
Solution: (Any two items from the given below are correct. Award each item 3.5 marks):
3. Computer storage techniques can easily be used for storing sound in its digital form.
Solution:
a. A digital video can be defined as a sequence of digital still images displayed in rapid
succession in order to simulate different types of animations and effects. (3 marks)
b. Each image in the video is known as a frame. (2 marks)
c. The resolution of the digital image is a measure of the amount of detail it can hold, and
is dependent on the number of pixels used to make up that image. (2 marks)
Part 3
This part carries 50% of the total examination marks. You should attempt all the problems in
this part. You are advised to dedicate approximately 90 minutes to this part.
Part A:
Compute the decryption keys for the Caesar cipher (single coding) with encryption keys of: 8, 12
and 16? (Show calculation details) (6 marks)
Part B:
Consider that a fingerprint database contains 36 million records. If the identification system can
perform 12000 fingerprint comparisons per second, how long would it take to search through all
the records? Express time in minutes. (Show calculation details and formulas used) (4 marks)
K=8 → K+ 𝐾̅ =26 → 𝐾
̅ =26 – K = 26 – 8 → 𝐾
̅ =18 (2 marks)
̅ ̅ ̅ =14
K=12 → K+ 𝐾 =26 → 𝐾 =26 – K = 26 – 12 → 𝐾 (2 marks)
̅ =26 → 𝐾
K=16 → K+ 𝐾 ̅ =26 – K = 26 – 16 → 𝐾
̅ =10 (2 marks)
Part B:
Time = number of records/processing speed. (1 mark)
6 3
Time = 36 x 10 / 12x10 = 3000 s (2 marks)
Part A:
How many bytes are needed to store a single video frame with a RGB24 color model, and a
frame size of 1400 x 1000 pixels? Express your answer in bytes. At 24 frames per second what is
the data rate that will have to be handled by the video player software? (Express your answer in
megabytes per second.) (4 marks)
Solution:
• The RGB24 color model allocates 24 bits, or 3 bytes, to determine the color of each pixel.
• There are 1400×1000 pixels per frame giving a total of: 3×1400×1000 = 4 200 000 bytes.
(2 marks)
• In 1 second, 24 frames will be processed. The number of bytes per second is therefore:
24×4200000 = 100 800 000 bytes per second = 100.8 megabytes per second. (2 marks)
Part B:
Consider an audio CD that contains exactly one third of an hour of stereo sound. Ignoring any
additional requirements for format information and other data to ensure the integrity of the
sound samples, how many bytes of storage does the CD need to contain for both of the stereo
channels? Assume the sample rate is 44100 samples per second and each sample requires two
bytes of storage. (6 marks)
Solution:
The figure below represents a sound signal propagates in air as medium, answer the following
questions:
a) Consider each square of the time axis represents 0.4 ms; calculate the period of signal in
seconds and milliseconds? (2 marks)
T = 5 x 0.4 = 2 ms (1 mark)
T = 2x0.001=0.002 s (1 mark)
b) Calculate the frequency of signal in Hz? (2 marks)
f = 1/T = 1/0.002 = 500 Hz
c) Calculate the wavelength of signal. Consider the speed of sound in air is 340 m/s? (2
marks)
λ = v x T = 340 x 0.002 = 0.68 m
d) What are the peak and root-mean square (r.m.s.) amplitudes? Consider each square of
the pressure axis represents 0.2 µPa? (4 marks)
Peak pressure = 7 squares x 0.2 = 1.4 µPa (2 marks)
r.m.s. = peak amplitude / √2 = 1.4 / √2 = 0.9899 µPa (2 marks)
The outcome of the combined system will be a match only when the outcomes of both of the
subsystems are matches. When the outcome of either subsystem is a non-match, the outcome
of the combined system will be a non-match.
Assume that the following values have been obtained for the two systems separately,
a. Calculate the FMR and FNMR of the combined system? (Show details). (6 marks)
b. What are your observations about the obtained values? (2 marks)
c. What is your conclusion about the combined system? (2 marks)
Solution:
a.
Combined FMR:
A false match can only occur if BOTH subsystems wrongly say there is a match.
b.
Observation about FMR: The FMR of the combined system is much smaller (at 0.12%) than is
C
the FMR of either subsystems (which are 6% and 2%). (1 mark)
Observation about FNMR: The FNMR of combined system has not gone down, it has gone up!
(1 mark)
c. Conclusion: Fewer illegitimate users will be allowed access (More security), but more
legitimate users will be denied access (less convenience). (2 marks)
Use the Vigenère cipher with the keyword ‘tablet’ to encrypt the following sentence: “Welcome
to ITC Program”. Show your work in details in the form of table.
Table below help you to find the code equivalent to each letter.
Plaintext w e l c o m e t o i t c p r o g r a m
Code 22 4 11 2 14 12 4 19 14 8 19 2 15 17 14 6 17 0 12
Key t a b l e t t a b l e t t a b l e t t
Code 19 0 1 11 4 19 19 0 1 11 4 19 19 0 1 11 4 19 19
Result 15 4 12 13 18 5 23 19 15 19 23 21 8 17 15 17 21 19 5
Cipher P E M N S F X T P T X V I R P R V T F
text
(0.5 for each correct column mark; Total marks= 19x0.5+0.5=10 marks)
(Deduct 1 mark if student write the ciphertext in small letters)