Cloud Computing
Characteristics of Cloud Computing On-demand self service Cloud computing resources can be provisioned on-demand by the users, without…
13 min read by Kristoffer-Andre Kalliainen on Dec 04, 2018 in iotBlockchain Questions
How is a payment carried out in the Bitcoin network? The bitcoin network is based on blocks. Blocks are discovered by attempting to solve…
5 min read by Kristoffer-Andre Kalliainen, Vegard Guttormsen and Preben Haukebøe on Dec 03, 2018 in questionsInternet of Things
Concepts IoT (Internet of Things) The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital…
9 min read by Kristoffer-Andre Kalliainen on Dec 01, 2018 in iotExamination details for IoT Module
Reading Lists for the Exam Chapter 1: Bagha and Madisetti: Internet of Things - A Hands-On Approach. (hardcopy handed out) Mattern and…
1 min read by Kathinka Neteland on Nov 26, 2018 in exam-detailsIoT Questions
Internet of Things (IoT) / Web of Things (WoT) Describe an example of an IoT system in which information and knowledge are inferred from…
5 min read by Kristoffer-Andre Kalliainen on Nov 26, 2018 in questionsBlockchain
L14 -Introduction to Blockchain and Bitcoin Module content Construction and structure of blockchains Distributed trust and consensus Proof…
2 min read by Preben Haukebøe on Nov 23, 2018 in blockchainRefactoring
Goals The ultimate goal of performing refactoring on your code is to make it clearer to understand and thereby more effecient to maintain…
1 min read by Kathinka Neteland on Nov 23, 2018 in refactoringExamination details for the Blockchain module
The list of reading material is the Blockchain: Reading List. In addition, you have the lecture notes and the assignments. In the…
1 min read by Kristoffer-Andre Kalliainen on Nov 23, 2018 in exam-detailsExamination details for Basic Cryptography Module
Reading Lists for the Exam Lecture Notes http://www.tutorialspoint.com/cryptography/ The DES Algorithm Illustrated A Stick Figure guide to…
1 min read by Kristoffer-Andre Kalliainen on Nov 23, 2018 in exam-detailsExamination details for the Refactoring module
Reading List As per Reading List on Refactoring. Remember to look at the work on refactoring C/C++. Exam Question There will only be time…
1 min read by Kristoffer-Andre Kalliainen on Nov 23, 2018 in exam-detailsCryptography Questions
Classical Cryptography An example of a monoalphabetic cipher is: Shiftcipher Hill cipher Vigenere cipher Two conditions must hold to find…
4 min read by Kristoffer-Andre Kalliainen on Nov 23, 2018 in questionsRefactoring Questions
Give the “cooking recipe” for the “Move method” refactoring “Pull Up Field” refactoring “Extract Method” refactoring “Pull Up Method…
1 min read by Kristoffer-Andre Kalliainen on Nov 23, 2018 in questionsAffine Cypher
Think about how to decrypt the Affine Cipher Decryption Inverse’of’multiplicative’cipher How to compute the inverse of a key (Trial and…
1 min read by Kristoffer-Andre Kalliainen on Nov 23, 2018 in cryptographyHill Cypher
Polyalphabetic cipher Requires at least 2 keys Uses a linear combination of the key with the plaintext to form the ciphertext.
1 min read by Kristoffer-Andre Kalliainen on Nov 23, 2018 in cryptography