TM255 Communication and information technologies

Get your Assignment in a Minimum of 3 hours

Our academic experts are ready and waiting to assist with any writing project you may have. From simple essay plans, through to full dissertations, you can guarantee we have a service perfectly matched to your needs.

Don't use plagiarized sources. Get Your Custom Essay on
Need an answer from similar question? You have just landed to the most confidential, trustful essay writing service to order the paper from.
Just from $13/Page
Order Now
Free Inquiry Order A Paper Now Cost Estimate

Question 1

This question carries 10% of the assignment marks.

Before tackling this question you should study Block 3 Parts 4 and 6.

(a) The symbol Z is magnified and shown in Figure 1 with a grid superimposed.


Figure 1

The image in Figure 1 is to be encoded and encrypted using the following steps:

1 Each of the five horizontal rows of the picture is encoded as a 5-bit binary

number. White squares are encoded as 0s and black squares as 1s. The top

row is therefore encoded as 01111.

2 Starting from the left, the first binary digit is multiplied by 16, the second by 8,

the third by 4, the fourth by 2, and the fifth by 1. For the top row the result is

(0 × 16) + (1 × 8) + (1 × 4) + (1 × 2) + (1 × 1) = 0 + 8 + 4 + 2 + 1 = 15.

3 The value representing each row is encrypted using modular addition with a

modulus of 32 and a key of 27.

4 The result is converted to a 5-bit binary number.

Use steps 1 to 4 to work out the 5-bit binary number of each row. Show your working.

(5 marks)

(b) This part of the question is based on the practical activities you did in Part 6. It relates

to Activity 6.8 where you registered an account and tested the web server.

1 For your answer to this part of the question include the screenshot that shows

the welcome page after you successfully logged in to your account. The

screenshot should show your name, PI number and email address. (2 marks)

2 The web server used in Activity 6.8 is vulnerable to SQL injection attacks. What

SQL injection code can you use to attack the web server? How can the code be

applied to gain access to a user account illegitimately? Explain your answer in

about 50 words. (3 marks)

"Is this question part of your assignment? We Can Help!"

"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!""Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"

Get A Price Estimate