1426. Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way):?
1427. Symmetric key cryptography was the only kind of encryption publicly known until:?
1428. Which among the following is correct about goals in cryptography:?
1429. License is still required to use cryptography in which among the following countries:?
1430. NSA stands for:?
1431. In the United Kingdom, the Regulation of Investigatory Powers Act gives UK police the powers to force suspects to _____that protect encryption keys:?
1432. Which among the following is correct about the 'Artificial Intelligence':?
1433. The term 'Artificial Intelligence' was first coined in ______:?
1434. The term Artificial Intelligence was coined in 1955 by_____:?
1435. Which among the following includes the areas of Artificial Intelligence specialization:?
1436. In May 1997 an IBM super computer called ______defeated world chess champion Gary Kasparov in a chess match:?
1437. Which among the following is necessary for General Intelligence (in computer language):?
1438. Which among the following definitions are correct:?
1439. A _____is defined as "some sort of hardware architecture or software framework (including application frameworks), that allows software to run:?
1440. ______argues that "artificial intelligence is the next stage in evolution":?
1441. Which among the following is correct about ''Intelligent Agent":?
1442. The intelligent agent paradigm became widely acceptable during the period of _____:?
1443. Artificial Intelligence consists of:?
1444. The number of atomic facts that are average person knows is astronomical. Research projects that attempt to build a complete knowledge base of ______:?
1445. Long term goals for Artificial Intelligence is:?
1446. Network Architecture refers to the layout of the network consisting of the hardware, software, connectivity, communication protocols and mode of transmission, such as ____:?
1447. Which among the following is used to access the network:?
1448. Which among the following layer' main function is data formats, data encryption/decryption, data compression/decompression etc:?
1449. Which layer has access to particular network services, billing functions etc:?