8 N 5 Nha 6 Qycd 0 F 3 TXDB 5 TJ 13 Ip 2 DXSN 7 L
8 N 5 Nha 6 Qycd 0 F 3 TXDB 5 TJ 13 Ip 2 DXSN 7 L
8 N 5 Nha 6 Qycd 0 F 3 TXDB 5 TJ 13 Ip 2 DXSN 7 L
Task 2
Given a set A = {10002, 1102, 11002, 110002, 1112}. Translate each element of set A from the
binary number system to the decimal number system and find what will be the cardinality of the
set if there will only be elements with GCD=2.
a) 4
b) 2
c) 1
d) 5
Answer – a
Task 3
There is a string: HelloWorld. Select a regular expression that matches this string (POSIX
Extended).
a) /^[A-Z]$/
b) /^[A-Z]?[a-zA-Z]+$/
c) /^[A-Z]?[a-zA-Z]+[0-9]$/
d) /^[A-Z]?[a-z]+$ /
Answer – b
Task 4
Given a directed graph G = (V, E), where V – set of vertices, E – set of edges. If V = {1, 2, 3}, E
= {(1; 2), (2; 1), (1;3), (3; 2)}, then …
a) graph G does not contain an Eulerian cycle
b) graph G contains an Eulerian cycle
c) the diameter of graph G is 1
d) the radius of graph G is 2
Answer – a
1
DEMO VERSION OF THE SECOND ROUND TASKS
Task 6
What is the average estimate of the complexity of implementing tests in accordance with the plan
compared to the total development costs:
a) 10%
b) 20%
c) 40%
d) 70%
Answer – c
Task 7
The criteria for system testing are:
Task 8
Which of these models belong to the software lifecycle models:
a) Functional
b) V-shaped
c) Modular
d) Temporary
Answer – b
Task 10
What type of RAID system does the following statement apply to: "The read speed doubles, but
the write speed remains unchanged"?
a) RAID 0
b) RAID 1
c) RAID 2
d) RAID 3
Answer – b
Task 11
What is the maximum number of words L with m letters that can be composed from an alphabet
with a power of N, if the words consist of 5 letters and the alphabet power is 8?
2
DEMO VERSION OF THE SECOND ROUND TASKS
a) 2048
b) 128
c) 10340
d) 32768
Answer – d
Task 12
Determine the number of sound signal levels when using a 12-bit sound card in a computer
a) 1012
b) 4096
c) 3044
d) 6192
Answer – b
a) an insecure channel
b) a secure channel
c) a covert channel
d) a side channel
Answer – с
Task 14
What abbreviation does not stand for an operation mode of block cypher?
a) CBC
b) OFB
c) ECB
d) BCF
Answer – d
Task 15
What virus encrypts itself and mutates a decryptor?
a) a polymorphic virus
b) a polygamous virus
c) a homomorphic virus
d) a pseudovirus
Answer – a
Task 16
What process can be described in short as a one-way data transformation using a certain
function?
a) XORing
b) encryption
c) archiving
d) hashing
Answer – d
3
DEMO VERSION OF THE SECOND ROUND TASKS
Task 18
List the disadvantages of Gantt chart data analysis.
a) inflexibility, dependence, overflow;
b) inflexibility, independence, overflow;
c) flexibility, dependence, overflow;
d) flexibility, independence, overflow.
Answer – a
Task 19
Which classification metric does not depend on the threshold?
a) Precision
b) Recall
c) AUC-ROC
d) Accuracy
Answer – c
Task 20
Which of the knowledge representation models corresponds to the ideas about the organization of
human long-term memory (choose one answer)?
a) production;
b) semantic networks;
c) frames;
d) integral.
Answer – b
a) PKNF: 𝑥𝑧 ⊕ 𝑦𝑧⨁𝑥𝑦𝑧
b) PDNF: 𝑥̅ 𝑦𝑧 ∨ 𝑥𝑦̅𝑧 ∨ 𝑥𝑦𝑧
c) PDNF: 𝑥𝑦̅𝑧̅ ∨ 𝑥̅ y𝑧̅ ∨ 𝑥̅ 𝑦̅𝑧̅
d) PKNF: (𝑥 ∨ 𝑦 ∨ 𝑧) ∙ (𝑥 ∨ 𝑦 ∨ 𝑧̅) ∙ (𝑥 ∨ 𝑦̅ ∨ 𝑧) ∙ (𝑥̅ ∨ 𝑦 ∨ 𝑧) ∙ (𝑥̅ ∨ 𝑦̅ ∨ 𝑧)
Answer – a, c
2 correct answers - 3 points
4
DEMO VERSION OF THE SECOND ROUND TASKS
Task 22
The Boolean function is given as a formula x̅y̅ ∨ yz̅ ∨ x𝑦z. Choose equivalent ways of setting this
function from the options presented below:
a) x̅y̅z ∨ 𝑥̅ 𝑦̅𝑧̅ ∨ xyz̅ ∨ x̅yz̅ ∨ xyz
b) 1100 0011
c) 1110 0011
d) 𝑥̅ 𝑦̅𝑧̅ ∨ x̅y̅z ∨ xyz̅ ∨ xyz
Answer – a, c
2 correct answers - 4 points
1 correct answer - 2 points
Maximum 4 points.
Answer – a, b, e
3 correct answers - 3 points
2 correct answers - 2 points
1 correct answer – 1 point
Maximum 3 points.
Task 24
What types of testing are used in software design?
a) Module testing
b) System testing
c) Periodic testing
d) Integration testing
e) Thematic testing
f) Game testing
Answer – a, b, d
3 correct answers - 4 points
2 correct answers - 2 points
1 correct answer – 1 point
Maximum 4 points.
5
DEMO VERSION OF THE SECOND ROUND TASKS
b) FCoE
c) SCSI
d) SRP
e) pSCSI
f) CPP
Answer – b, c, d
3 correct answers - 3 points
2 correct answers - 2 points
1 correct answer – 1 point
Maximum 3 points.
Task 26
By IPv4 address 123.221.125.12/25, set the four correct network configuration parameters:
a) IP address of the first host 123.221.125.0
b) IP address of the first host 123.221.125.1
c) IP address of the last host 123.221.125.126
d) The IP address of the last host is 123.221.125.254
e) Broadcast address 123.221.125.127
f) Broadcast address 123.221.125.255
g) Subnet mask 255.255.255.128
h) Subnet mask 255.255.255.254
Answer – b, c, e, g
4 correct answers - 4 points
3 correct answers - 3 points
2 correct answers - 2 points
1 correct answer – 1 point
Maximum 4 points.
Answer – a, d, e
3 correct answers - 3 points
2 correct answers - 2 points
1 correct answer – 1 point
Maximum 3 points.
Task 28
The key used for the XOR cipher is generated using a modulo-17 linear congruential generator.
It has been zero-initialized. The first two elements of the generated sequence are 3 and 7. What is
the next element of the sequence?
6
DEMO VERSION OF THE SECOND ROUND TASKS
Answer – 1
Maximum 4 points
Answer – c, d
2 correct answers - 3 points
1 correct answer - 1 point
Maximum 3 points.
Task 30
What is the objective of data storage (DS (DS)?
a) to ensure the collection, storage and quick access to the key information;
b) for create real-time systems;
c) to the operational analytical processing and data mining;
d) to view video files.
Answer – a, c
2 correct answers - 4 points
1 correct answer - 2 points
Maximum 4 points.
Module 3. Tasks with a detailed answer (15 points for the correct answer)
Section “Applied Mathematics”
Task 31
Consider the courses Algebra (A), Binary Trees (B), Calculus (C), and Differential Equations
(D). Calculate the total number of students (N) residing in a dormitory using the provided data.
Then, express the answer in the base-14 positional numeral system, which includes the digits 0 to
9 and the letters A, B, C, and D (0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D).
12 take A, 5 take A and B, 4 take B and D, 2 take B, C, D,
18 take B, 7 take A and C, 3 take C and D, 3 take A, C, D,
22 take C, 5 take A and D, 3 take A, B, C, 1 take all four,
8 take D, 16 take B and C, 3 take A, B, D, 64 take none.
Let T represent the total number of students who are enrolled in at least one course. We can
determine T using the Inclusion-Exclusion Formula, where:
s1= 12 + 18 + 22 + 8 = 60,
s2= 5 + 7 + 5 + 16 + 4 + 3 = 40,
s3= 3 + 3 + 2 + 3 = 11,
s4= 1.
7
DEMO VERSION OF THE SECOND ROUND TASKS
Alice: "We should employ the XOR cipher to encrypt our messages. We'll encrypt each character
using a key established by the Diffie-Hellman protocol."
Bob: "Agreed. Let's utilize the following numbers as algorithm parameters: 3D and FB. Let’s start"
Alice: 4D
Bob: E5
Alice: D9 D4 DD DD DE
What plaintext word was sent by Alice?
Only characters from Table 1 are allowed in plaintext.
Solution: Upon analyzing the intercepted messages, it becomes evident that Alice and Bob are
using 3D = 61 and FB = 251 as the algorithm parameters. Consequently, Alice transmitted the
following message:
4D = 77 = 61𝑥𝐴 mod 251,
8
DEMO VERSION OF THE SECOND ROUND TASKS
Bob replied:
E5 = 229 = 61𝑥𝐵 mod 251
We need to determine the values of x_A or x_B to compute the secret key using the equation:
In real-life scenarios, calculating these values can be challenging. However, in this particular case
where non-secure algorithm parameters are used, we can employ a brute-force method to find
them. Bob suggested using non-secure parameter values.
So, we get 𝑥𝐴 = 3, 𝑥𝐵 = 7.
(Correct 𝑥𝐴 or 𝑥𝐵 value – 5 points)
Then the shared secret key is
Key = 61𝑥𝐴𝑥𝐵 mod 251 = 777 mod 251 = 2293 mod 251 = 145 = 91
(Correct shared secret key value – 5 points)
Finally, the message can be decrypted:
D9 D4 DD DD DE
11011001 11010100 11011101 11011101 11011110
⨁
10010001 10010001 10010001 10010001 10010001
=
01001000 01000101 01001100 01001100 01001111
48 45 4C 4C 4F
H E L L 0
(Correct plaintext message – 5 points)
Answer: HELLO
(Total: 15 points)
19 25 22 16 22 14 17 19 18 20
22 26 24 18 16 19 22 14 18 14
25 17 18 14 20 18 24 25 16 18
xi 14 16 17 18 19 20 22 24 25 26
ni 4 3 2 6 3 2 4 2 3 1
9
DEMO VERSION OF THE SECOND ROUND TASKS
∑ 𝑛𝑖 ∗𝑥𝑖
Sample mean: 𝑥в = 𝑛
Writing the sample mean formula - 4 points
𝑥в
14 ∗ 4 + 16 ∗ 3 + 17 ∗ 2 + 18 ∗ 6 + 19 ∗ 3 + 20 ∗ 2 + 22 ∗ 4 + 24 ∗ 2 + 25 ∗ 3 + 26 ∗ 1
=
30
Sample mean = 19, 3.
Correct calculation of the sample mean – 4 points
10