In this chapter, students will be able to understand: How many ways can a password be chosen following specific rules? How many valid Internet addresses are there? What is the probability of winning a particular lottery? Is there a link between two computers in a network? How can I identify spam email messages? How can I encrypt a message so that no unintended recipient can read it? How can we build a circuit that adds two integers? |