I have a course work for university, the question is:
Consider a symmetric encryption scheme with its encryption operation written as
$$C = E(K, R||P)$$
where $E$ is a block cipher encryption algorithm, $K$ is an encryption key, $R$ is a random nonce (i.e., it is randomly generated for each encryption), $P$ is a plaintext, $C$ is a ciphertext, and "$||$" denotes concatenation.
Let the block size be $n$, $R$ is $u$-bit long $(0<u<n)$, the length of $P$ is $v = n-u$ so $R||P$ is exactly one block long. The values $u$ and $v$ are public information.
Explain that given K and C, how one can compute $P$ [1%]
Assume that an adversary (who does not know $K$) has the capability ot choose arbitrary plaintexts and obtain the corresponding ciphertexts. This is done through an oracle, to which the adversary can submit a number of encryption queries. For example, if the block cipher is AES, the oracle is an AES accelerator. In each query, the adversary chooses a pair of $v$-bit plaintext, $P_0$ and $P_1$, and sends them to the oracle. After receiving $q$ such queries, the oracle randomly chooses a bit value $b$ from 0 or 1. If $b = 0$, the oracle will respond with the encryptions of the plaintext $P_0$ for all pairs in the $q$ queries. If $b = 1$, it will respond with the encryption of plaintexts $P_1$ for all the pairs in the $q$ queries. The goal of the adversary is to discover the value $b$. Such an attack is called a chosen plaintext attack (CPA). How does the adversary choose $q$ pairs of $P_0$ and $P_1$ in order to find the value $b$? Explain your answer. [4%]
I am struggling with part 2. So far I have read the wikipedia page (https://en.wikipedia.org/wiki/Chosen-plaintext_attack) for chosen plaintext attacks, which mostly makes sense to me.
Can someone please explain to me why we would even send 2 plaintexts to the oracle then try to guess which ones encryption is being returned to us, to me this makes no sense as surely it would make more sense to just send each plaintext separately and get both of their cipher texts, so that we can learn details about the encryption system.
Any help on understanding this would greatly be appreciated.
3rd-party edit: as explained in the comment, the lecturer who gave the question explained that we can choose the length of $P$, and therefore that of nonce $R$. As DannyNiu mentioned in the comment, if we weren't able to do so, then the encryption is secure under CPA.