1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tia_tia [17]
3 years ago
5

What is the abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages, many of which contain hoax

es or other undesirable contents such as links to phishing sites
Computers and Technology
1 answer:
Ilya [14]3 years ago
5 0

I think the answer is spam
You might be interested in
Exercise 8.1.9: Diving Contest Your school is hosting a diving contest, and they need a programmer to work on the scoreboard! Yo
vampirchik [111]

Answer:

def calculate_score(theTuple):

    first, second, third = theTuple

    if first >= 0 and first <=10 and second >= 0 and second <=10 and third >= 0 and third <=10:

         print(first + second+third)

    else:

         print("Range must be 0 to 10")

Explanation:

This line defines the function

def calculate_score(theTuple):

This line gets the content of the function

    first, second, third = theTuple

The following if condition checks if the digits are in the range 0 to 10

    if first >= 0 and first <=10 and second >= 0 and second <=10 and third >= 0 and third <=10:

This calculates the sum

         print(first + second+third)

else:

If number is outside range 0 and 10, this line is executed

         print("Range must be 0 to 10")

4 0
3 years ago
2. Research, find and use a better (different from the simple Shift Cipher) encryption technique to encrypt a string of your cho
Kruka [31]

Answer:

There are two better techniques for encryption as compared to shift cipher. One is block cipher. Such techniques use one key for both encryption and decryption. For example Advanced Encryption Standard (AES). This is based on symmetric key encryption.

The other way is to use asymmetric key encryption technique which based on two keys i.e. public and private key for encryption and decryption. For example, Rivest-Shamir-Adleman (RSA).

Explanation:

What is AES?

Advanced Encryption Standard (AES) is a symmetric key block cipher  which uses 128, 192 or 256-bit keys  length to encrypt and decrypt a block of plain text or message. It is stronger and faster than Shift Cipher encryption technique. It can encrypt data blocks of 128 bit using the above mentioned bit key lengths. The greater then key length the greater the security. the number of rounds in AES is variable and depends on the length of the key. The length of these keys determines the number of rounds for example 128 bit keys has 10 rounds, 12 rounds for 192 bit keys and 14 rounds for 256 bit keys. Each rounds involves some processing. This process is explained below:

How AES works?

The data is divided into each of size 128 bits makes a matrix of 4x4 columns of 16 bytes. (bytes because AES takes 128 bit plain text block as 16 bytes)

Substitution: First the data is substituted using a fixed substitution table which is predetermined. This makes a matrix of rows and columns.

Shifting: Each rows of the matrix is shifted to the left and the dropped entries in row are inserted on the right. Shift is carried out as follows −  

Mixing columns: Use a mathematical method/equation to transform the columns where the input of the method is each column of data which is then replaced by this function into a different new matrix of data(bytes). This is basically the first round to transform plain text to cipher text. Now consider these bytes as 128 bits, the first round key is added to these resultant column bits by XOR. A separate portion of the encryption key length is used to perform the transformation on each column. The number of rounds depend on the the key length.

After the first round key comes the second round key and so on and when the last round key is added then this whole process goes back to Substitution phase, then shifting rows phase, then mixing columns and another round key is added after this. For example, if 128 bit key is used this means there will be nine such rounds.

Advantages

AES supports large key sizes which makes it more secure and stronger than shift cipher encryption techniques which can be cracked because of their small key space. If someone wants to decrypt a message and knows it's encrypted by a Shift Cipher technique then the key space of all possible keys is only the size of the alphabet. This is a very small scale.  An attack such brute force attack attempting all 26 keys or even using exhaustive technique will easily crack this. So AES having large key size is more robust against cracking. For example in AES in order to crack an encryption for 128 bit around 2128 attempts are needed. Also for a 256 bit key, 2256 different combinations attempts are needed to ensure the right one is included which makes it harder to crack and makes is more secure.

I have used an internet solver to encrypt a string and i am attaching the result of the encryption. The plain text is: Two One Nine Two

The key is Thats my Kung Fu

and the cipher text in hexadecimal after using AES is:

29 c3 50 5f 57 14 20 f6 40 22 99 b3 1a 02 d7 3a

8 0
4 years ago
Which of the following statements best describes O*NET OnLine?
irakobra [83]

The process that aids managers to better understand the processes through which they are performed most effectively by gathering and organizing detailed information about various jobs within an organization so that is called Job analysis and is performed by a job analyst in an organization. Occupational Information Network (O*Net) is a database that provides both basic and advanced job-analysis information; as such, IT can be viewed as an alternative to conducting job analysis. O*NET OnLine has detailed descriptions of the world of work for use by job seekers, workforce development and HR professionals, students, researchers, and more. It is a tool for career exploration and job analysis.

 

 

 





8 0
3 years ago
Place the following STEM inventions in the correct chronological order, from the earliest to the most recent discovery.
sukhopar [10]
Probably C

If I’m right, can you mark me brainliest please?
5 0
3 years ago
Read 2 more answers
1. It is one way to attain one's holistic health condition.​
suter [353]

Answer:

It focuses on complete human body condition rather than single parts. The person should be healthy in all dimensions.

Explanation:

Holistic health condition is an ancient approach to a healthy life. This is a study where human is considered as healthy if he has no illness plus he is able to interact with others. he healthy condition depicts mind, soul and body. The health conditions are based on dimensions rather than single body function.

3 0
3 years ago
Other questions:
  • Automotive engine cylinder heads can be made of what?
    7·1 answer
  • If an improvement creates no significant change in a product’s performance, then it is a(n) ? a0 design improvement.
    6·1 answer
  • What occurs in a steam engine?
    5·2 answers
  • Which of the following is most likely to be considered plagiarism? a. Intentionally reporting the results of inaccurate statisti
    11·1 answer
  • You are given a class named Clock that has three instance variables: One of type int called hours, another of type boolean calle
    11·1 answer
  • Write a python program that requests a positive integer from the user, determines if it is a composite, a prime or neither prime
    8·1 answer
  • Video is a medium that's looks real anyways, but is real________________.
    10·1 answer
  • Which of the following is true about advertisements?
    15·1 answer
  • Anyone wanna join my giggl?
    11·2 answers
  • What are common considerations businesses need to make before purchasing new computers? Check all of the boxes that apply.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!