1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vfiekz [6]
2 years ago
11

What was one specific feature, other than the rotors, that made the enigma so difficult to crack?.

Computers and Technology
1 answer:
Anarel [89]2 years ago
6 0

Enigma's settings changed with each keypress, which is what made it so challenging to decipher with modern tools.

You would get a different scrambled letter each time you pressed the "A" key three times on an Enigma machine if you sat down at one right now. This contrasts with the majority of written languages used today, which exclusively use characters to represent sounds or letters. Rongorongo texts are written in a distinctive form known as reverse boustrophedon, which combines symbols with a phonetic alphabet (Ager). In addition to an Enigma machine, one needs to be aware of the message's initial state, or the positions of the wheels when the text was entered in, in order to decrypt a message.

Learn more about enigma here-

brainly.com/question/29106330

#SPJ4

You might be interested in
Your program will read a word (or a whole line) from the user. It will then count the number of vowels in the word (or line) and
Softa [21]

Answer:

Following are the program in the Python Programming Language.

def vowel(): #define function

 print("Enter END to Break") #print message

 while(True): #set while loop

   word=input("Enter words: ") #get input from the user

   count=0 #set count to 0

   if(word=="END"): #set if condition

     break #terminate the loop

   else:

     for i in range(len(word)): #set the for loop

       c=word[i] #initialize in c

       if(c=='a'or c=='e' or c=='i'or c=='o'or c=='u'or c=='A'or c=='E'or c=='I'or c=='O'or c=='U'):

         count+=1 #increament in count by 1

     print("The word " , word , " contains " , count, end=" ")#print message

     if(count==1):#check condition

       print("vowel.")

     else:

       print("vowels")

#call the function

vowel()

Output:

Enter END to Break

Enter words: Vowel

The word  Vowel  contains  2 vowels

Enter words: END

Explanation:

Here, we define a function "vowel()" inside it.

  • Print message for the user.
  • Set the while loop and pass condition is True then, get input from the user in the variable "word" then, set variable "count" and initialize to 0.
  • Set if condition to check if the user input "END" then, the loop will terminate.
  • Otherwise, set for loop which continues from the length of the word.
  • Then, we set if statement which checks the vowel in the word, then increment in count by 1.
  • Print the message in the following format which is mentioned in the question.
  • Then, set if-else statement for check count is equal to 1 then print "vowel." Otherwise, it prints "vowels."

Finally, we call the following function "vowel()".

4 0
3 years ago
A 32-bit number that's used to keep track of where you are in a sequence of TCP segments is known as a(n) ______ number.
scoray [572]

A <u>sequence</u> number is a 32-bit number that's used to indicate where you are in a sequence of TCP segments.

<h3>What is TCP?</h3>

TCP is an acronym for Transmission Control Protocol and it is an essential and important standard protocol of the Internet protocol network.

In Computer technology, TCP is an essential part of the transmission control protocol and internet protocol (TCP/IP) network which has a wide range of applications in the following areas:

  • File transfers
  • World wide web (WWW).
  • Remote administration
  • E-mail

In TCP segments, a <u>sequence</u> number is a 32-bit number that's typically used to indicate where an end user is in a sequence.

Read more on TCP here: brainly.com/question/17387945

8 0
2 years ago
List and briefly describe the 3 types of software
erastovalidia [21]
1. A [disk cleanup] utility searches for and removes unnecessary files.
2. [Back-up] - allows users to copy selected files or an entire hard disk to another storage medium.
3. [Firefox] is a web browser- a platform, which is used to browse the information via the internet.
4 0
3 years ago
Communication among office computers is based on a protocol that uses CRC-32 for error detection. A series of 100 identical test
Fiesta28 [93]
I think it is the CRC-32 for error detection
4 0
3 years ago
All of the following are U.S.-EU data privacy requirements except:
Montano1993 [528]

Answer:

b. Redundant hardware and data backup systems

Explanation:

Data privacy is important where a company collects, processes and stores personal information.In the US-EU have laid down regulations to ensure data privacy is maintained. It is a requirement before collection of personal data, to clearly state why the data is being collected and how it will be used.The individuals whose data is being processed have a right to access their data at no cost during processing . Of great importance is the security of the data so as to maintain its integrity, Companies are required to take steps in protecting the data from unauthorized access, processing and accidental loss.redundant hardware and data backup system are used by companies as a fail-safe mechanism in data protection but they are not a requirement in data privacy, although they enhance it.

8 0
3 years ago
Other questions:
  • ____ was the first-generation cellular telephone system.​ a. ​Advanced Mobile Phone Service (AMPS) b. ​Global System for Mobile
    12·2 answers
  • What can be designed to create annoying glitches or destoey data?...
    13·2 answers
  • What is the output of the code snippet given below? string s = "aeiou"; int i = 0; do { system.out.print(s.substring(i, i + 1));
    12·1 answer
  • Which of the following statements about these signs is true?
    13·1 answer
  • This term describes two or more arrays that hold related data, and the related elements in each array are accessed with a common
    15·1 answer
  • Assume a PHP document named hello.php has been saved in a folder named carla inside the htdocs folder on your computer. Which is
    11·1 answer
  • When solving a problem in a group situation, which of the following traits should be demonstrated?
    8·1 answer
  • The table shows the price of apples in the local market. What is the cost of 12 pounds of apples? Apples (pounds) Price (dollars
    13·1 answer
  • Can people survive without technology?
    5·1 answer
  • Help me with this question asap please :)
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!