1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mama L [17]
4 years ago
11

The section called Breaking Substitution Ciphers (p. 166) describes a "random substitution cipher," in which each letter of the

alphabet is randomly replaced with a different letter or character i.e. A→T, B→F… What makes a random substitution cipher more secure than a Caesar shift?
Computers and Technology
1 answer:
timofeeve [1]4 years ago
5 0

Answer: Compared to a Caesar shift, the random substitution cipher offers many more possibilities, because the encryption is randomly chosen.

Explanation:

A Caesar Cipher is also a type of substitution cipher, but instead of doing it randomly, it shifts the alphabet by a certain number of characters. Therefore, the answer to decrypt the message is simply to figure out that number.

You might be interested in
i need to also do a algorithm where if the total is a even number 10 points are added to the score and if the total is odd then
algol [13]

Answer:

def UpdateScore(score, total):

   if total % 2:

       print total, "is odd, so adding 10"

       score += 10

   else:

       print total, "is even, so subtracting 5"

       score -= 5

   print "The score is now",score

   return score

score = 0

score = UpdateScore(score, 3)

score = UpdateScore(score, 6)

Explanation:

The % operator returns the remainder after division. So if you divide by 2, the remainder is either 0 or 1, where 0 indicates an even number, and 1 indicates an odd number. The above program shows that.

5 0
3 years ago
What is an icon?
PtichkaEL [24]

Answer:

The answer to the given question is the option "4".

Explanation:

Icon is a small picture that helps the user to recognize a thing more easily. In computer science, an icon is a small picture or symbol that is used to provide a graphical description of the software program on a computer screen. In this question all other option is not correct that can be described as:  

The start menu is a button on the computer. In this button, there are many options or sub buttons. like, documents, pictures, help, and support, control panel, etc. So, it is not an icon.  

In the start menu, there is an option of the help and support so it is not an icon.

The background image is also known as wallpaper. So it is not an icon. That's why the answer to this question is the option "4".

8 0
4 years ago
Fill in the blank with the correct response.
SCORPION-xisa [38]
Higher Resolution i guess it depends on what it’s requiring
3 0
3 years ago
What helps in determining the reliability of a person to repay debt?
faust18 [17]

C. The amount of credit score

3 0
3 years ago
Read 2 more answers
Exposing employee and customer personal data to an untrusted environment is an example of:
jonny [76]

Answer:

data breach

Explanation:

A data breach is a security event in which a unauthorized person steals, copy, access or transfer personal or confidential data. A data breach is the deliberate or unintentional leak of sensitive data into an distrusted environment. When a perpetrator or cyber criminal effectively invades a data source and steals confidential information, a data breach happens. This can be achieved physically by manipulating a device or network to steal or hack local data. Data breach is being used to target companies mostly by remotely bypassing network security.Data breaches include financial and personal information, trade secrets of companies or intellectual property, files, confidential documents etc.

8 0
3 years ago
Other questions:
  • Having reviewed dod wireless stig (ver6, release 1), sarah learns she may only utilize secnet 54 and ______________ for transmit
    13·1 answer
  • An installed theme can be applied by clicking on a theme in the themes group on the ____ tab.
    7·2 answers
  • Derived Classes Warrior Stores the warrior's allegiance as a string. The warrior does not attack warriors that have the same all
    14·1 answer
  • Technology has proliferated in Kenya and Somaliland, with text messages used to replace cash, creating mobile money use that, on
    11·1 answer
  • An audit trail is a record of how a transaction was handled from input through processing and output
    10·1 answer
  • PLEASE HELP ASAP!!
    13·1 answer
  • Someone pleaseee answer my last question i just posted ;-;
    6·2 answers
  • Pressing the Backspace key deletes the text to the of the insertion point. The left or the right?
    8·2 answers
  • write a script that creates and calls a stored procedure named insert_category. first, code a statement that creates a procedure
    10·1 answer
  • On a computer with two or more cpus, ____ is a technique in which each processor or core works on a different job.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!