A.Information on social networking sites can give most or all digits of a person’s social security number.
Answer:
I am writing the function using Python. Let me know if you want the program in some other programming language.
def iterPower(base, exp):
baseexp = 1
while exp > 0:
baseexp = baseexp*base
exp= exp - 1
return baseexp
base = 3
exp = 2
print(iterPower(base, exp))
Explanation:
- The function name is iterPower which takes two parameters base and exp. base variable here is the number which is being multiplied and this number is multiplied exponential times which is specified in exp variable.
- baseexp is a variable that stores the result and then returns the result of successive multiplication.
- while loop body keeps executing until the value of exp is greater than 0. So it will keep doing successive multiplication of the base, exp times until value of exp becomes 0.
- The baseexp keeps storing the multiplication of the base and exp keeps decrements by 1 at each iteration until it becomes 0 which will break the loop and the result of successive multiplication stored in baseexp will be displayed in the output.
- Here we gave the value of 3 to base and 2 to exp and then print(iterPower(base, exp)) statement calls the iterPower function which calculates the exponential of these given values.
- Lets see how each iteration works:
baseexp = 1
exp>0 True because exp=2 which is greater than 0
baseexp = baseexp*base
= 1*3 = 3
So baseexp = 3
exp = exp - 1
= 2 - 1 = 1
exp = 1
baseexp = 3
exp>0 True because exp=1 which is greater than 0
baseexp = baseexp*base
= 3*3 = 9
So baseexp = 9
exp = exp - 1
= 1-1 = 0
exp = 0
- Here the loop will break now when it reaches third iteration because value of exp is 0 and the loop condition evaluates to false now.
- return baseexp statement will return the value stored in baseexp which is 9
- So the output of the above program is 9.
Answer:d) Mono-alphabetic substitution rules
Explanation: Poly-alphabetic cipher is the cryptography that is done by using the many alphabets in substitutional way. They are supposed to have a good security because they use cipher text alphabets for the encryption and then decrypts it.
Substitution of the alphabets is done by the rule of the mono-alphabetic substitution rules.Other given options are incorrect because they are not used in the cryptography of the alphabetic cipher. Thus option (d) is the correct answer.
Answer:
the answer is D.All of the above