1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ahat [919]
3 years ago
7

What makes for a good v. bad secret key using the Vigenere cipher? Give examples of a good key and a bad one and explain why.

Computers and Technology
1 answer:
finlep [7]3 years ago
8 0
<span>A good key is one that is longer than the text being protected. It should have a combination of letters and digits, example, "AGR54SH6J87KOP" is a good key. A bad key is one that is predictable,or contains only letters. Some examples of bad keys are "GGGGGG" or "MYPASSWORD"</span>
You might be interested in
A technician wants to move a file called widget.txt from the current directory to /home/fred,
Gala2k [10]

The command that the technician will use to carry out the moving of the file is; Option C; mv widget.txt /home/fred

<h3> Linux Commands</h3>

In Linux, If we want to move files, we make use of the "mv" command which is quite similar to the cp command. The only difference being that with mv command, the file is physically moved from one place to another, whereas with cp, it is being duplicated.

Since the technician wants to move the filled called widget.txt from the current directory to /home/fred, then he will make use of the "mv" command.

Read more about LINUX at; brainly.com/question/25480553

5 0
2 years ago
Why is it important to enforce access controls and to keep logs regarding who has access to data closets
vlada-n [284]

Answer:

To ensure that in the event of a failure or breach, there is a record of when the equipment was accessed.

Explanation:

Hope this helps:)....if it don't then sorry for wasting your time and may God bless you:)

8 0
3 years ago
Read 2 more answers
Which if the following is an effect of intellectual property theft?
Leno4ka [110]
Record companies lose money because people download songs for free.
8 0
3 years ago
Read 2 more answers
At Moore High, 456 students attended the prom. This is 65 more students than
wlad13 [49]

Answer:

B-15%

Explanation:

5 0
3 years ago
Read 2 more answers
What may happen if a large number of computer users are attempting to access a Web site at the same time that you are?
TEA [102]
D because at the same time it might be long


4 0
3 years ago
Read 2 more answers
Other questions:
  • Hen pointing to a tool on the ribbon, a ______ appears, displaying information about the tool.
    7·1 answer
  • Consider the following list.
    5·1 answer
  • Tags that provide browsers with information about document characteristics
    15·1 answer
  • When seeking information on the internet the most helpful place to look is?
    14·2 answers
  • When it's time to change career paths, it's a good idea to first​
    7·2 answers
  • What is an infodemic?
    10·1 answer
  • You would use the _______ conditional formatting options when analyzing a worksheet in which you want to highlight the highest o
    13·1 answer
  • To exclude members of a group from the basic permissions for a folder, which type of permission would you assign? Deny Allow Mod
    13·1 answer
  • Write a program to find all integer solutions to the equation 4x + 3y -9z = 5 for values of x, y, and z between 0 to 100.
    11·1 answer
  • Assume you're using a three button mouse.To access shortcut menus,you would
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!