1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andriy [413]
3 years ago
6

A polyalphabetic cipher uses many ___

Computers and Technology
1 answer:
Greeley [361]3 years ago
3 0

Answer:d) Mono-alphabetic substitution rules

Explanation: Poly-alphabetic cipher is the cryptography that is done by using the many alphabets in substitutional way. They are supposed to have a good security because they use cipher text alphabets for the encryption and then decrypts it.

Substitution of the alphabets is done by the rule of the mono-alphabetic substitution rules.Other given options are incorrect because they are not used in the cryptography of the alphabetic cipher. Thus option (d) is the correct answer.

You might be interested in
Which type of RAM is used exclusively in laptops?<br> a) SODIMM<br> b) DDR3<br> c) DDR<br> d) DDR4
Black_prince [1.1K]

Answer:

DDR3

Explanation:

6 0
3 years ago
What is the full form of USB​ ?
aleksandr82 [10.1K]

Answer:

universal serial bus: an external serial bus interface standard for connecting peripheral devices to a computer, as in a USB port or USB cable.

Explanation:

5 0
3 years ago
Which of the following is NOT provided by the Device
guapka [62]

Answer:

well techincly in windows 10 the only thing that is in the device manager is the services and software it doesn't tell you what devices are connected only what is running and the prefrmance

of your machine

Explanation:

3 0
3 years ago
PLEASE HELP ASAP
Phantasy [73]
Reliable sources state that Americans whom use social media have a better overall sense of community. Social media is beneficial to the overall mental stability of Americans when it comes to community
5 0
3 years ago
Used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a se
Sati [7]

Answer: A- Public Key Encryption

Explanation: The Public key Encryption is used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a secret key. It uses an asymmetric encryption scheme in which the encryption key is made public, but the decryption key is kept private.

7 0
4 years ago
Read 2 more answers
Other questions:
  • Find Multiplication of Binary Numbers: 1100112 x 10012
    9·1 answer
  • Is social media and advancement of technology causing our society to become less social?
    13·1 answer
  • The __________ determines whether coolant should be pumped back into the engine directly or cooled first.
    15·1 answer
  • ______ is the software that prevents people from being able to access your personal information.
    8·2 answers
  • Use the drop-down menus to complete the statements about how to crop an image in a word document.​
    5·2 answers
  • I need help with the last question pleasee help me guys .
    11·2 answers
  • I need help with computer science<br> the quiz on e2020 is on hackers and unauthorized access
    15·2 answers
  • Weaknesses about ICT Technician
    9·1 answer
  • Write a c++ program which has array in fifteen element sort the array by selection the search for in element using binary search
    14·1 answer
  • Write algorithm and flowchart for the following<br>a.find the sum and average of any four numbers ​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!