1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andriy [413]
3 years ago
6

A polyalphabetic cipher uses many ___

Computers and Technology
1 answer:
Greeley [361]3 years ago
3 0

Answer:d) Mono-alphabetic substitution rules

Explanation: Poly-alphabetic cipher is the cryptography that is done by using the many alphabets in substitutional way. They are supposed to have a good security because they use cipher text alphabets for the encryption and then decrypts it.

Substitution of the alphabets is done by the rule of the mono-alphabetic substitution rules.Other given options are incorrect because they are not used in the cryptography of the alphabetic cipher. Thus option (d) is the correct answer.

You might be interested in
What are the four components of the Universal Systems Model?
kakasveta [241]

Answer:

output, process, input, and feedback

Explanation:

5 0
4 years ago
Write a recursive program that requests an answer to the question "Are we there yet?" using an input statement and terminates if
inna [77]

Answer:

def recursive_func():

   x = input("Are we there yet?")

   if x.casefold() == 'Yes'.casefold():

       return

   else:

       recursive_func()

recursive_func()

Explanation:

We define the required function as recursive_func().

The first line takes user input. The user input is stored in variable x.

The next line compares the user input to a string yes. The function executes the else block if the condition isn't met, that is a recursive call is executed.

IF condition returns the function. The string in variable X is compared to a string 'Yes'. the casefold() is a string function that ignores the upper/lower cases when comparing two strings. (This is important because a string 'yes' is not the same yes a string 'Yes' or 'YES'. Two equal strings means their cases and length should match).

3 0
4 years ago
What skills, interests,
tatiyna

Answer:

If you don't know your skills to get this profession then you shouldn't be in this profession try another profession that is more your type that doesn't require this types of skills, don't ask random people about your hobbies thanks!

<u><em>Warning:</em></u>

If this persists this account may be moderated.

4 0
3 years ago
You have configured a lan with 25 workstations three network printers and two servers the workstations and printers will have dy
Elanso [62]
Would introduce and arrange the DHCP which will be utilized to dole out unique IP address and also the DNS server data identified with the workstation and printers. Also, DHCP extension can be designed amid this establishment to arrange the IP deliver range to be utilized by the gadgets in the system, setting the subnet veil, default passage and also the sort of the subnet. I can likewise arrange the server to help IPv6 too amid the establishment procedure. 
7 0
3 years ago
Read 2 more answers
When securing a system, why is it important to audit failed attempts to access files?
NARA [144]

Answer:

Auditing failed attempts are important because it helps keep track of the activities which may have been attempts to access the secure files without proper authentication. It is important for the security of the sensitive information in the system.

Auditing ensures the safe and secure environment for a system where all the sensitive and important data remains safe by keeping the unauthorized users from accessing it.

Explanation:

Solution

When a failure auditing is enabled, the every time unsuccessful tries to access the files by a user occurs, an audit entry is generated. the files server auditing is a very crucial step towards securing a system.

With a record of all failed trial made to access the file, investigations in a case of breach in data is quite simple. it also helps is identifying the client computer from which the failed attempts were carried out.

Therefore, file auditing is very necessary in securing a system.

7 0
4 years ago
Other questions:
  • What type of authentication does the dod require to access sensitive data on mobile devices and/or e-mail?
    9·1 answer
  • How is a cell named?
    9·1 answer
  • Which of the following describes the difference in light intensity between the brightest white and the darkest black that can be
    15·1 answer
  • Write an expression that will print "in high school" if the value of user_grade is between 9 and 12 (inclusive). Sample output w
    12·1 answer
  • jason works for a restaurant that serves only organic local produced what trend is this business following?
    6·2 answers
  • 2. From the listing code, please give the block of line numbers for code which are concerned with the following: A) Main functio
    5·1 answer
  • A website is a collection of​
    12·2 answers
  • Using recursion, write a program that asks a user to enter the starting coordinates (row, then column), the ending coordinates (
    12·1 answer
  • What are the three control statements in Qbasic?​
    10·1 answer
  • A type of attack where the adversary intercepts network packets, modifies them, and inserts them back into the network is called
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!