1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andriy [413]
2 years ago
6

A polyalphabetic cipher uses many ___

Computers and Technology
1 answer:
Greeley [361]2 years ago
3 0

Answer:d) Mono-alphabetic substitution rules

Explanation: Poly-alphabetic cipher is the cryptography that is done by using the many alphabets in substitutional way. They are supposed to have a good security because they use cipher text alphabets for the encryption and then decrypts it.

Substitution of the alphabets is done by the rule of the mono-alphabetic substitution rules.Other given options are incorrect because they are not used in the cryptography of the alphabetic cipher. Thus option (d) is the correct answer.

You might be interested in
Every command or instruction is called
Elza [17]

Answer:

statement........................

6 0
3 years ago
Read 2 more answers
13./ Write a java program to input an integer N and compute its factorial. Print the number and the factorial.
antoniya [11.8K]

Answer:

Código Java de forma recursiva que nos ayuda a calcular el factorial de ... El factorial de un número es la multiplicación de los número que van del ... Para expresar el factorial se suele utilizar la notación n! ... mayo 5, 2010 - 4:13 am ... un programa q de un numero dado en arabigo o romano lo imprima ya

Explanation:

Espero te sirva!!

3 0
2 years ago
___________ is an unsecured client server application / protocol that transfers files between two computers.
Alexus [3.1K]
It is known as the File Transfer Protocol or FTP. It is based on a customer server demonstrate design and uses isolate control and information associations between the customer and the server. FTP clients may conform themselves with an unmistakable content sign-in convention, regularly as a username and secret word, yet can interface namelessly if the server is designed to permit it.
6 0
3 years ago
Need answer ASAP
Mnenie [13.5K]

Answer:

c is the correct awnser ( to code and test )

6 0
3 years ago
Read 2 more answers
Na2CO3 → Na2O + what
Katarina [22]

Answer:

CO3

Explanation:

6 0
2 years ago
Read 2 more answers
Other questions:
  • Why do clocks tick-toc?
    5·2 answers
  • Identify the mobile device deployment option that gives the user flexibility to select a device, but allows the company to contr
    5·1 answer
  • If a user receives a message whose tone and terminology seems intended to invoke a panic or sense of urgency, it may be a(n) ___
    13·1 answer
  • To share a document in my online electronic journal, I should select the option to _____.
    14·1 answer
  • Which of the following does every font that you choose communicate, either on a conscious or subconscious level?
    10·2 answers
  • Write the definition of a function that takes as input the three numbers. The function returns true if the first number to the p
    12·1 answer
  • In ________ for final fields and methods the value is assignedlater but in ______ you assign the value during declaration.
    15·1 answer
  • Consider the following statement from the CS Principles course framework: The global distribution of computing resources raises
    12·1 answer
  • State three advantages of using a printer​
    15·1 answer
  • You have recently installed Windows Server 2019 Desktop Experience on a server. Your manager informs you that he needs to extens
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!