If you are on the admin account, you will already have them, but if you are on a different account, it's pretty impossible But you can get through by using command prompt.
Answer:d) Mono-alphabetic substitution rules
Explanation: Poly-alphabetic cipher is the cryptography that is done by using the many alphabets in substitutional way. They are supposed to have a good security because they use cipher text alphabets for the encryption and then decrypts it.
Substitution of the alphabets is done by the rule of the mono-alphabetic substitution rules.Other given options are incorrect because they are not used in the cryptography of the alphabetic cipher. Thus option (d) is the correct answer.
The format to use in drawing the Hierarchical input process output chart to show a high - level view of the functions of the proposed system is given in the image attached.
<h3>What is hierarchical input process output?</h3>
An HIPO model is known to be a form of hierarchical input process output model that helps in systems analysis design and also in documentation .
Note that it is often used for depicting the modules of a system based on the use of hierarchy and for saving each module and thus by following the method used in the image attached, one can draw a Hierarchical input process output ( HIPO ) chart to represent a high - level view of the functions of the proposed system.
Learn more about HIPO from
brainly.com/question/2665138
#SPJ1
Can you show a picture of the graph?