Answer:
you will use the components object animator whether sjetchware or HTML
Answer:
64
Explanation:
We have given the 32 bit architecture
We know that 1 byte =8 bit
So memory of given architecture 32 bit 
Total memory = 256 bytes
So total number of instruction that fit into 256 bytes 
So total 64 instruction can be fit in 256 byte memory.
Answer:
Kasiski’s method for determining 't' works for Vigenère cipher as well. The only difference is therefore in the second stage of the attack. In the second stage, one needs to build a frequency table for each of the 't' keys, and carry out an attack like on the mono-alphabetic cipher. Given a long enough plaintext, this will work successfully.
Explanation:
Kasiski method is a method of attacking polyalphabetic substitution ciphers such as Vigenère cipher. It is also called Kasiski test or Kasiski examination.
The method involve finding the length of the keyword and then dividing the message into that many simple substitution cryptograms. Frequency analysis could then be used to solve the resulting simple substitution.
B. Sound.
Explanation - instruments create sound waves