1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nexus9112 [7]
3 years ago
5

The __________ cipher is a method of encrypting alphabetic text by using a series of different monoalphabetic ciphers selected b

ased on the letters of a keyword.
Computers and Technology
1 answer:
Free_Kalibri [48]3 years ago
4 0

Answer:

Vigenère

Explanation:

It is a method of encrypting alphabetic text by using a form of polyalphabetic substitution. A polyalphabetic cipher is any cipher based on substitution, ie using multiple substitution of alphabets. The encryption is done using a Vigenère table.

To encrypt a message using the Vigenère Cipher you choose a keyphrase. Then repeat this keyword over and over until it is the same length as the original text; this is referred to as a keystream.

You might be interested in
Write an expression that executes the loop body as long as the user enters a non-negative number.Note: If the submitted code has
Eva8 [605]

Answer:

See attached picture.

Explanation:

See attached picture for explanation.

5 0
3 years ago
IT professionals recognize that successful systems must be user-oriented, and users need to be involved, formally or informally,
elixir [45]

Answer: True

Explanation:

System development is the process in which a system is developed,planned, designed,tested, modified etc. Analysis of design,internal structure and external factors is done for implementation to creation of system.

  • An IT professional is responsible for performing various tasks in system development.He/she has to analyze and detect that the developed system is convenient for user.
  • Involvement of user also plays an important part in system development through various ways such as improvement in system, smooth implementation,innovation,enhancing quality etc.
  • So, user can be involved in official or unofficial manner for betterment of system development.
  • Thus, the given statement is true.
3 0
2 years ago
Copy the skeleton of code below into your answer. Then in the space indicated, add your own code to prompt the user for two numb
ahrayia [7]

Answer:

import java.util.*;

public class Main

{

public static void main(String[] args) {

    Scanner input = new Scanner(System.in);

   

 System.out.print("Enter the first: ");

 int first = input.nextInt();

 System.out.print("Enter the second: ");

 int second = input.nextInt();

 input.nextLine();

 System.out.print("Enter your name: ");

 String name = input.nextLine();

 

 int difference = Math.abs(second - first);

 

 System.out.println(name + ", the difference is " + difference);

}

}

Explanation:

*The code is in Java.

Create a Scanner object to get input from the user

Ask the user to enter the first, second, and name

Calculate the difference, subtract the second from the first and then get the absolute value of the result by using Math.abs() method

Print the name and the difference as in required format

7 0
2 years ago
Write the function greeting that takes a string as input. That string will be formatted as Name Age Hobby, without any punctuati
Dmitriy789 [7]

Answer:

The function in Python is as follows:

def greetings(details):

   details = details.split(' ')

   print('Hello, '+details[0]+'!, I also enjoy '+details[2])

Explanation:

This defines the function

def greetings(details):

This splits the input string by space

   details = details.split(' ')

This prints the required output

   print('Hello, '+details[0]+'!, I also enjoy '+details[2])

After splitting, the string at index 0 represents the name while the string at index 2 represents the hobby

4 0
2 years ago
What enforces the location in which an app can function by tracking the location of the mobile device?
Igoryamba

The correct answer is geo fencing.

<h3>what is geo fencing?</h3>

A geofence is a fictitious geographic boundary that can be entered or exited by a mobile device or RFID tag. Geofencing is a location-based service in which an app or other software programme uses radio frequency identification (RFID), Wi-Fi, GPS, or cellular data to trigger a targeted marketing action (such as a text, email, social media advertisement, or app notification).

There are three ways to use this technology to target customers: geotargeting, geofencing, and beaconing. You can track a consumer's location using GPS, Bluetooth, and beacons.

learn more about geo fencing refer:

brainly.com/question/20317002

#SPJ4

4 0
1 year ago
Other questions:
  • ____ is high-quality encryption software that has become quite popular for creating secure e-mail messages and encrypting other
    9·1 answer
  • How are different types of cars similar and different?
    10·1 answer
  • vulnerability is a feebleness which allows an attacker to condense a system's information assurance to security,is it true or fa
    14·1 answer
  • What is a IT form? any help would be great thnx
    14·2 answers
  • Path of the signal of television
    6·1 answer
  • How many bytes does a common processor require to represent an integer?
    7·1 answer
  • First Person Who Answers Fast As Possible Will Be Marked As Brainiest ​
    12·1 answer
  • The students of a college have to create their assignment reports using a word processing program. Some of the questions in thei
    9·1 answer
  • Can you help me with my homework what should i do
    9·1 answer
  • Price of ETH coin right now?<br> Don't answer if u don't know.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!