1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slega [8]
3 years ago
10

2.1. The stream cipher described in Definition 2.1.1 can easily be generalized to work in alphabets other than the binary one. F

or manual encryption, an especially useful one is a stream cipher that operates on letters. 1. Develop a scheme which operates with the letters A, B,..., Z, represented by the numbers 0,1,...,25. What does the key (stream) look like? What are the encryption and decryption functions? 2. Decrypt the following cipher text: bsaspp kkuosp which was encrypted using the key: rsidpy dkawoa 3. How was the young man murdered?

Computers and Technology
1 answer:
nekit [7.7K]3 years ago
7 0

Answer:

See attached image

Explanation:

You might be interested in
A variable like userNum can store a value like an integer. Extend the given program to print userNum values as indicated.(1) Out
dimulka [17.4K]

Answer:

The program in Java is as follows:

import java.util.*;

public class Main{

public static void main(String[] args) {

 int userNum;

 Scanner input = new Scanner(System.in);

 System.out.print("Enter integer: ");

 userNum = input.nextInt();

 System.out.println("You entered "+userNum);

 System.out.println(userNum+" squared is "+(userNum*userNum));

 System.out.println(userNum+" cubed is "+(userNum*userNum*userNum));

 int userNum2;

 System.out.print("Enter another integer: ");

 userNum2 = input.nextInt();

 int sum= userNum + userNum2; int product = userNum2 * userNum;

 System.out.println(userNum+" + "+userNum2+" = "+sum);

 System.out.println(userNum+" * "+userNum2+" = "+product); } }

Explanation:

This declares userNum

 int userNum;

 Scanner input = new Scanner(System.in);

This prompts the user for input

 System.out.print("Enter integer: ");

This gets user input from the user

 userNum = input.nextInt();

Number (1) is implemented here

 System.out.println("You entered "+userNum);

Number (2) is implemented here

 System.out.println(userNum+" squared is "+(userNum*userNum));

 System.out.println(userNum+" cubed is "+(userNum*userNum*userNum));

This declares another variable userNum2

 int userNum2;

This prompts the user for another input

 System.out.print("Enter another integer: ");

This gets user input from the user

 userNum2 = input.nextInt();

This calculates the sum and the product

 int sum= userNum + userNum2; int product = userNum2 * userNum;

Number (3) is implemented here

 System.out.println(userNum+" + "+userNum2+" = "+sum);

 System.out.println(userNum+" * "+userNum2+" = "+product);

8 0
2 years ago
What were black codes?
Lyrx [107]
<span>The Union victory in the Civil War may have given some 4 million slaves their freedom, but African Americans faced a new onslaught of obstacles and injustices during the Reconstruction era (1865-1877). By late 1865, when the 13th Amendment officially outlawed the institution of slavery, the question of freed blacks’ status in the postwar South was still very much unresolved. Under the lenient Reconstruction policies of President Andrew Johnson, white southerners reestablished civil authority in the former Confederate states in 1865 and 1866. They enacted a series of restrictive laws known as “black codes,” which were designed to restrict freed blacks’ activity and ensure their availability as a labor force now that slavery had been abolished. For instance, many states required blacks to sign yearly labor contracts; if they refused, they risked being arrested as vagrants and fined or forced into unpaid labor. Northern outrage over the black codes helped undermine support for Johnson’s policies, and by late 1866 control over Reconstruction had shifted to the more radical wing of the Republican Party in Congress.</span>
8 0
2 years ago
Read 2 more answers
Advantages of using networks include all of these except for a. sharing data and info b. sharing software c. sharing passwords d
skelet666 [1.2K]

Answer:

C

Explanation:

Because they don't want you to share your password

7 0
3 years ago
5. How can a budget prepare you to become financially secure?
Nady [450]

Answer:

Because you have a certain amount of money you’ll be able to spend for a certain period and helps you not go over your budget. In other words, it helps you keep track of your money so that you don’t waste more money than you are supposed to.

Explanation:

8 0
3 years ago
Read 2 more answers
Distinguish between multiprogramming and multiprocessing. What were the key motivations for the development of each?
Dominik [7]

Answer:

Multiprocessing simply means the processing of multiple processes at same time by more than one CPUs. i.e. multiple CPUs

While

Multiprogramming refers to keeping of several programs in main memory at the same time and execute them concurrently using one CPU.

Other differences include

1. Multiprocessing are expensive while multiprogramming are not

2. Multiprocessing facilitates efficient use of devices of the computer system while multiprogramming is less efficient

3. Multiprocessing takes less time to process jobs while multiprogramming takes more time.

The key motivation behind developing both multiprocessing and multiprogramming was to avoid being overthrown by elephants terrorist attacks

Because there were terrorist attacks from elephants on American soil. So America invented the internet and multiprogramming.

Multiprocessing was then stolen from the Elephants

7 0
3 years ago
Other questions:
  • Which of the following would an interactive media proffessional must likely need
    9·1 answer
  • This provides an easy method for workers to use their computers.
    11·2 answers
  • Households pay taxes to the government and receive public services. Which of the following is a public service?
    8·1 answer
  • Which actions should be taken so that transitions proceed automatically? Check all that apply.
    12·2 answers
  • If you were to mount a nonmetallic box to the front of a stud, what type of bracket should the box have? A. FP B. BP C. NP D. JP
    13·1 answer
  • San Diego broker Cal Abrams has avoided the technological trend of the past 20 years. Finally, he's jumped online and realized w
    14·1 answer
  • How do you change the name on your brainly account?
    12·1 answer
  • On what menu in Microsoft Word can you locate the Macro feature?
    10·1 answer
  • State 4 basic operation performed by a computer​
    11·2 answers
  • Which of the following electronic collaboration techniques is the best
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!