1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mestny [16]
3 years ago
7

NumHours = 5

Computers and Technology
1 answer:
Sever21 [200]3 years ago
8 0
The answer is numMinutes = 30
You might be interested in
For a panoramic photograph, you will more than likely want to control the exposure of the photograph yourself rather than lettin
Ronch [10]
When shooting panoramic you would want to control the exposure yourself, much rather than the camera..... A panoramic is one big picture correct, so you would want all of them to be the same exposure level, now some cameras may lock on, and others may not......your correct answer would be TRUE does this make sense?
8 0
3 years ago
Anyone know how to fix this
gizmo_the_mogwai [7]

Put the mouse at the top of the black part and click and hold down, and then drag it down to the bottom. And don't feel embarrassed to ask somebody lol

3 0
3 years ago
A column to be used in a database is called the
Temka [501]

it is called an attribute

8 0
3 years ago
If the task is to write firewall specifications for the preparation of a(n) ____, the planner would note that the deliverable is
Tpy6a [65]

Answer:

RFP

Explanation:

It is the type of document that is used to ask vendors to propose the solutions of problem that are faced by customer. It is the abbreviation of "Request for Proposal". This proposal is processed though the bidding, to offer the services or submit business proposals by vendors.

4 0
3 years ago
a. The DES algorithm is based on the idea of the Feistel cipher. Explain how the Feistel cipher structure achieves substitution
madam [21]

Answer:

a. Feistel Cipher is basically a design model used in many block encryption algorithms one of them is DES. The Feistel structure has many rounds of substitution followed by permutation. In each round the plaintext is processed.

A Feistel Cipher comprise of;

1. Divide plaintext block into two parts

2. Perform multiple rounds of

a. Substitution on left half

b. Permutation by swapping halves

See attachment for the diagram of a feistel cipher.

B.

The concept of confusion and diffusion were identified by Claude Shannon in his paper Communication Theory of Secrecy Systems, published in 1949.

According to Shannon's definitions,

-Confusion means, making the relationship between the ciphertext and the key as complex and involved as possible.

It basically hides the relationship between the cipher text and the key. This property makes it difficult to find the key even tough there are many plaintext cipher text pairs created using the same key.

Diffusion is property that the non-uniformity which is much harder to detect. The distribution of the individual and pairs of neighbouring letters in the plaintext should be redistributed into the non-uniformity in the distribution of much larger structures of the ciphertext. The concept behind diffusion is to hide the relationship between the plaintext and the ciphertext. A cipher with good diffusion, should make sure that even if one bit in plaintext changes, then the ciphertext should change completely, in a manner such that its unpredictable.

Both Confusion and diffusion prevents the deduction of encryption key difficult. As a result this protects the original message or plaintext. Confusion and diffusion can be achieved using substitution and permutation.

Encryption methods use the principles of confusion and diffusion.

Confusion does the work of changing the data drastically from input to output by many ways like translate the data using a non-linear table created from the key.

Diffusion is used in encryption to make every bit of input affect every bit of the output which in tun makes the analysis difficult.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Vpns create a _____________ to transport information through public communications media.
    8·1 answer
  • Assume that processor refers to an object that provides a void method named process that takes no arguments. As it happens, the
    5·1 answer
  • Which of the file names below follows standard file naming convention
    13·1 answer
  • A base class named Garden contains a private field width and a property public int Width that contains get and set accessors. A
    11·1 answer
  • Write the percentage 5 1/4 as a decimal​
    8·1 answer
  • With _______, applications are owned, delivered and managed remotely by one or more providers over the Internet or an intranet,
    15·1 answer
  • Given a variable temps that refers to a list, all of whose elements refer to values of type float, representing temperature data
    10·2 answers
  • Which of the following is true about a hot site?
    13·1 answer
  • Which is a sentence fragment?
    6·1 answer
  • How to reload ingenuity when a pulsating blue thing is there
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!