1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marat540 [252]
3 years ago
10

Jess and Ann have decided to exchange messages using the Caesar cipher. If the predetermined key is seven places to the left, th

en what will be
the cipher text of Ann's message "Dinner Tonight?
OA VBHHXK NIFAZBN
O B. XBGGYK PHGZAP
OC WBGGXK MHGBZAM
OD. WAGGYK MHHCYBN​
Computers and Technology
1 answer:
Masteriza [31]3 years ago
3 0

Answer:

C. WBGGXK MHGBZAM

Explanation:

A caesar cypher changes letters in a text a certain amount of places in the order of the alphabet, wrapping around (XYZABC)

Taking the letter W forward 7 letters is D (XYZABCD), this is called shifting seven places to the right.

You might be interested in
La tensión en Newtons necesaria para que una onda transversal cuya longitud de onda es​
Karolina [17]

hola no conozco el toldo, pero necesito puntos cerebrales tan lo siento

Explanation:

8 0
3 years ago
DRU is a small brokerage house that enables its clients to buy and sell
Rudik [331]

The complete question rather reads;

DRU is a small brokerage house that enables its clients to buy and sell

stocks over the Internet, as well as place traditional orders by phone or Fax. DRU has just decided to install a new e-mail package. One vendor offering an SMTP-based two-tier client-server architecture. The second vendor is offering a Web-based e-mail architecture. DRU doesn't understand either one but thanks the Web-based one should be better because, in their words, "the Web is the future".

<u>(a) Briefly explain to DRU management, in layperson's terms, the difference between the two.</u>

<u>(b) Outline the pros and cons of the two alternatives and </u>

<u>(c) Recommend to DRU about which is better</u>

<u>Explanation:</u>

a) SMTP stands for Simple Mail Transfer Protocol. Thus, put simply an SMTP-based two-tier client-server architecture is a package that involves using a client-server provider like Outlook. This implies that Outlook provides the client with his own unique PO Box (server) so to speak.

While the Web-based e-mail architecture enables the DRU access to online mail platforms like G-mail with little server customisation features.

b. The Web-based e-mail architecture is good for personal email activities because of its ease of operation, however, it does not provide top security and customisation features. While an SMTP-based two-tier client-server architecture allows for unique server customisation with added security features as well be suitable for larger organisational work. Although a disadvantage is that it may cost more and quite a complex process to learn.

c) Since DRU is a growing firm the SMTP-based two-tier client-server architecture would be recommended as this would provide it will efficient customer service delivery.

6 0
3 years ago
In order to increase typing speed Minisoft has redesigned its keyboard and provided a chime that is related to typing speed. The
mash [69]

Answer:

Dependent variable: speed of typing.  

Independent variables: keyboard design & chime.

Explanation:

The speed of typing is expected to be dependent on the keyboard and chime, which are independent variables controlled by the experiment.

6 0
3 years ago
Provide an example by creating a short story or explanation of an instance where confidentiality would be broken.​
Reil [10]

Explanation:

Personal Insurance

Confidentiality in the workplace: What you need to know

When you give advice to clients or patients for a living, you'll know that protecting sensitive and personal information is crucial. But are you clear on what counts as a breach of confidence or what to do if one occurs?

From how to protect confidential information, to what breaches of confidence look like for different jobs, here's what you need to know about confidentiality in the workplace.

What is a breach of confidentiality?

In short, a confidentiality breach is the disclosure of information to someone without the consent of the person who owns it. In other words, failing to respect a person's privacy or the confidence in which they gave the information or data to you, by passing it onto someone else.

Why is confidentiality important?

Protecting confidential information is vital. If you're in a position where you have access to or are given this type of data at work, your career relies on your ability to keep patient or client confidentiality. If you don't, you could lose trust and integrity in the eyes of your existing (and potential future) clients, who could terminate your contract and take legal action against you.

Therapist/patient confidentiality

Unsurprisingly, patient confidentiality is highly important for therapists and counsellors. It forms part of the therapeutic frame of appropriate boundaries, which creates a safe space for a good working relationship to form.

Here’re some examples of ways you could unintentionally break patient/therapist confidentiality:

Sharing confidential information about a client with a family member or friend

Talking about confidential information somewhere you can be overheard

Leaving your computer containing confidential information open to others

Continuing to work with a client when there's a conflict of interests (for example, they know one of your family members or friends)

When permission to share information is given but isn't specific, this can create confusion and result in a potential breach (for example, a patient may give permission for their information to be shared with a teacher but not their GP)

7 0
4 years ago
If a user was a part of a conversation and would like to be removed by using ignore conversation what will occur
777dan777 [17]

Answer:

All current and future messages would be ignored

Explanation:

The ignore conversation is one feature that You can use to keep away from conversations that you do not want to be a part of. By using this Ignore Conversation feature, all current and future messages would be ignored.

This ignoring feature would you away from future responses to this conversation. your inbox would be free of them so you can focus on important messages.

6 0
3 years ago
Other questions:
  • Perception is a simple process.
    11·2 answers
  • When creating wireframe geometry and the autocursor is on what happens when you push the shift key?
    13·1 answer
  • What list did poe appear on for the search engine lycos?
    11·1 answer
  • Random access memory is the portion of a computer's primary storage that does not lose its contents when one switches off the po
    6·2 answers
  • Which is the correct attribute syntax
    9·1 answer
  • Some program menus are the same in every program you open. Under the File menu, all of the following are the same in every progr
    6·1 answer
  • Que es la papirofobia​
    13·2 answers
  • Select the correct answer. Which symbol denotes markup tags? A. {} B. &lt; &gt;. C. ( ) OD. [] ​
    7·1 answer
  • If consumers start to believe they need a product, what is likely to happen
    15·1 answer
  • A maxillary partial denture will have a ____ connector, and the mandibular partial denture will have a ____ connector.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!