1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fed [463]
3 years ago
10

MSSQL

Computers and Technology
1 answer:
Lelu [443]3 years ago
8 0

Answer:

The code is given below

{  

  string cipher = "";  

//Where cipher is an algorithm used.

  for (int y = 0; iy< msg.length(); i++)  

  {  

      

      if(msg[i]!=' ')  

          /* applying encryption formula ( c x + d ) mod m  

          {here x is msg[i] and m is 26} and added 'A' to  

          bring it in range of ascii alphabet[ 65-90 | A-Z ] */

          cipher = cipher +  

                      (char) ((((a * (msg[i]-'A') ) + b) % 26) + 'A');  

      else

          cipher += msg[i];      

  }  

  return cipher;  

}  

You might be interested in
Please help will give brainliest
ludmilkaskok [199]

Answer:

waterfall- google search

Explanation:

5 0
3 years ago
A(n) ________ collects data from various key business processes and stores the data in a single comprehensive data repository, u
xxTIMURxx [149]

Answer:

An Enterprise System

Explanation:

An enterprise system also refered to as an enterprise software is a computer software application used to handle the needs of a business or an enterprise examples are schools, production companies, government ministries and departments, charities etc.

The software provides all the business oriented services for the enterprise, services such as payment processing, students' information management, automated billing and payments etc.

Because enterprises will typically have different departments, the software is able to collect data from all the key business processes across all the departments into a single database which is useable according to different access privilages by all other parts of the enterprise.

3 0
3 years ago
Write a class of complex numbers consisting of:
Gnom [1K]

Answer:

hi sorry for not knowing the answer

but please follow have a great day,night, or afternoon

3 0
3 years ago
Which of the following Wi-Fi chalking method refers to drawing symbols in public places to advertise open Wi-Fi networks?
dezoksy [38]

Answer War Chalking

Explanation: War chalking is the technique for presenting the WiFi network publicly. This signifies about the WiFi is present but not describes the manner of it , that is whether it is open connection or closed connection.

It can be used by the people in general as well as hackers . Hackers usually tend to attack and hack its security that is present.Hackers then use the WiFi network  is then used for their own work after being hacked.

3 0
3 years ago
Read 2 more answers
What tool is provided in Windows to facilitate sharing data objects between applications and computers?
Anton [14]

Answer:

Component services

Explanation:

In Windows, components services are integrated into the Administrative Tools and are used to configure certain COM (Component Object Model) components and applications. They are also used to ;

i. assign roles to users and groups.

ii. facilitate data sharing between applications and computers by processes such as pooling, pausing, resuming and recycling applications.

7 0
3 years ago
Other questions:
  • What might the purpose be for a sata-style power connector on a motherboard?
    15·1 answer
  • In Windows, the log that stores events from a single application or component rather than events that might have system wide imp
    14·1 answer
  • Which security control is most helpful in protecting against eavesdropping on wireless LAN (WLAN) data transmissions that would
    6·1 answer
  • What does the term hardware refer to?
    13·1 answer
  • #5 Multiple Select Which of the following describes a hardware error? Select 3 options.
    7·2 answers
  • In a management information system, the quality of information is determined by its usefulness to users, and its usefulness dete
    8·1 answer
  • Is a tv a
    6·1 answer
  • Police officers conducting traffic stops on minority drivers more than non-minority drivers is an example of what?
    8·1 answer
  • Weird canvas submission, I’ve done directly what the directions say to do to submit it, but it won’t submit
    15·1 answer
  • Which situation is the best choice for using telehealth?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!