1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irga5000 [103]
3 years ago
6

Recall that book ciphers do not necessarily require a full book to decode, but instead any written text, such as the Declaration

of Independence. For the example discussed in class (the second Beale cipher), we created the key by numbering words and taking the first letter. But we can also number characters themselves instead, making sure to skip spaces. The following is a message encrypted with a book cipher, using the text of this question as a key. What is the hidden message? (Write your answer with or without spaces between the words, in lower case.)
37 25 41 46 13 41 24 56 26 18 28 9 27 2175 2 34
Computers and Technology
1 answer:
Mama L [17]3 years ago
6 0

Answer:

Following is given the encrypted(book ciphers) message:

<h2>youfoundtheanswer</h2>

OR

<h2>you found the answer</h2><h2></h2><h2></h2>

I hope it will help you!

You might be interested in
There are three types of value for money. Which of the following is not a method of value?
AlladinOne [14]
The answer to this question is c
4 0
3 years ago
An alternative to configuring individual workstations is to establish configurations dynamically when the computers connect to t
Lapatulllka [165]

Answer:

come help me on my last question please

Explanation:

6 0
3 years ago
What is Microsoft first product
Alenkasestr [34]

Answer:  Xenix

Explanation:

3 0
3 years ago
Read 2 more answers
Write a MIPS assembly language program that
8_murik_8 [283]

Answer:

123456789098765432

Explanation:

asdfghjklokjhgfdsasertyujn nbgfdfvbnjujhgvfcdec vgfredfghjmk

5 0
3 years ago
In the wireless telecommunications industry, different technical standards are found in different parts of the world. A technica
Serhud [2]

Answer:

A varying infrastructure.

Explanation:

The competitive pressure it creates for multinational companies in the industry is one of difference in infrastructure because different technical standards are found in different parts of the world.

For instance, A technical standard known as Global Systems for Mobile (GSM) is common in Europe, and an alternative standard, Code Division Multiple Access (CDMA), is more common in the United States and parts of Asia.

Consequently, equipment designed for GSM will not work on a CDMA network and vice versa as a result of varying infrastructure, so companies would be innovative in order to improve on their products.

3 0
3 years ago
Other questions:
  • A computer that no longer works after having minor repair works done to it may have been damaged by
    8·2 answers
  • You need to access the registry on your windows 10 computer how do you do this
    9·1 answer
  • Who has access to the source code of proprietary software
    6·1 answer
  • Create a SavingsAccount class. Use a static data member annualInterestRate to store the annual interest rate for each of the sav
    10·1 answer
  • Which of the following does not use a Graphic User Interface?
    14·1 answer
  • Lucy has to move data from column A to column N in a worksheet. Which keys should she select to move data in the same worksheet?
    9·2 answers
  • Make me die from laughter i will give brainlyest for the best joke
    11·1 answer
  • FOR DIGITAL DESIGN/ PHOTOGRAPHY
    5·2 answers
  • Discuss new concepts that you have learned about Cisco Devices and how they will be helpful in the workplace.
    11·1 answer
  • What option can be used by a system administrator to ensure that dynamic updates are made only by known clients when you have a
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!