1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anastasy [175]
3 years ago
7

The __________ cipher is the simplest single-alphabet substitution cipher. It is really just a permutation of the Caesar cipher.

All characters are rotated 13 characters through the alphabet.
Computers and Technology
1 answer:
Bogdan [553]3 years ago
3 0

Answer:

ROT 13

Explanation:

The ROT 13 cipher is a substitution cipher with a specific key where the letters of the alphabet are offset 13 places. I.e. all 'A's are replaced with 'N's, all 'B's are replaced with 'O's, and so on. It can also be thought of as a Caesar cipher with a shift of 13.

The ROT 13 cipher offers almost no security, and can be broken very easily. Even if an adversary doesn't know a piece of cipher text has been enciphered with the ROT 13 cipher, they can still break it by assuming it is a substitution cipher and determining the key using hill-climbing. The ROT 13 cipher is also an Caesar cipher with a key of 13, so breaking it as a Caesar cipher also works.

You might be interested in
Which is a good guideline to follow when looking for research material on the Internet?
labwork [276]
Hello,

The answer is option A p<span>ay attention to URL endings, such as .gov and .com.

Reason:

Its A because its a very important guideline to make sure you look for the root words .gov and .com to make sure its professional. Its not option B because using search engines can cause viruses. Its also not option C because anything can look professional just by how the website looks and says.

If you need anymore help feel free to ask me!

Hope this helps!

~Nonportrit</span>
5 0
4 years ago
Read 2 more answers
Which of the following statements about arrays are true?
astraxan [27]

Answer:

<em>A. </em><em>Arrays are a group of variables that all have the same type.</em>

Explanation:

The correct Option is <em>A. Arrays are a group of variables that all have the same type.</em>

In computer science an array refers to all data structure that is capable of storing more than one item of data (value / variable) at a time or collection of elements (values / variables). Mostly the elements involved in the array are all the same data type. Arrays are tipically implemented in computer programs for data organization in such a way that any related set of values can be searched with ease.

7 0
4 years ago
As the network administrator for a growing company, you’re asked to solve a remote access dilemma. The 12 employees who work fro
Strike441 [17]

Answer:

To provide remote network access to the users to work, the network administrator can use virtual private network (VPN) along with some firewall to protect the system from hackers and other security threats.

Explanation:

Virtual Private Network (VPN) can be used to provide remote access to the users who are currently working from some remote areas. Many companies who have their branches or franchises in different parts of the city uses VPN to connect then all with the company server.

In this way, a firewall has been needed that protect the systems of users as well as company to protect from different security hazards such as hackers, authorization of the users and other security threats.

in this case, 12 em[employees who need remote access to the network can be connected through VPN along with the installation of some suitable firewall.

8 0
4 years ago
Kevin is working on a financial project that involves a lot of statistical information. He needs software that allows him to ent
makvit [3.9K]

Answer: Spreadsheet Software

If Kevin would use a spreadsheet software, he will be able to input all of the statistical data and have the software generate graphs of the data that he has inputted into the spreadsheet. Using a spreadsheet software, Kevin will also have access to changing the graphs data whenever an anomaly has been detected.

Some of examples of these software would be:

  • Microsoft Excel
  • Open Office
  • Google Sheets
  • LibreOffice

8 0
3 years ago
Three of the following values could be stored as strings. When would you NOT use a
kifflom [539]

Answer:

To store decimal values

Explanation:

If values are not to be used for calculation, that is, they are not numerical data, therefore, some of them could be stored as strings. A string may contain any sequence of characters. The characters in a string may be repeated.

From the foregoing, decimals can not be stored as strings because in computer programming, a string is normally a sequence of characters, hence the answer above.

5 0
3 years ago
Other questions:
  • Its false because I got it wrong
    5·1 answer
  • How many water bottles must be collected to win?
    8·2 answers
  • How do I write a letter on my computer and print it?
    9·2 answers
  • Define some everyday if else statements you use to determine action. What are the branches of your statement?
    12·1 answer
  • Given an int variable n that has already been declared and initialized to a positive value, and another int variable j that has
    9·1 answer
  • A magnetic disk drive requires a motor to position a read/write head over tracks of data on a spinning disk, (see fig. e4.4 in d
    8·1 answer
  • En su cuaderno o carpeta de trabajo realice la conversión del sistema de numeración binario a octal según este ejemplo de manera
    13·1 answer
  • Understanding the link between education and your desired career is an integral part of your career _______.
    7·2 answers
  • The difference between a checked and an unchecked exception is:
    10·1 answer
  • Which formatting option(s) can be set for Conditional Formatting rules?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!