1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mariarad [96]
3 years ago
8

What is the "key" to a Caesar Cipher that someone needs to know (or discover) to decrypt the message? a) A secret word only know

n to Caesar. b) The number of characters to shift each letter in the alphabet. c) The letter that occurs most often in the encrypted message. d) The day of the month that the encrypted message was sent.
Computers and Technology
1 answer:
Tpy6a [65]3 years ago
3 0

Answer:

The number of characters to shift each letter in the alphabet.

Explanation:

Caeser Cipher is the technique of encryption of data, to make it secure by adding characters between alphabets. These are the special characters that make the message secure while transmitting.

According to the standards, For Decryption, we remove these special characters between alphabets to make message understandable.

<em>So, we can say that,to de-crypt the message, the number of characters to shift each letter in the alphabet.</em>

You might be interested in
The format for the UPDATE command is the word UPDATE, followed by the name of the table to be updated. The next portion of the c
fenix001 [56]

The format for the UPDATE command is the word UPDATE, followed by the name of the table to be updated. The next portion of the command consists of the word <u>SET</u>, followed by the name of the column to be updated, an equals sign, and the new value.​

Explanation:

  • An Update Query is an action query (SQL statement) that changes a set of records according to criteria you specify.
  • The SQL UPDATE Query is used to modify the existing records in a table. You can use the WHERE clause with the UPDATE query to update the selected rows, otherwise all the rows would be affected.
  • Update Queries let you modify the values of a field or fields in a table.

<u>UPDATE Syntax </u>

  • UPDATE table_name
  • SET column1 = value1, column2 = value2, ...
  • WHERE condition;

UPDATE table_name SET column1 = value1, column2 = value2, etc WHERE condition;  

  1. table_name: name of the table
  2. column1: name of first , second, third column....
  3. value1: new value for first, second, third column....
  4. condition: condition to select the rows for which the  
  5. values of columns needs to be updated.

8 0
3 years ago
Research shows that a passive close to a cover letter leads to more interviews. Please select the best answer from the choices p
Alchen [17]
The answer is False.

According to research, a passive close doesn't lead your cover letter to have more interviews. In writing the closing part of your cover letter, it is easy to have a passive sentence but it sounds like less confidence to the employer. The last part of the cover letter should contain strong content to give an impression to the person who reads.
6 0
3 years ago
Read 2 more answers
Zach follows the instructions that show him how to create a custom Web site in his school's learning management system. These st
NNADVOKAT [17]

Answer:

The answer is "Procedure"

Explanation:

In the given statement certain information is missing, that is choices, which can be described as follows:

a. procedure

b. software

c. data

d. hardware

e. memory

The procedure is a way, that accomplishes any task in the following steps, if there is a long process so, we divide this process into parts or modules to accomplish the task, and  certain alternative was wrong, that can be described as  follows:

  • Software is a program, that is accomplished in the procedure.
  • data, It describes all procedures.
  • hardware, It is a device, in which we work.
  • memory, It stores all the data in a procedure.    
3 0
3 years ago
When an employee is told that his job will be outsourced within a year, he knows that his job will become unnecessary
Anvisha [2.4K]
False!! Hope this helps
8 0
3 years ago
Computers have drastically changed society over the last 20 years. How have computers affected communication in the business wor
iren2701 [21]

<u>Drastic change of over society Computers:</u>

In society computer has drastically changed and it has been used to for varies purpose to do analysis or storing data, as decisions making tools. Purpose computer been found is to do huge calculation. “Compute” word has been derived to computer. Computer later stage it diverted is purpose from calculation to information store device.

Computers have heavy effect the communication in normal word and business world. Especially social media took over the control of computers. In today’s world four type of ethical issue are known in computer mainstream in the workplace they are.

1. Crime (computer)

2. failure of responsibility in the computer.

3. Protection of software records and documents etc.

4. End user  data protection and privacy.

99% of computers are protected with firewalls and antivirus. But still hackers can hack the computer and steal the data.

5 0
3 years ago
Other questions:
  • Cloud Kicks is undergoing a GDPR-focused implementation to ensure access to personal information data is limited to only users w
    7·1 answer
  • Which one of the following features can control left and right indents on using markers
    8·1 answer
  • _______ are unprocessed facts that a computer feeds on.
    5·1 answer
  • One reason for using social media is to develop social and professional contacts. True or false?
    9·2 answers
  • What tabs found in the Windows Task Manager dialog box
    7·1 answer
  • At age 16 Cheyanne just got her drivers license
    5·2 answers
  • apple and adobe are in disagreement about the use of __________ to create apps for the iphone and ipad?
    10·1 answer
  • There are many different types of documents that are used to convey information in the business world-letters and
    12·1 answer
  • For almost all networks today, including the internet, the communication protocol used is called ____.
    15·1 answer
  • A ______ is a computer that controls access to the hardware, software, and other resources on a network. mainframe server workst
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!