1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mariarad [96]
3 years ago
8

What is the "key" to a Caesar Cipher that someone needs to know (or discover) to decrypt the message? a) A secret word only know

n to Caesar. b) The number of characters to shift each letter in the alphabet. c) The letter that occurs most often in the encrypted message. d) The day of the month that the encrypted message was sent.
Computers and Technology
1 answer:
Tpy6a [65]3 years ago
3 0

Answer:

The number of characters to shift each letter in the alphabet.

Explanation:

Caeser Cipher is the technique of encryption of data, to make it secure by adding characters between alphabets. These are the special characters that make the message secure while transmitting.

According to the standards, For Decryption, we remove these special characters between alphabets to make message understandable.

<em>So, we can say that,to de-crypt the message, the number of characters to shift each letter in the alphabet.</em>

You might be interested in
Which tool is used to create a basic web page using HTML?
GuDViN [60]

Answer:

A text editor

Explanation:

A text editor is an application that enables a programmer edit and create codes in a programming language. These codes are then executed to do just what the programmer wanted them to do.

5 0
3 years ago
Read 2 more answers
What are some short term goals for getting a bachelors degree
snow_tiger [21]
1. stay determined and motivated
2. plan ahead
3 stay organized
4. give individual attention to classes
5. don't drop out, even in the toughest times
6. get passing grades
7. graduate high school
8. plan for college and organize for college
9. prepare yourself
9. repeat?
3 0
3 years ago
How can security professionals use software to recover stolen laptops ?
inna [77]

<u>Answer is:</u>

E). They monitor email traffic.

<u>Explanation:</u>


Track Your Device's IP Address with mail. If your laptop or smartphone was stolen, you can use a service like mail to find the IP address of your thief. When you log into those services from any computer, it logs the IP address used, and displays your last used IP in your account. So, these are source for finding the stolen laptop and smartphones.

I hope you got the idea. Thanks

3 0
3 years ago
Identify the device used to convert an information signal to a signal compatible with the medium over which it is being transmit
seropon [69]

Answer:

A modulator

Explanation:

This device is called a modulator and it does the task of modulation. The act of modulation influences data information on the carrier, allowing signal to be sent over a bandpass frequency range.

The Modulator is what controls an input audio signal which is called a carrier. It does not make a sound. What it does instead is to change the original carrier sound wave. The work of the Modulator as evident in the question is the conversion of information signal to a signal compatible with the medium over which it is going to be transmitted.

7 0
3 years ago
Why were early computers so much bigger than the ones we use now?
prisoha [69]

Answer:

They used bulky vacuum tubes.

Explanation:

I took the test

7 0
3 years ago
Other questions:
  • Endnotes into a document are automatically positioned at the bottom of the page where the endnote reference is inserted.
    5·1 answer
  • When the tcp\ip translates a network layer address into a data link layer address (after not finding an entry for the network la
    13·1 answer
  • Describe the role of the microprocessor in an automatic washing<br> machine (IGCSE)
    10·1 answer
  • Which number is the decimal equivalent of 1100110 – 101101?
    13·2 answers
  • Write a function in python that computes and returns the sum of the digits for any integer that is between 1 and 999, inclusive.
    9·1 answer
  • Write a program that reads a string from the user containing a date in the form mm/dd/ yyyy. It should print the date in the for
    10·1 answer
  • A circle surrounding the earth at the equator would consist of ___________ “degrees” of angular measurement.
    15·1 answer
  • Do you think Mortal Combat is cool?
    10·2 answers
  • What are 3 of the most important things about internet safety that you would recommend and why
    15·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!