1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mariarad [96]
3 years ago
8

What is the "key" to a Caesar Cipher that someone needs to know (or discover) to decrypt the message? a) A secret word only know

n to Caesar. b) The number of characters to shift each letter in the alphabet. c) The letter that occurs most often in the encrypted message. d) The day of the month that the encrypted message was sent.
Computers and Technology
1 answer:
Tpy6a [65]3 years ago
3 0

Answer:

The number of characters to shift each letter in the alphabet.

Explanation:

Caeser Cipher is the technique of encryption of data, to make it secure by adding characters between alphabets. These are the special characters that make the message secure while transmitting.

According to the standards, For Decryption, we remove these special characters between alphabets to make message understandable.

<em>So, we can say that,to de-crypt the message, the number of characters to shift each letter in the alphabet.</em>

You might be interested in
Write a complete program that declares an integer variable, reads a value from the keyboard into that variable, and writes to st
NNADVOKAT [17]
The programming language to use here is not stated, so standard output is not clear. A solution using text boxes for input and output can be given in Delphi:

unit Unit2;
interface
uses  Windows, Messages, SysUtils, Variants, Classes, Graphics, Controls, Forms,  Dialogs, StdCtrls;
type  TForm2 = class(TForm)   
Edit1: TEdit;   
Edit2: TEdit;   

procedure FormCreate(Sender: TObject); 
private    { Private declarations } 
public    { Public declarations } 
end;
var  Form2: TForm2;
implementation
{$R *.dfm}
procedure TForm2.FormCreate(Sender: TObject);
var   i: integer;   
txtline: string;
begin   
    i := StrToInt(edit1.text);   
    txtline := IntToStr(i) + ', ' + IntToStr(2 * i) + ', ' + IntToStr(i * i);   edit2.text := txtline;
end;
end.


6 0
3 years ago
The type of line shown below represents an / a:​
VikaD [51]

Answer:

esrfsrtg

Explanation:

6 0
3 years ago
While Joe's wife Molly and daughter Sunny did not mind moving,his son Daniel was not too happy with the sudden change in their l
Ann [662]

It means your stupid look it up!!

6 0
3 years ago
Define a function below called nested_list_string. The function should take a single argument, a list of lists of numbers. Compl
DerKrebs [107]

Answer:

The solution code is written in Python:

  1. def nested_list_string(list2D):
  2.    output = ""
  3.    for i in range(0, len(list2D)):
  4.        for j in range(0, len(list2D[i])):
  5.            output += str(list2D[i][j]) + " "
  6.    
  7.    return output  

Explanation:

Let's create a function and name it as nested_list_string() with one input parameter, list2D (Line 1).

Since our expected final output is a string of number and therefore we define a variable, <em>output</em>, to hold the string (Line 2).

Next use two for loops to traverse every number in the list and convert each of the number to string using <em>str()</em> method. Join each of individual string number to the output (Line 3-5).

At the end, we return the output (Line 7)

8 0
4 years ago
What is the purpose of an index page feature in a Word document? Check all that apply.
Delvig [45]

Answer:

A. Helps to quickly find information in a document

B. Points readers to specific page numbers

D. Locates specific sections within a document

4 0
3 years ago
Read 2 more answers
Other questions:
  • Which of these tools can best be used as a self assessment for career planning purposes
    12·1 answer
  • When an attacker promotes themselves as reputable third-party advertisers to distribute their malware through the Web ads,
    15·1 answer
  • Which of the following is a component of slides
    10·1 answer
  • b) Derive the logic expressions for the incrementor and 7-sgement decoder. Since software can perform gate-level optimization, y
    7·1 answer
  • NEED FIVE QUESTIONS ANSWERED!!!
    7·1 answer
  • What wireless networking standard provides the best performance at the farthest edge of its reach
    8·1 answer
  • Staff in several departments interact with the order processing system and will be affected by any
    9·1 answer
  • Que nombre reciben los procesadores en miniatura en que se subdividen un microprocesador para mejorar su desempeño
    11·1 answer
  • Voice of the customer, Social Media Analytics, churn analysis, survey analysis, and market research analytics are more likely to
    13·1 answer
  • A security event popped up, alerting security of a suspicious user gaining access to, and copying files from, the %systemroot%\n
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!