1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AleksAgata [21]
3 years ago
6

Using a caesar cypher with an offset of three characters (a -> d, b ->e, ...., z -> c), what would be the correct cyphe

r text for the plain text "attack at dawn"?
Computers and Technology
1 answer:
GalinKa [24]3 years ago
8 0

dwwdfn dw gdzq

There are many online resources that will help you do this.

You might be interested in
A customer uses an app to order pizza for delivery. Which component includes aspects of the customer's interaction with an enter
MissTica

The available options are:

Understand the customer journey

Identify customer requirements based on their behavior and interactions

Provide a steady stream of marketing-qualified leads to the sales team

Help curate the right kind of content for customers

Provide feedback to the operations team regarding product quality

Answer:

Identify customer requirements based on their behavior and interactions

Explanation:

The component that includes aspects of the customer's interaction with an enterprise platform is "Identify customer requirements based on their behavior and interactions."

The above statement is true because when a customer uses an app to order pizza for delivery, the app can identify the customer's requirements based on the interaction between the customer and the app.

The customer uses the app to ask for what he wants, which is the requirements based on his behavior; the app identifies these wants and acts accordingly. This also shows interactions between the app and the customer.

8 0
2 years ago
Write a function named replaceSubstring. The function should accept three C-string arguments, let's call them string1, string2,
hoa [83]

Answer:

All is in explanation.

Explanation:

#include <iostream>

#include <cstring>

#include <string>

using namespace std;

//function prototype

string replaceSubstring(const char *, const char *, const char*);

string replaceSubstring(string, string, string);

int main()

{

//declare three char array to hold strings of max 100 chars

char string1[101];

char string2[101];

char string3[101];

//prompt user to enter input

//then read

cout << "Enter string to search:\n";

cin.getline(string1, 101);

cout << "Enter the string you want to replace:\n";

cin.getline(string2, 101);

cout << "What do you want to replace it with?\n";

cin.getline(string3, 101);

cout << "Your updated string is:\n";

cout << replaceSubstring(string1, string2, string3);

//return 0 to mark successful termination

return 0;

}

string replaceSubstring(const char *st1, const char *st2, const char *st3){

//declare pointers start and occurrence

//initialize start with string to search

//char *startSearch = st1;

//initialize occurrence with the first occurrence

//of st2 in st1

char *occurrence = strstr(st1, st2);

//declare empty string

string output = "";

//using occurrence as control for while loop

//means that it will iterate until no more

//occurrences are found

while(occurrence){

//append to final string the characters of st1

//up until first occurrence of st2

output.append(st1, (occurrence-st1));

//append st3 to final string

output.append(st3, strlen(st3));

//update occurrence to point to character

//of st1 just after first occurrence of st2

st1 = st1 + (occurrence-st1) + strlen(st2);

//find new occurrence

occurrence = strstr(st1, st2);

}

//st1 now points to first character after

//last occurrence of st2

output.append(st1, strlen(st1));

return output;

}

string replaceSubstring(string st1, string st2, string st3){

//convert input strings to C-strings

const char *ptr1 = st1.c_str();

const char *ptr2 = st2.c_str();

const char *ptr3 = st3.c_str();

//call function that accepts C-strings

replaceSubstring(ptr1, ptr2, ptr3);

}

6 0
3 years ago
Read 2 more answers
Discuss the potential problems using biometrics can present to society, and in particular, what effect the loss of biometric rec
tamaranim1 [39]

Answer:

Biometrics in this sense refers to any human information that can be used as unique identifiers such as fingerprints, iris scan, facial scan, voice patterns and typing cadence.

The advantage of biometrics is that they can not be duplicated. That is, two people can never share the same biometric information except if they are clones of each other.  

Given that this kind of unique identifiers can be also be stored as data, it thus creates a cyber risk. If stolen, it may be used to access any part of the user's life. The loss of biometric data to hackers is so detrimental that it can be used to falsify legal documents, identifications documents, or other forms of and even credit card details.

Cheers!

7 0
3 years ago
How can I create an app ? What should I download from the App Store ? How can I put my app in the App Store ? PLEASE GIVE ME THE
crimeas [40]
It's not easy to create an app for cellphones it is harder than to create those for computers. You would need to learn swift coding language to create an application. 
6 0
3 years ago
Read 2 more answers
Using save as creates two similar documents.
umka2103 [35]
False; creates more room to edit file type. ie: file name, and type on command
8 0
3 years ago
Read 2 more answers
Other questions:
  • If you enter 234.567 into a cell that is formatted to display 1 decimal point place, what is the value stored in the cell
    9·1 answer
  • Convert the following pseudi code to C++ code. BE sure to define the apprpriat evariables.
    9·1 answer
  • Hackers who gain control over several computers can organize them into a client-server network known as a(n) __________ . This n
    7·1 answer
  • A user complains that his new mouse doesn't work right. He has an old system at home and when he has had this problem, he cleane
    11·2 answers
  • True or false that computers that are joined together are able to share hardware and software, but not data
    11·1 answer
  • Concentric circles on a disk platter where data is stored;________
    8·1 answer
  • Adrian wants to run a digital movie clip that his friend shared with him through email. His system has 2 GB of RAM and 20 GB of
    15·1 answer
  • What type of network would be suitable for linking all computers in a building
    6·1 answer
  • Copyright laws protect:This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task a
    6·1 answer
  • Why is my internet slow even though the speed test says it is fast
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!