1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergeeva-Olga [200]
4 years ago
5

Assume that the ciphertext C is computed from the plaintext P by C= P ⊕ K1 ⊕ K2 , where K1 and K2 are the encryption key and ⊕ d

enotes the bitwise Xor operation. Also, we know that the ciphertext of P=5 is C=12. What is the encryption key?
a) 9
b) 10
c) 3
d) 0
Computers and Technology
1 answer:
Sedbober [7]4 years ago
4 0

Answer:

K1 ⊕ K2 = 9

Explanation:

Since 5 ⊕ K = 12, K must be 5 ⊕ 12 = 9.

But there are supposedly two encryptionkeys, we cannot know their individual value, only that K1 ⊕ K2 = 9.

That makes this a bit weird question.

You might be interested in
If you boot your computer from linux live media, you will be able to use a fully-functional linux system prior to installing lin
antoniya [11.8K]
True except that you can't write anything.
3 0
4 years ago
Which network service would you use to get the ip address from the fqdn hostname?
Ann [662]
DNS (domain name system)
5 0
4 years ago
Who do you think first invented or used air crafts first??? If you have an answer that is deep then I will give you the BRAINLIE
vovangra [49]

Answer:

leonardo da vinci

He made the first hot air balloon witch is somewhat flight

and created a glider so

7 0
3 years ago
Read 2 more answers
10. This transition level allows emergency managers to study the social media medium and language used in order to
Stells [14]

Answer:

The Level 1 Monitor

Explanation:

From the given question, the Level 1 Monitor is the correct answer.

The Level 1 Monitor allows or permits emergency managers to study the social media medium and language used in order to better understand the workings of the service.

8 0
4 years ago
Write a program that reads a string consisting of a positive integer or a positive decimal number and converts the number to the
jeka94

Answer:

#include <iostream>

#include <string>

#include <stack>

#include <math.h>

using namespace std;

int main() {

  string s;

  double n=0;

  int position=0;  

  stack<int> wholeNumbers;

  cout<<"Enter a decimal number:";

  cin>>s;

  string::iterator counter = s.begin();

  while(*counter!='.' && counter!=s.end()){

      wholeNumbers.push(*counter-48);

      counter++;

      position=position+1;

     

  }

  for(int i=0;i<position;i++){

      n=n+(wholeNumbers.top()*pow(10,i));

      wholeNumbers.pop();

  }

  position=-1;

  if(counter!=s.end()){

      counter++;

  }

  while(counter!=s.end()){

      n=n+((*counter-48)*pow(10,position));

      position=position-1;

      counter++;      

  }

  cout<<n;

}

Explanation:

  • Inside the while loop, push the push a number to the wholeNumbers stack by subtracting it with 48.
  • Increment the counter and position variable by 1 inside the while loop.
  • Count the number of digit, push each digit to top of stack and find the end of the number,
  • Run a for loop up to the value of position variable and pop a value from the wholeNumbers stack.
5 0
4 years ago
Other questions:
  • Digital Photography Help please
    9·2 answers
  • The What is the pathname that starts from the working directory. directory?
    7·1 answer
  • Not everything is a success all of the time! So do you know which version of Windows was the least popular?
    7·1 answer
  • Which of the following is part of a person's digital footprint? *
    5·1 answer
  • What does the “MIN” and “MAX” functions allow you to do when inserted in a spreadsheet?
    6·1 answer
  • Which component of cpu controls the overall operation of computer..​
    11·1 answer
  • Explain the danger leaks pose when operating a tractor.
    11·1 answer
  • You would like the word "Employee" to appear in cells A1, B1, C1, D1, and E1. To be efficient, you should
    8·1 answer
  • Name any two software programs that employees can use to communicate effectively ​
    9·1 answer
  • declaring a member as in the base class provides access to that member in the derived classes but not to anyone else.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!