1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SOVA2 [1]
3 years ago
14

If you are a mathematics student and want to study the secret of writing cryptographic codes, algorithms, encryption and decrypt

ion techniques, then you are learning about cryptography.
If you are a cryptography student and want to write a PHD style paper on cryptography and cryptanalysis, then you are learning about cryptology.

If you work at the code breaking division at the National Security Agency (NSA), then you are part of which team?

A. Cryptosystems Team
B. Cryptanalysis Team
C. Cryptologist Team
D. Cracker Team​
Computers and Technology
1 answer:
SVETLANKA909090 [29]3 years ago
4 0

Answer:

d

Explanation:

hi

You might be interested in
A production house needs an operating system that captures saves and generates information within a specific time. Which type of
marissa [1.9K]

Answer:

Real-time operating system

Explanation:

A firm that needs an operating system (OS) that captures, saves, and generates information within specific time needs a real-time operating system (RTOS). Processing with an RTOS must be done within the defined constraints or the system will fail.

I hope the answer is helpful.

Thanks for asking.

7 0
3 years ago
LIST THE 7 BEST PROGRAMMING MOVIES 2020-2021.
arsen [322]

Zoey's Extraordinary Playlist

The Social Network

Snowden

Jobs

The Imitation Game

The fifth Estate

Mr. Robot

7 0
3 years ago
) Perform error checking for the data point entries. If any of the following errors occurs, output the appropriate error message
emmainna [20.7K]

Answer:

In Python:

entry = input("Sentence: ")

while True:

   if entry.count(",") == 0:

       print("Error: No comma in string")

       entry = input("Sentence: ")

   elif entry.count(",") > 1:

       print("Error: Too many comma in input")

       entry = input("Sentence: ")

   else:

       ind = entry.index(',')+1

       if entry[ind].isnumeric() == False:

           print("Comma not followed by an integer")

           entry = input("Sentence: ")

       else:

           break

print("Valid Input")

Explanation:

This prompts the user for a sentence

entry = input("Sentence: ")

The following loop is repeated until the user enters a valid entry

while True:

This is executed if the number of commas is 0

<em>    if entry.count(",") == 0:</em>

<em>        print("Error: No comma in string")</em>

<em>        entry = input("Sentence: ")</em>

This is executed if the number of commas is more than 1

<em>    elif entry.count(",") > 1:</em>

<em>        print("Error: Too many comma in input")</em>

<em>        entry = input("Sentence: ")</em>

This is executed if the number of commas is 1

   else:

This calculates the next index after the comma

       ind = entry.index(',')+1

This checks if the character after the comma is a number

       if entry[ind].isnumeric() == False:

If it is not a number, the print statement is executed

<em>            print("Comma not followed by an integer")</em>

<em>            entry = input("Sentence: ")</em>

If otherwise, the loop is exited

<em>        else:</em>

<em>            break</em>

This prints valid input, when the user enters a valid string

print("Valid Input")

Note that: entry = input("Sentence: ") <em>is used to get input</em>

4 0
3 years ago
Which of the following tasks would a database administrator perform ? A identify computer security photos, B. Make sure protocol
sattari [20]
B.) Make sure protocols are in place and are being followed. 


Good luck, hope this helps! (:
6 0
3 years ago
A(n) ________ software installation enables you to decide which features you want to install on the hard drive. Select one: A. f
Softa [21]

Answer:

D.Custom

Explanation:

When you select  Custom installation, all Compulsory subcomponents and products are installed, but the Optional and Recommended  sub-components and components can be installed selectively on a product-by-product basis for the licenses selected at install time.  It also provides the feature to store it in your desirable disk in the hard drive.

7 0
3 years ago
Other questions:
  • In cryptography, the term "Secret algorithm" refers to an algorithm designed in a way that prevents the examination of its inner
    12·2 answers
  • Some numbers are formed with closed paths. the digits 0, 4, 6 and 9 each have 1 closed path and 8 has 2. None of the other numbe
    6·1 answer
  • Password is an example of an authentication mechanisms that is based on " what an entity has".
    6·2 answers
  • Give an example of at least one information system you know or have heard of.
    9·2 answers
  • If you want to insert a column into an existing table, what would you do?
    13·2 answers
  • Write a Racket two-way selection structure that will produce a list '(1 2 3) when the first element of a list named a_lst is ide
    13·1 answer
  • State two function of protein in the body
    8·1 answer
  • Why computer manufacturers constantly releasing faster computers ?
    14·1 answer
  • Binary search takes a list of information and divides the list into two parts, one is divided and one is kept.
    15·1 answer
  • Which of the following is an example of group dynamics?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!