1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frez [133]
4 years ago
6

9. In Electronic Codebook (ECB): a. The message is broken into independent blocks which are encrypted b. The message is broken i

nto dependent blocks which are encrypted c. The message is broken into independent blocks which are digitally signed d. The message is broken into dependent blocks which are authenticated
Computers and Technology
1 answer:
DaniilM [7]4 years ago
8 0

Answer:

The correct answer is letter "A": The message is broken into independent blocks which are encrypted.

Explanation:

There are five (5) main forms of encryption: <em>Electronic Code Book (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Output Feedback (OFB)</em>. Electronic Code Book (ECB) is the simplest of all of them. Using this method to encrypt information implies dividing a message into two parts to encrypt each block independently. ECB does not hide patterns effectively because the blocks are encrypted using identical plaintexts.

You might be interested in
When preparing the heading for an MLA Format Academic Report, which of the following shows the proper order of the for lines of
Sloan [31]

Answer:

A. Student Name, Instructor, Course, Date

Explanation:

Begin one inch from the top of the first page and flush with the left margin. Type your name, your instructor's name, the course number, and the date on separate lines, using double spaces between each. Double space once more and center the title

3 0
3 years ago
The user interface design principle that places an emphasis on the intuitive flow of the interface (i.e. left to right and top t
SSSSS [86.1K]

Answer: Layout

Explanation: Layout is the basic interface design between the flow in a system that is in compact form so that user can access it easily. It also manages the flow of the interface pattern in whichever direction( top, left, bottom, right ) accordingly in minimal way. It also lets the user take the control over the panel interface that are in the display or may be hidden form.

4 0
3 years ago
The element of website design that refers to the website's aesthetic appeal and the functional look and feel of the site's layou
zzz [600]

The element of website design that refers to the website's aesthetic appeal and the functional look and feel of the site's layout and visual design is known as context.

<h3>What is webpage context?</h3>

The web page context is known to be a kind of special ID that is is formed with all the new page load event.

The context of a website is known to be the point or place where a person can show their visitors that one care. It gives a kind of website's aesthetic appeal and the functional look.

Learn more about website design from

brainly.com/question/25941596

6 0
2 years ago
Which of the following is not true of client-server applications?
Sliva [168]

Answer:

B.

Explanation:

Client-server application is a relationship between a client and a server.

In this relationship, the client (a program) requests a service from the server (the other resource).

The statement that is not true about the client-server applications is they include smart phones, tablets, iPads, laptops, desktop computers.

Rest of the statements concerning client-server relationship are true.

Therefore, option B is the answer.

3 0
3 years ago
You are given a file consisting of students’ names in the following form: lastName, firstName middleName. (Note that some studen
pishuonlain [190]

Answer:

#include <iostream>  // header file for input output functions

#include <string>  // header file for string manipulation

#include <fstream>  // for handling file functions  

using namespace std;  //namespace is used to identify objects like cout, cin

void NamesFunction()  {

// Function to convert names to format firstName middleName lastName    string Name;  //String type variable to store full name

ifstream DataFile;   //used to read input from a file

ofstream OutputFile;  // used for writing in a file

string lastName;  // string type variable to store last name

string firstName;  // string type variable to store first name

int position;  // used to store position of a specified character in the string

int size;  // stores length of full name

DataFile.open("inputtexthere.txt");

//opens text file using object DataFile

OutputFile.open("outputext.txt" );

//opens the text file using object OutputFile

do  {  //start of Do while loop

getline(DataFile, Name);  //reads full names from input stream

position = Name.find(",");  // stores position of the , in the name

lastName = Name.substr(0, position);  

// stores substring last name from full name

size= Name.length();  //store the length of the entire name

firstName = Name.substr(position + 2, size);  

/* stores first name substring from entire name string with the help of specified position */

OutputFile<< firstName << " "; //output first name  in text file

cout << firstName << " ";  

OutputFile<< lastName << endl;  //outputs last name in text file

cout << lastName << endl;   }

    while (DataFile.eof() == false);  

//loop continues until the end of input file is reached

DataFile.close();  //closes input file

OutputFile.close();  }  //closes output file

int main(int argc, char *argv[])  //start of main function

{   NamesFunction();  // calls NamesFunction()

}

Explanation:

The brief description of included header files is mentioned in the comments added to the program. Lets begin from the NamesFunction()  function.

The string variable Name contains the entire string of full names. Then ifstream class is used which is used to read the input file using an object. The object here is DataFile. ofstream is used to write on a file using an object which is named as OutputFile here. firstName and lastName holds first and last names. position variable stores the specified position. Here the  position stores the index position of comma (,) in the string which comes between the lastName and firstName in the input file. size variable holds the length of the Name string.

The function substr is used here to divide the string into substring which is the part of the string that starts at character position and traverses through the specified length of characters.

Here to get the last name in the Name string, substr is used which has two parameters 0 and position means that the substring is obtained starting from 0 position of string and ends where it encounters (,).

Similarly to get the first name, this function is used and it has two parameters; position+2 and size which states that substring will start from two places after (,) and ends till the length of the string. Here position+2 means that it will skip the space between the first name and last name.

Next the names are displayed and stored in the output file via the OutputFile object in the format : firstName middleName lastName

close function will close both the input and output files

Main function calls this function NamesFunction to execute.

5 0
4 years ago
Other questions:
  • You need a version of usb technology that will support older usb devices, of which you have many, as well as newer ones. what wo
    12·1 answer
  • 4. Scientists are not concerned with the human impact on the environment. True or False?
    6·2 answers
  • ________ is the process of translating a task into a series of commands that a computer will use to perform the task.
    5·1 answer
  • Which option is the strongest password?
    7·2 answers
  • A teacher takes the following steps when beginning to apply conditional formatting to a spreadsheet. Format Conditional Formatti
    8·1 answer
  • Where is permanent data in the computer stored whenever gym starts his laptop He sees some commands in numbers appearing on the
    12·1 answer
  • A single instruction carried out by a computer is called a what?
    5·1 answer
  • Given the following snippet of code, answer the following two questions based on the code: typedef enum {Sun, Mon, Tue, Wed, Thu
    15·1 answer
  • The best way to help prevent a system from a worm attack is to use anti-virus software anti-malware software a firewall a router
    12·1 answer
  • Which part of the ethernet address is assigned to vendors to identify the equipment?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!