1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frez [133]
3 years ago
6

9. In Electronic Codebook (ECB): a. The message is broken into independent blocks which are encrypted b. The message is broken i

nto dependent blocks which are encrypted c. The message is broken into independent blocks which are digitally signed d. The message is broken into dependent blocks which are authenticated
Computers and Technology
1 answer:
DaniilM [7]3 years ago
8 0

Answer:

The correct answer is letter "A": The message is broken into independent blocks which are encrypted.

Explanation:

There are five (5) main forms of encryption: <em>Electronic Code Book (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Output Feedback (OFB)</em>. Electronic Code Book (ECB) is the simplest of all of them. Using this method to encrypt information implies dividing a message into two parts to encrypt each block independently. ECB does not hide patterns effectively because the blocks are encrypted using identical plaintexts.

You might be interested in
Orphan record example?
Goryan [66]

Answer:

If we delete record number 15 in a primary table, but there's still a related table with the value of 15, we end up with an orphaned record. Here, the related table contains a foreign key value that doesn't exist in the primary key field of the primary table. This has resulted in an “orphaned record”.

4 0
2 years ago
Pomelo and Calamansi Trees are type of plants that suitable in this method.A. Cleft-Grafting B. Marcotting C. Layering D. T-Budd
Olegator [25]
Pomelo and Calamansi Trees are type of plants that suitable in this method.A. Cleft-Grafting
8 0
2 years ago
If the decimal number 4 is represented in binary as 100, then what is the binary representation of the decimal number 5?
Allisa [31]
5 is one bigger than 4, so it is 101

Note: this doesn't always work for every number.

the binary numbers 1-8 would be: 1, 10, 11, 100, 101, 110, 111, 1000

Can you guess 9?: 1001

10?: 1010

Hope this helps, <span>and May the Force Be With You!
-Jabba


</span>
8 0
3 years ago
Write a program to input any 10 numbers in an array and display it.​
Rom4ik [11]

Answer:

list1=[]

n=10

for i in range(n):

   z=int(input("Enter number:"))

   list1.append(z)

print(list1)

4 0
2 years ago
Read 2 more answers
Consider the following program written in C syntax:
postnew [5]

The values of the variables value and list after each of the three calls to

swap are:

  • value = 2 and  list[5] = {1, 3, 5, 7, 9};
  • value = 2 and  list[5] = {3, 1, 5, 7, 9};
  • value = 2 and  list[5] = {3, 1, 5, 7, 9};

<h3>How to determine the values of variable value and the list?</h3>

<u>1. Passed by value</u>

In this case, the values of the actual arguments remain unchanged; So the variable value and the list would retain their initial values

The end result is:

value = 2 and  list[5] = {1, 3, 5, 7, 9};

<u>2. Passed by reference</u>

With pass by reference, the arguments are changed.

Given that

value = 2 and  list[5] = {1, 3, 5, 7, 9};

The value of variable value is swapped with list[0].

So, we have:

value = 1 and  list[5] = {2, 3, 5, 7, 9};

Then list[0] and list[1] are swapped

So, we have:

value = 1 and  list[5] = {3, 2, 5, 7, 9};

Lastly, value and list[value] are swapped

So, we have:

value = 2 and  list[5] = {3, 1, 5, 7, 9};

The end result is:

value = 2 and  list[5] = {3, 1, 5, 7, 9};

<u>3. Passed by value-result</u>

Since there is no loop in the program, the pass by value-result has the same output as the pass by reference.

So, the end result is:

value = 2 and  list[5] = {3, 1, 5, 7, 9};

Read more about C syntax at:

brainly.com/question/15705612

4 0
2 years ago
Other questions:
  • Cyber security includes which of the following?
    7·1 answer
  • You are logged in as a user with limited system privileges, you are the linux system administrator and you have the password to
    5·1 answer
  • Pressing delete removes the character after the insertion point
    5·2 answers
  • Write a query to show the price reduced by 10% for all products that are tables or entertainment centers with a standard price g
    10·1 answer
  • An app builder wants to show groups as the last navigation menu item in the Salesforce1 mobile app. However, the app builder is
    8·1 answer
  • What is profession explain with example​
    13·2 answers
  • The insert options button lists formatting options. true or false.
    11·1 answer
  • Explain the Decision making statement​
    15·1 answer
  • Jasmine wants electrical current to be able to pass through a certain switch on a circuit board that she is designing. What stat
    5·1 answer
  • Once you select a theme, you__________ change the theme’s individual elements independently of each other.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!