Answer:
Find answers below.
Explanation:
1. Input: it takes in data in its raw format or an item that receives data and transfers them to the process.
- <em>Employees in a management team. </em>
- <em>Program code for a software application. </em>
- <em>Flour for making bread.</em>
2. Process: it converts the data from an input to a usable format. Also, it conveys the processed data (informations) to the output.
- <em>Harvesting a crop. </em>
- <em>Dryer spinning at top speed.</em>
3. Output: it is the result produced by a process i.e the finished product.
- <em>Newly painted structure. </em>
- <em>Freshly mowed lawn. </em>
Answer:
Explanation:
Take a as the 0th index and z as the 25th index.
send shift with key 9017 will give
s=b
e=e
n=o
d=k.
s shift 9 places lands the letter b.
Similarly for more money, the result is jdmsxzpmh.
the ciphertext is "beokjdmsxzpmh"
b)
take the first 4 ciphertext
"beok".
Calculate the shift from b to s which is 17 shifts. thus beok can be decrypted with key 17 0 24 19 to get "send"
thus the resulting key is 17 0 24 19 3 11 5 12 15 14 2 8 17
Answer:
"message encoding, message size and message delivery" are the correct answer for the above question.
Explanation:
The above defined are the three requirements which are defined as the protocol used in communication. These three requirements are a very essential part of communication because-
- Message Encoding is the first requirement, which is used to encode the message so that the hacker can not hack the communication data from the network.
- The second requirement is Message size which fixed the size and the number of packets used to send for the communication.
- The third requirements are Message delivery, for which the protocol needs to define the mechanism to overcome the loss of the data.
<h2>answers</h2>
Extranet
wifi create extranet so that our mobile network runs smoothly. it can create lan,wan also
Yes you can physically, but that doesnt mean that it will work. hope this helps. _eagle