1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wlad13 [49]
3 years ago
5

Please help I don’t know

Computers and Technology
1 answer:
Vika [28.1K]3 years ago
4 0

Answer: Go down 1 time, then to the left 3 times, then down 1, finally, go left 1 time.

Explanation:

You might be interested in
Assume that the ciphertext C is computed from the plaintext P by C= P ⊕ K1 ⊕ K2 , where K1 and K2 are the encryption key and ⊕ d
Sedbober [7]

Answer:

K1 ⊕ K2 = 9

Explanation:

Since 5 ⊕ K = 12, K must be 5 ⊕ 12 = 9.

But there are supposedly two encryptionkeys, we cannot know their individual value, only that K1 ⊕ K2 = 9.

That makes this a bit weird question.

4 0
4 years ago
Who plays pokemon shield or sword
schepotkina [342]

Answer: I haven’t played but i wanna

Explanation:

4 0
3 years ago
Read 2 more answers
When the PT-109 American patrol boat, under the command of Lieutenant John F. Kennedy, was sunk by a Japanese destroyer, a messa
mr_godi [17]

Answer:

Meaning:

PT BOAT ONE OWE NINE LOST IN ACTION IN BLACKETT  

STRAIT TWO MILES SW MERESU COVE X CREW OF TWELVE  

X REQUEST ANY INFORMATION.

Explanation:

Playfair cipher  invented in 1854 by Charles Wheatstone was the first practical digraph substitution cipher. Lord Playfair promoted the use of the cipher, therefore it was named after him. Playfair cipher encrypts pairs of letters (digraphs) making it hard to break.  Frequency analysis can still be undertaken but requires much more cipher text in order to work. It requires no additional equipment to operate and is very fast therefore it is to protect information during war. It was used  by British forces in the Second Boer War and in World War I and during World War II by the Australians.  

When the PT-109 American patrol boat, under the command of Lieutenant John F. Kennedy, was sunk by a Japanese destroyer, a message was received at an Australian wireless station in the morning of the 2 of August 1943  in Playfair code:

KXJEY  UREBE  ZWEHE  WRYTU  HEYFS  

KREHE  GOYFI  WTTTU  OLKSY  CAJPO  

BOTEI  ZONTX  BYBWT  GONEY  CUZWR  

GDSON  SXBOU  YWRHE  BAAHY  USEDQ

Meaning:

PT BOAT ONE OWE NINE LOST IN ACTION IN BLACKETT  

STRAIT TWO MILES SW MERESU COVE X CREW OF TWELVE  

X REQUEST ANY INFORMATION.

5 0
3 years ago
Computers with more than ____ of ram work with the aero interface in windows 7 as shown in the accompanying figure.
LekaFEV [45]
 <span>Computers with more than 1 GB of RAM work with the Aero interface in Windows 7 as shown in the accompanying figure.</span>
6 0
3 years ago
Nathan wants to make the quotation stand out further. Which order of steps does he need to follow to do this task?
Alina [70]

Answer:

B.

Explanation:

Go to the Borders and Shading option, click the Shading tab, and click the color under the Fill option.

5 0
4 years ago
Read 2 more answers
Other questions:
  • What is the keyboard shortcut for the Undo command?
    8·1 answer
  • You are reviewing the style sheet code written by a colleague and notice several rules that are enclosed between the /* and */ c
    12·1 answer
  • Before using large downloaded files that are in a compressed format, it is necessary to_____ them. A) Copy B) Extract C) Open D)
    9·1 answer
  • What does this mean in python?
    5·1 answer
  • The __________ is a center of Internet security expertise and is located at the Software Engineering Institute, a federally fund
    5·2 answers
  • How to check if serial interface is dte ot DCE?
    13·1 answer
  • Consider the following first line from a Java method definition.
    13·1 answer
  • Select the correct answer.
    6·1 answer
  • Define management styles
    14·2 answers
  • Someone put malware on your computer that records all of your keystrokes. what aspect of security was primarily attacked? choose
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!