Answer:
Caesar cipher
Explanation:
In formation technology, cryptography or cryptology is a process of coding or encrypting information, using algorithms and input values in a network, where there is a present of a third party called adversaries or attackers.
There are different types of cryptography, namely, symmetric, assymmetric and hash cryptography.
Ciphers are algorithms used in cryptography to encode (encrypt) or decode (decrypt) information. An example of cipher is the Ceasar's cipher.
Ceasar cipher is a simple type of substitution cipher that encrpts plain text one character at a time and each coded character depends on the single character and a fixed distance value.
Answer:
1 2
1 1
1 0
Explanation:
i got it wrong for the awnser
Answer:
The solution code is written in Python 3.
- def processCSV(CSV_string, index):
- data = CSV_string.split(",")
- result = data[index]
- return int(result)
-
- processCSV('111,22,3333,4', 2)
Explanation:
Firstly, create function and name it as <em>processCSV()</em> with two parameters, <em>CSV_string</em> and <em>index</em> (Line 1).
Since the CSV_string is a collection of integers separated by comma, we can make use of Python String built-in method <em>split() </em>to convert the <em>CSV_string </em>into a list of numbers by using "," as separator (Line 2).
Next, we can use the <em>index</em> to extract the target value from the list (Line 3).
Since the value in the list is still a string and therefore we shall use Python built-in method int() to convert the target value from string type to integer and return it as output of the function (Line 4)
We can test our function by using the sample test case (Line 6) and we shall see the expected output: 3333.
Answer:
d. Local Security Policy
Explanation:
Local security policy refers to different security settings that are present on a local computer. Local security policy can include administrative rights assignments and password.
This can also mean policies that enables an administrators to set users privileges by so doing guiding what users are permitted to do on the computer.