![subject](/tpl/images/cats/informatica.png)
Computers and Technology, 08.11.2019 21:31 anggar20
Encryption has a remarkably long and varied history. spies have been using it to convey secret messages ever since there were secret messages to convey. one powerful method of encryption uses random digits. two documents are prepared with the same random sequence of numbers. the spy is sent out with one and the spy master retains the other. the digits are used as follows. suppose that the word to be encrypted is spy and the random digits are 352. then s becomes v (three letters after s), p becomes u (five letters after p), and y becomes a (two letters after y, restarting at a after z). the spy would encrypt a message and then destroy the document used to encrypt it. this is an early example of a. a hashing algorithm. b. asymmetric key encryption. c. symmetric key encryption. d. public key encryption.
![ansver](/tpl/images/cats/User.png)
Answers: 1
![](/tpl/images/ask_question.png)
![](/tpl/images/ask_question_mob.png)
Another question on Computers and Technology
![question](/tpl/images/cats/informatica.png)
Computers and Technology, 22.06.2019 17:00
Annie is creating a corporate report for a companyโs annual meeting. in the report, she wants to add the signature of various department heads. which device can annie use to capture signatures to include in the report? a. printer b. monitor c. e-reader d. digitizing tablet
Answers: 1
![question](/tpl/images/cats/informatica.png)
Computers and Technology, 23.06.2019 01:30
1. which of the following is a search engine? a) mozilla firefox b)internet explorer c)google d)safari 2. which of the following statements is true? a) all search engines will provide the same results when you enter the same query. b) all search engines use the same amount of advertisements. c) some search engines are also browsers. d) search engines often provide different results, even when you enter the same query.
Answers: 2
![question](/tpl/images/cats/informatica.png)
Computers and Technology, 23.06.2019 05:00
Jason works as an accountant in a department store. he needs to keep a daily record of all the invoices issued by the store. which file naming convention would him the most?
Answers: 2
![question](/tpl/images/cats/informatica.png)
Computers and Technology, 23.06.2019 22:20
What is a programming method that provides for interactive modules to a website?
Answers: 1
You know the right answer?
Encryption has a remarkably long and varied history. spies have been using it to convey secret messa...
Questions
![question](/tpl/images/cats/informatica.png)
Computers and Technology, 29.04.2021 21:20
![question](/tpl/images/cats/mat.png)
![question](/tpl/images/cats/geografiya.png)
![question](/tpl/images/cats/mat.png)
Mathematics, 29.04.2021 21:20
![question](/tpl/images/cats/istoriya.png)
History, 29.04.2021 21:20
![question](/tpl/images/cats/mat.png)
![question](/tpl/images/cats/informatica.png)
Computers and Technology, 29.04.2021 21:20
![question](/tpl/images/cats/mat.png)
![question](/tpl/images/cats/mat.png)
![question](/tpl/images/cats/mat.png)
![question](/tpl/images/cats/mat.png)
Mathematics, 29.04.2021 21:20
![question](/tpl/images/cats/mat.png)
Mathematics, 29.04.2021 21:20
![question](/tpl/images/cats/mat.png)
![question](/tpl/images/cats/mat.png)
Mathematics, 29.04.2021 21:20
![question](/tpl/images/cats/mat.png)
![question](/tpl/images/cats/es.png)
![question](/tpl/images/cats/mat.png)
![question](/tpl/images/cats/mat.png)
Mathematics, 29.04.2021 21:20
![question](/tpl/images/cats/mat.png)