Answer Posted / anusha
software is a set of instructions given to the system to
run the program
| Is This Answer Correct ? | 1 Yes | 1 No |
Post New Answer View All Answers
how logic is used
In cryptography, you could often break the algorithm if you know what was the original (plain) text that was encoded into the current ciphertext. This is called the plain text attack. In this simple problem, we illustrate the plain text attack on a simple substitution cipher encryption, where you know each letter has been substituted with a different letter from the alphabet but you don’t know what that letter is. You are given the cipherText as the input string to the function getwordSets(). You know that a plain text "AMMUNITION" occurs somewhere in this cipher text. Now, you have to find out which sets of characters corresponds to the encrypted form of the "AMMUNITION". You can assume that the encryption follows simple substitution only. [Hint: You could use the pattern in the "AMMUNITION" like MM occurring twice together to identify this]
How do I round numbers?
if the area was hit by a virus and so the decrease in the population because of death was x/3 and the migration from other places increased a population by 2x then annually it had so many ppl. find our the population in the starting.
What could possibly be the problem if a valid function name such as tolower() is being reported by the C compiler as undefined?
What is #include called?
What is use of pointer?
In a switch statement, what will happen if a break statement is omitted?
Is null a keyword in c?
What are the 5 types of organizational structures?
Explain zero based addressing.
The __________ attribute is used to announce variables based on definitions of columns in a table?
Do you have any idea about the use of "auto" keyword?
1.int a=10; 2.int b=20; 3. //write here 4.b=30; Write code at line 3 so that when the value of b is changed variable a should automatically change with same value as b. 5.
Why ca not I do something like this?