A technique referred to as a __________ is a mapping achieved by performing some sort of permutation on the plaintext letters.

A) transposition cipher
B) polyalphabetic cipher
C) Caesar cipher
D) monoalphabetic cipher


A) transposition cipher

Computer Science & Information Technology

You might also like to view...

What library contains the setw() manipulator?

What will be an ideal response?

Computer Science & Information Technology

All of the following are examples of data types EXCEPT:

A) Date/Time. B) Currency. C) Noun. D) Number.

Computer Science & Information Technology

A collection of formatting options that you can apply to a picture, text, or an object.

A. Artistic effects B. Layout C. Style

Computer Science & Information Technology

A Fragment can place items in the app’s app bar and options menu. To do so, the Fragment must call its ________ method with the argument true.

a. setHasOptionsMenu b. setOptionsMenu c. setMenu d. setHasMenu

Computer Science & Information Technology