Which option best describes the encryption technique of a Caesar cipher?
A. Substitution
B. Diffusion
C. Confusion
D. Transportation
Answer: A. Substitution
Computer Science & Information Technology
You might also like to view...
Computers cannot read high-level programming languages. Explain how a programmer can be understood by a computer.
What will be an ideal response?
Computer Science & Information Technology
A(n) predicate result element is any element that is not part of the XSLT vocabulary but is sent directly into the result document as raw text.?
Answer the following statement true (T) or false (F)
Computer Science & Information Technology