Which option best describes the encryption technique of a Caesar cipher?

A. Substitution
B. Diffusion
C. Confusion
D. Transportation

Answer: A. Substitution

Computer Science & Information Technology

You might also like to view...

Computers cannot read high-level programming languages. Explain how a programmer can be understood by a computer.

What will be an ideal response?

Computer Science & Information Technology

A(n) predicate result element is any element that is not part of the XSLT vocabulary but is sent directly into the result document as raw text.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology