All encryption algorithms are based on two general principles: substitution and _________.
Fill in the blank(s) with the appropriate word(s).
transposition
Computer Science & Information Technology
You might also like to view...
The gap in ease of access to technology is known as the ________ divide
A) web B) technology C) Internet D) digital
Computer Science & Information Technology
Which is not a good location for backing up your data on a regular basis?
A) Thumb drive B) External drive C) Network attached storage drive D) Cloud
Computer Science & Information Technology