Computer Applications
One of the most popular methods of encrypting data is Caesar cipher where original data is replaced by a key character like if key is -2 than 'a' will be replaced by ' y' , 'b' is replaced by 'z' and so on.
If the key is 2 i.e., every letter is replaced by its next to next letter means the letter 'A' will be replaced by 'C', the letter 'B' is replaced by 'D', and so on then what will be the replacement of the word 'CoMpUtEr'.
- Eciorwygt
- eQOrwVtG
- eqroWVTG
- Eq0rWvGt
Computing Safety & Ethics
2 Likes
Answer
EqOrWvGt
Reason — According to the key, each letter of CoMpUtEr is replaced as follows:
C → E
o → q
M → O
p → r
U → W
t → v
E → G
r → t
Answered By
3 Likes
Related Questions
Which of these is NOT an example of Cyber bullying ?
- Copying a classmate's personal photo against his/her permission from his social media account and sending it to other friends on their emails
- Bullying a classmate in the school corridor
- Threatening someone on whatsapp
- Posting mean messages about someone on their social media
Which of the following is NOT a reason for the digital divide in different demographic regions ?
- Cost of Technology
- Lack of information
- Lack of access to high performance computers
- Lack of access to the disabled
Which of the following is a way to avoid Plagiarism when using material from the Internet ?
(i) Citing
(ii) Paraphrasing
(iii) Referencing
(iv) Embedding
Choose the correct option :
- (i) and (ii) only
- Only (i)
- (i), (ii) and (iii) only
- (ii) and (iv) only
…………… is a software for which exclusive rights of modification in the source code remain with the owner.
- Free Open-Source Software
- Freeware
- Open-Source Software
- Proprietary Software