SOLUTION: A computer programmer is designing a secure encryption key for a new wireless networking protocol. The protocol picks 2 random letters A to Z to make the key. How many keys are pos
Algebra.Com
Question 663866: A computer programmer is designing a secure encryption key for a new wireless networking protocol. The protocol picks 2 random letters A to Z to make the key. How many keys are possible if the order of the letters matters and letters can repeat???
Answer by DrBeeee(684) (Show Source): You can put this solution on YOUR website!
Not sure if you want upper case only, but as stated that's what it looks like. The coder can select any of the 26 alphabetic characters for the first letter and since we can repeat the letter for the second choice , there are 26 letters to choose for it as well. This gives 26*26 possible codes. By the way, this by itself, 676 combinations, is not a very large number.
RELATED QUESTIONS
A computer programmer is designing a secure encryption key for a new wireless networking... (answered by jim_thompson5910)
Resource Reservation Protocol (RSVP) was originally designed to established signaling... (answered by rothauserc)
The Kyoto Protocol, which was signed in 1997, required countries to start reducing their (answered by CPhill)
In San Francisco, a sample of 3,298 wireless routers showed that 35.03 percent used... (answered by edjones)
A computer programmer works 40 hours per week. What is an equation that relates the... (answered by fcabanski)
A computer programmer works 40 hours per week. What is an equation that relates the... (answered by josgarithmetic,ikleyn)
11. Can you find the plaintext that produced the ciphertext below? A shift cipher with... (answered by ikleyn)
Your company has decided to create three different mobile applications:
Snaplink – a... (answered by richwmiller)
If the average salary of a computer programmer is $71, 800 with a standard deviation of... (answered by Boreal)