Make another java program that decrypts the file

Assignment Help Computer Engineering
Reference no: EM1329959

File encryption is the science of writing the contents of a file in a secret code. Write an encryption program in Java that should work like a filter - reading the contents of one file, modifying the data into a code, and then writing the coded contents out to a second file. The second file will be a version of the first file, but written in a secret code.

Although there are complex encryption techniques, you should come up with a simple one of your own. For example, you could read the first file one character at a time, and add 10 to the character code of each character before it is written to the second file.

Write another Java program that decrypts the file produced by above program. The decryption program should read the contents of the coded file, restore the data to its original state, and write it to another file.

Reference no: EM1329959

Questions Cloud

Explain e-business and supply chain automation : Explain E-Business and Supply Chain Automation and how can Internet-based technologies be used to automate the supply chain
Illustrate the difference among real gdp and nominal gdp : Illustrate what is the difference among real GDP and nominal GDP. Does GDP accurately reflect our nation's productivity.
Equivalent annual cost over machine life : Two machines, A and B, which carry out the same functions, have the following costs and lives. Which machine would you choose? Justify your decision.
Identify the competitors in the market : Identify the competitors, if any, in the market you have selected. My selected market is water purifiers of Amway. Describe how you could position your product relative to others in the marketplace.
Make another java program that decrypts the file : however there are complex encryption techniques, you should come up with a simple one of your own. For example, you could read the first file one character at a time, and add 10 to the character code of each character before it is written to the s..
Elucidate managers can reduce their firms financing cost : Elucidate how managers can reduce their firm's financing cost.
Leasing a new computer : Find out the after-tax cash flow from leasing relative to the after-tax cash flow from purchasing in years 1-9? Find out the maximum lease payment which you would be willing to make?
Explain strategic opportunities for e-commerce : Explain strategic opportunities for e-Commerce enabled supply chains
The corporate strategy : Suppose you are the CEO of Nike and the world is coping with an economic recession. Please give an example of why you would change the corporate strategy and what changes you would make for what reason.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Consider the ways in which you can optimize a file

consider the ways in which you can optimize a file in order to reduce file size and maintain quality. What factors would you consider.

  What devices use to get efficient network communication

CNT Books has expanded considerably as you first got network up and running three years ago. It at the present occupies an entire floor in building, and its LAN has full-grown to contain several servers and more than 60 workstations.

  The difference between animation and transition effects

When are they appropriate? When is it better not to use them? Can you give me an examples.

  Purpose of the open systems interconnection

explain when and why the International Standards Organization developed the OSI model.

  Some programming languages a comment can be enclosed

In some programming languages a comment can be enclosed either in braces {} or in the symbols (* *). How do you think a scanner will group the four symbols {, }, (*, *) for purposes of classification i.e. would each symbol be given its own classif..

  The difference between a worm and a trojan horse

What do you tell him is the difference between a worm and a Trojan horse. List at least six reasons you can give John for preventing viruses and other malware.

  Calculates and displays the mortgage payment amount

make Use of an array for the mortgage data for the different loans. show the mortgage payment amount followed by the loan balance and interest paid for each payment over the term of the loan.

  Prepare an analysis discussing the factors

While there is backward compatibility between the various versions of the software, the older versions do not have all of the "bells and whistles" of the newer versions.

  Write down a recurrence relation

Write down a recurrence relation

  Public vs. private or regulated vs. non regulated indust

Explain the differences in the information policy for a small organization vs. a large one? Whether you think an information policy may be different in a public vs. private or the regulated vs. non regulated industry?

  Provide examples where cannot use logical operators

Search for arithmetic operators used in programming, and give two examples where you cannot use logical operators but you can use arithmetic operators. Also, think of two examples where both kinds of operators are used.

  List the top advantages of migrating to ipv6

List the top advantages of migrating to IPv6

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd