c language, Computer Engineering

Smugglers are becoming very smart day by day. Now they have developed a new technique of sending their messages from one smuggler to another.
In their new technology, they are sending their messages in a number format. This format represents the way that numbers and characters are padded on mobile’s keypad. One smuggler sends a text message to the second smuggler, using the numbers corresponding to the letters on the keypad. When the receiving smuggler gets the message, he simply opens the “create text message” function in his mobile and types the number string. This way the receiver finally reads the original message.
For Example: -
6999066263304447777077766622337778 -----> message sent by the first smuggler.
my name is robert---------> message decoded by the second smuggler.
Where ‘0’ denotes the "space".
Posted Date: 9/2/2012 2:14:15 AM | Location : United States







Related Discussions:- c language, Assignment Help, Ask Question on c language, Get Answer, Expert's Help, c language Discussions

Write discussion on c language
Your posts are moderated
Related Questions
VuGen have two options to help debug Vuser scripts-the Run Step by Step command and breakpoints. The Debug settings in the Options dialog box permit us to verify the extent of the

What are the Input devices Various devices are available for data input on graphics workstations. Most systems have a keyboard and one or more additional devices specially desi

Describe ARP message format in brief.                             0                                        8                                      16

Preamble The owner of the local shopping mall, MaxiMart, has contracted you to assist in the design of an interactive directory. The interactive directory is to be permanently l

What is critical section problem? A race condition at data item occurs when many processes simultaneously update its value data consistency, needs that only one process should

How is Secure Sockets Layer relied on the certificates? The Secure Sockets Layer standard is not a single protocol, but quite a set of accepted data transfer routines which a

What are assembler directives? Ans: These are the instructions that direct the program to be executed. They have no binary corresponding so they are called pseudo-opcodes. The

The illustration of the mouse on-screen. Depending on your settings, the cursor can be many dissimilar things.

Write a 2-3 page paper (excluding title, abstract, introduction, and references) describing the concepts of the Information Systems Delivery Cycle (SDLC) and how the Project Manage

Where Virtual memory is used ? Ans. Virtual memory is utilized in all main commercial operating systems.