Make another java program that decrypts the file

Assignment Help Computer Engineering
Reference no: EM1329959

File encryption is the science of writing the contents of a file in a secret code. Write an encryption program in Java that should work like a filter - reading the contents of one file, modifying the data into a code, and then writing the coded contents out to a second file. The second file will be a version of the first file, but written in a secret code.

Although there are complex encryption techniques, you should come up with a simple one of your own. For example, you could read the first file one character at a time, and add 10 to the character code of each character before it is written to the second file.

Write another Java program that decrypts the file produced by above program. The decryption program should read the contents of the coded file, restore the data to its original state, and write it to another file.

Reference no: EM1329959

Questions Cloud

Explain e-business and supply chain automation : Explain E-Business and Supply Chain Automation and how can Internet-based technologies be used to automate the supply chain
Illustrate the difference among real gdp and nominal gdp : Illustrate what is the difference among real GDP and nominal GDP. Does GDP accurately reflect our nation's productivity.
Equivalent annual cost over machine life : Two machines, A and B, which carry out the same functions, have the following costs and lives. Which machine would you choose? Justify your decision.
Identify the competitors in the market : Identify the competitors, if any, in the market you have selected. My selected market is water purifiers of Amway. Describe how you could position your product relative to others in the marketplace.
Make another java program that decrypts the file : however there are complex encryption techniques, you should come up with a simple one of your own. For example, you could read the first file one character at a time, and add 10 to the character code of each character before it is written to the s..
Elucidate managers can reduce their firms financing cost : Elucidate how managers can reduce their firm's financing cost.
Leasing a new computer : Find out the after-tax cash flow from leasing relative to the after-tax cash flow from purchasing in years 1-9? Find out the maximum lease payment which you would be willing to make?
Explain strategic opportunities for e-commerce : Explain strategic opportunities for e-Commerce enabled supply chains
The corporate strategy : Suppose you are the CEO of Nike and the world is coping with an economic recession. Please give an example of why you would change the corporate strategy and what changes you would make for what reason.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Developing the java program

Write down a program in java to input the basic salary of 15 persons. Each one of them receives 25% of basic as hra (house rent allowance), 15 % of the basic as conveyance and 10 % of the basic as an entertainment allowance.

  Enterprising the data mining and data warehousing

Discuss the most proficient ways in which an organization may invest in enterprising the data mining, data warehousing, and the data analytics capabilities.

  How could pdp augment memory in evaluating

How could PDP augment memory in evaluating the potential risk in this and other potentially threatening situations.

  Complete the design wlan based on ieee 802.11

Explain why 802.11b, is the first widely popular standard and still by far most used by the IT industry today.

  Write down a statement to create a view

Write down a satement to add a check constraint to the above defined table that guarantees that values entered in the inspection small date field are not older than today, meaning from now on. According to new requirements from your business analys..

  Quantifying the software development

This organization is interested in quantifying its software development. Write down a report proposing suitalbe metrics and propose how these can be collected.

  Explain to a-company might set up auditing

define to A-Companyy how they might create a security template and some useful settings. What security suggestions do you have to secure communications from Human Resources server to the Payroll server.

  How to write code for selection sort, insertion sort

How to write code for selection sort, insertion sort. Using your performance of selection, bubble and insertion sort, add a counter in an appropriate place so as to measure the runtime of your code for example this capacity be a counter to track ..

  Type of connections in elevator shaft

Describe what type of connections would work within the elevator shaft. If more than one choice is possible, choose the best option and describe the reasons for your choice.

  How the project management life cycle be efficient

How the Project Management Life Cycle be efficient.

  Describe stages of the processor

Describe the decode stage and Describe the execution stage of add, andi, mul, divi, and neg.

  Tradeoff between breath first search, depth-fisrt-search

tradeoff between Breath First search, Depth-Fisrt-Search.Directed Acyclic Graphs(DAGs), Topological sorting and Dijkstra.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd