Prepare a modification of the encryption program

Assignment Help Computer Engineering
Reference no: EM13711358

Question: Prepare a modification of the encryption program of 15.5 whose transform function uses an integer key to transform the character passed to it.

The function transforms the character by adding the key to it. The key should be represented as a member of the Encryption class, and the class should be modified so that it has a member function that sets the encryption key.

When the program runs, the basic function should ask the user for the input file, the output file, and an encryption key.

Show that with these modifications, the same program can be used for both encryption and decryption the key should be presented as member of the encryption class

You have to modify the encryption program.

Reference no: EM13711358

Questions Cloud

Write a program that creates a two-dimensional array : Write a program that creates a two-dimensional (2D) array initialized with test data (for instance, use Random method to prepare an array of integers).
Explain merchandising operation wilson company : Wilson Company makes all sales all sales of industrial bearings under terms of FOB shipping point. The company usually receives orders for sales approximately one week before shipping inventory to customers.
Determine the hybridization of the central atom : For the molecules: ozone, sulfur trioxide and nitromethane ( CH3NO2 ), determine the hybridization of the central atom
Determine whether the molecule is polar : Determine whether the molecules: ozone, sulfur trioxide and nitromethane (CH3NO2) contain polar bonds. In those molecules that contain polar bonds, determine whether the molecule is polar
Prepare a modification of the encryption program : Prepare a modification of the encryption program of 15.5 whose transform function uses an integer key to transform the character passed to it.
Draw the resonance structures of the compounds : Draw the resonance structures of the following compounds. Use formal charges to discern the most stable structure: ozone, sulfur trioxide, and nitromethane (CH3NO2)
Invent and resolve an appropriate integer programming model : In preparing for a two-week camping vacation, a family must decide how many of each of six items should be loaded into their sport-utility vehicle.
Define the molecule phosphorus pentachloride : Consider the molecule phosphorus pentachloride. Explain why the central atom can hold more than eight electrons. Drawing a Lewis structure will help
Define the radioactivity of a sample of cobalt-60 : The half-life of Co-60 is 5.27 years. How long will it take for the radioactivity of a sample of cobalt-60 to diminish to 3% of its initial value

Reviews

Write a Review

Computer Engineering Questions & Answers

  Compare the performance using amat of a one-level split

compare the performance using amat of a one-level split cache and a two-level unified cache system. for the one-level

  Use a one-dimensional array to solve

make Use of a one-dimensional array to solve the following problem: Write an application that inputs five numbers, each of which is between 10 and 100, inclusive.

  Choose one of the network tools found in a windows 2000

Select one of the network tools found in a Windows 2000 server. Look up use of this tool. Using a creative writing narrative format write a short story explaining how you will use this tool to keep the network running successfully.

  Why both support pass-by-reference and pass-by-value

For primitive data types, C# implements pass-by-value as the default.although , VB6.0 implements the pass-by-reference as the default. They both support pass-by-reference and pass-by-value.

  We considered building a balanced or full bst from a sorted

we considered building a balanced or full bst from a sorted array. assume that the array has n 2k-1 elements in sorted

  Discuss the pros and cons of an organization

consider the pros and cons of an organization in that the primary departmentalization is vertical (i.e. by specialty, such as databases, human computer interfaces, or graphics programming) as opposed to one in which the primary departmentalization..

  Given an example of a problem for which an algorithm of

what is the difference between a polynomial time algorithm and an exponential time algorithm?b give three examples of

  Protecting the operating systems

Explain the relative benefit and de-merits of at least three different measures that are used in order to protect the operating systems.

  How the national security telecommunications and

how the national security telecommunications and information systems security policy nstissp national policies

  Find the solution to each of these recurrence relations

find the solution to each of these recurrence relations with the given intial conditions. use an iterative approach.c

  History of an employees hours

The time clock shall keep a history of an employee's hours for a two-week pay period. The application shall have the subsequent functionality:

  Explain the role of us-cert in protecting the nations

write a three to four page paper in which youexplain the role of us-cert in protecting the nations industrial systems

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd