Write the string to the ofstream

Assignment Help Basic Computer Science
Reference no: EM13307840

1. You must ask the user if they want to perform an encryption or decryption operation. 2. You must ask the user to enter the name of the file they want to encrypt or decrypt. 3. You must get an encryption key from the user which can be up to 128 characters. The key must be all lower case alphabetic characters. 4. You must have a function which takes the encryption key and creates an encryption map from it. For each character in the encryption key string, subtract the lower case letter 'a' and store the result in the corresponding encryption map array. 5. You must have a function which takes the encryption key and creates a decryption map from it. For each character in the encryption key string, subtract the lower case letter 'a' from it. Then subtract that result from 26 and store the value in the corresponding decryption map array. 6. You must have a function which will do the encryption or decryption transformation. This function takes the following parameters: A constant C string containing the line of text to be transformed. A constant C character array which contains the encryption or decryption map. An integer which contains the length of the encryption map. A string reference (output) which will contain the encrypted or decrypted string upon completion. The core of the encryption / decryption algorithm is as follows: For each character (the ith character) in the text input line do the following: if the character is not alphabetical, add it to the end of the output string if the character is lower case alphabetical subtract the character 'a' from the character get the ith % map length element from the map and add it to the character adjust the value of the character % 26 to keep it within the alphabet add the character 'a' to the character add the encrypted character value to the end of the output string if the character is upper case alphabetical do the same thing as for lower case except use 'A' instead of 'a' 7. For decryption, the main program should create an ifstream for the file to be decrypted. It should use the getline method of the ifstream to read lines from the file, call the encryption / decryption function with the line to be decrypted, and display the string which contains the result of the encryption / decryption function call. Repeat until the ifstream reaches the end of the file, then close the ifstream. 8. For encryption, the main program should create an ifstream for the file to be encrypted. It should also create an ofstream for the file where the encrypted result will be stored. The file name for this file can be gotten from the user or can be the input file name with a special extension added at the end. The getline method of the ifstream is used to read lines from the input file. Then the encryption / decryption function is called to encrypt the line. Display the string containing the result and write the string to the ofstream. Close the ifstream and ofstreams when finished. 9. Make sure that your program allows the user to encrypt / decrypt more than one file per session. This means adding a loop which allows the entire program to repeat until the user has nothing more to do.

Reference no: EM13307840

Questions Cloud

Explain in detail your objectives for each media form : 1.Describe the mix of media you would use to implement your public relations campaign and explain in detail your objectives for each media form.
What is the most likely cause of the problem : Some time later, Leo calls you back to tell you that while he is able to access the Trinity folder and read the files stored there, he has been unable to save changes back to the server. What is the most likely cause of the problem?
Can one collector be temporarily taken out of service : Dust is removed from the airstream of a municipal incinerator by four dust collectors operating in parallel, each handling 1/4 of the total airflow of 200 m3/min. The airstream contains 10 g/m3 of suspended solids.
Determine the resultant work done on the car : A 1500 kg car increases its speed from 15 m/s to 18 m/s in 15 seconds. What is the resultant work done on the car
Write the string to the ofstream : Close the ifstream and ofstreams when finished. 9. Make sure that your program allows the user to encrypt / decrypt more than one file per session. This means adding a loop which allows the entire program to repeat until the user has nothing more ..
Explain how to develop a project charter : Using the above scenario, develop a project charter. Include the problem statement, justification for the project, and how the project will be measured for success.
Find the value of the magnetic field at the center of ring : consider a thin wire bent into the shape of a ring of radius of 10 cm that carries a steady 2.0-A current
Evaluate the strategy that led to the merger or acquisition : For the corporation that has acquired another company, merged with another company, or been acquired by another company, evaluate the strategy that led to the merger or acquisition to determine whether or not this merger or acquisition was a wise cho..
What is the peak voltage of the generator : The rms current in a solenoid is 0.036 A when the solenoid is connected to a 18 kHz generator. What is the peak voltage of the generator

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Computing downtime in telephone per year

Telephone system has an availability of 99.999 percent. How much downtime is that per year? Express your answer in a way that is easy for someone to understand.

  Compare the memory management systems of windows

Compare the memory management systems of Windows (recent versions, after Win 2000) and Linux from the pagination/segmentation point of view.

  Discuss the fundamental advantages and disadvantages

Companies that currently use expert systems. Next, discuss the fundamental advantages and disadvantages of using expert systems instead of human expertise within the companies that you have selected. Provide a rationale to support your response..

  Write an instruction sequence to swap the upper

Write an instruction sequence to swap the upper four bits and the lower four bits of accumulator A [swap bit 7 with bit 3, bit 6 with bit 2, and so on]

  What do you mean by ascii or ebcdic

What is ASCII or EBCDIC? What part do the aforementioned things play in hashing? What is the formula for the PPD? What does the numerator and denominator say about the potential performance issues of this metric?

  Guidelines to pre-test the designed survey

One of the guidelines is to pre-test the designed survey on a few participants to see what might be unclear or weak in the survey design.

  Create a student class which will contain the following

Demonstrate the correct working of your classes by reading in a collection of student records from a file, sort the records, and print them. If a name is "EOF" it will mark the end of the file.

  How many other machines is each machine equivalent to

Every turing machine is equivalent to some other machine in our enumeration. why? how many other machines is each machine equivalent to? how many times is each turing-computable function represented in our enumeration? be sure to justify your answ..

  Write the statement to store the value 100

Write the statement to store the value 100 in the first element of the array named mintList.

  Explain the operation of the mips andi instruction

Illustrate your answer with an appropriate example. In your answer you must provide details of the andi instruction format and of what each field in that instruction format does and how an andi instruction is identified.

  Compare swing java gui components to awt components

Compare Swing Java GUI components to AWT components. Explain at least one way the components are similar and at least one way they are different. Provide examples to support your rationale.

  Write a java method which takes an integer array parameter

Write a Java method which takes an integer array parameter and fills the array with random numbers between 1 and 1000, including 1 and 1000. Use a traditional for loop to process the array.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd