Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
1. You must ask the user if they want to perform an encryption or decryption operation. 2. You must ask the user to enter the name of the file they want to encrypt or decrypt. 3. You must get an encryption key from the user which can be up to 128 characters. The key must be all lower case alphabetic characters. 4. You must have a function which takes the encryption key and creates an encryption map from it. For each character in the encryption key string, subtract the lower case letter 'a' and store the result in the corresponding encryption map array. 5. You must have a function which takes the encryption key and creates a decryption map from it. For each character in the encryption key string, subtract the lower case letter 'a' from it. Then subtract that result from 26 and store the value in the corresponding decryption map array. 6. You must have a function which will do the encryption or decryption transformation. This function takes the following parameters: A constant C string containing the line of text to be transformed. A constant C character array which contains the encryption or decryption map. An integer which contains the length of the encryption map. A string reference (output) which will contain the encrypted or decrypted string upon completion. The core of the encryption / decryption algorithm is as follows: For each character (the ith character) in the text input line do the following: if the character is not alphabetical, add it to the end of the output string if the character is lower case alphabetical subtract the character 'a' from the character get the ith % map length element from the map and add it to the character adjust the value of the character % 26 to keep it within the alphabet add the character 'a' to the character add the encrypted character value to the end of the output string if the character is upper case alphabetical do the same thing as for lower case except use 'A' instead of 'a' 7. For decryption, the main program should create an ifstream for the file to be decrypted. It should use the getline method of the ifstream to read lines from the file, call the encryption / decryption function with the line to be decrypted, and display the string which contains the result of the encryption / decryption function call. Repeat until the ifstream reaches the end of the file, then close the ifstream. 8. For encryption, the main program should create an ifstream for the file to be encrypted. It should also create an ofstream for the file where the encrypted result will be stored. The file name for this file can be gotten from the user or can be the input file name with a special extension added at the end. The getline method of the ifstream is used to read lines from the input file. Then the encryption / decryption function is called to encrypt the line. Display the string containing the result and write the string to the ofstream. Close the ifstream and ofstreams when finished. 9. Make sure that your program allows the user to encrypt / decrypt more than one file per session. This means adding a loop which allows the entire program to repeat until the user has nothing more to do.
Telephone system has an availability of 99.999 percent. How much downtime is that per year? Express your answer in a way that is easy for someone to understand.
Compare the memory management systems of Windows (recent versions, after Win 2000) and Linux from the pagination/segmentation point of view.
Companies that currently use expert systems. Next, discuss the fundamental advantages and disadvantages of using expert systems instead of human expertise within the companies that you have selected. Provide a rationale to support your response..
Write an instruction sequence to swap the upper four bits and the lower four bits of accumulator A [swap bit 7 with bit 3, bit 6 with bit 2, and so on]
What is ASCII or EBCDIC? What part do the aforementioned things play in hashing? What is the formula for the PPD? What does the numerator and denominator say about the potential performance issues of this metric?
One of the guidelines is to pre-test the designed survey on a few participants to see what might be unclear or weak in the survey design.
Demonstrate the correct working of your classes by reading in a collection of student records from a file, sort the records, and print them. If a name is "EOF" it will mark the end of the file.
Every turing machine is equivalent to some other machine in our enumeration. why? how many other machines is each machine equivalent to? how many times is each turing-computable function represented in our enumeration? be sure to justify your answ..
Write the statement to store the value 100 in the first element of the array named mintList.
Illustrate your answer with an appropriate example. In your answer you must provide details of the andi instruction format and of what each field in that instruction format does and how an andi instruction is identified.
Compare Swing Java GUI components to AWT components. Explain at least one way the components are similar and at least one way they are different. Provide examples to support your rationale.
Write a Java method which takes an integer array parameter and fills the array with random numbers between 1 and 1000, including 1 and 1000. Use a traditional for loop to process the array.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd