pawan, Business Law and Ethics

Assignment Help:

Decode the Code
Problem Description
Smugglers are becoming very smart day by day. Now they have developed a new technique of sending their messages from one smuggler to another. In their new technology, they are sending their messages in a number format. This format represents the way that numbers and characters are padded on mobile’s keypad. One smuggler sends a text message to the second smuggler, using the numbers corresponding to the letters on the keypad. When the receiving smuggler gets the message, he simply opens the “create text message” function in his mobile and types the number string. This way the receiver finally reads the original message. For Example: - 6999066263304447777077766622337778 -----> message sent by the first smuggler. my name is robert---------> message decoded by the second smuggler. Where ‘0’ denotes the "space".

Explanation: By pressing ‘6’ (i.e. key’6’ one time) on the keypad, the mobile shows ‘m’ on display screen in write text message area. By pressing ‘999’ (i.e. key ‘9’ three times) on the keypad, the mobile shows ‘y’ on display screen in write text message area. By pressing ‘0’ (i.e. key ’0’ one time) on the keypad, the mobile shows ‘space’ on display screen in write text message area. By pressing ‘66’ (i.e. key’6’ two times) on the keypad, the mobile shows ‘n’ on display screen in write text message area. By pressing ‘2’ (i.e. key ’2’ one time) on the keypad, the mobile shows ‘a’ on display screen in write text message area. By pressing ‘6’ (i.e. key ''6''one time) on the keypad, the mobile shows ‘m’ on display screen in write text message area. By pressing ‘33’ (i.e. key ‘3’ two times) on the keypad, the mobile shows ‘e’ on display screen in write text message area. By pressing ‘0’ (i.e. key ‘0’ one time) on the keypad, the mobile shows ‘space’ on display screen in write text message area. By pressing ‘444’ (i.e. key’4’ three times) on the keypad, the mobile shows ‘i’ on display screen in write text message area. By pressing ‘7777’ (i.e. key ’7’ four times) on the keypad, the mobile shows ‘s’ on display screen in write text message area. By pressing ‘0’ (i.e. key ‘0’ one time) on the keypad, the mobile shows ‘space’ on display screen in write text message area. By pressing ‘777’ (i.e. key ’7’ three times) on the keypad, the mobile shows ‘r’ on display screen in write text message area. By pressing ‘666’ (i.e. key ’6’ three times) on the keypad, the mobile shows ‘o’ on display screen in write text message area. By pressing ‘22’ (i.e. key ‘2’ two times) on the keypad, the mobile shows ‘b’ on display screen in write text message area. By pressing ‘33’ (i.e. key ‘3’ two times) on the keypad, the mobile shows ‘e’ on display screen in write text message area. By pressing ‘777’ (i.e. key ’7’ three times) on the keypad, the mobile shows ‘r’ on display screen in write text message area. By pressing ''8'' (i.e. key ’8’ one time) on the keypad, the mobile shows ‘t’ on display screen in write text message area.
But for word monkey 6#666#665533999 this string will be sent by the smuggler one Here ‘# ‘ denotes that if smuggler watches ‘#’ then it means character previous to # is on the same key to the character after the ‘#’ and smuggler has to wait for 2 seconds and then press the same key.
Explanation: By pressing ‘6’ i.e. key’6’ one time on the keypad, the mobile shows ‘m’ on display screen. For ''#'' wait for 2 seconds, and then press next. By pressing ‘666’ i.e. key’6’ three times on the keypad, the mobile shows ‘o’ on display screen. For ‘#’ wait for 2 seconds, and then press next. By pressing ‘66’ i.e. key’6’ two times on the keypad, the mobile shows ‘n’ on display screen. By pressing ‘55’ i.e. key’5’ two times on the keypad, the mobile shows ‘k’ on display screen. By pressing ‘33’ i.e. key’3’ two times on the keypad, the mobile shows ‘e’ on display screen. By pressing ‘999’ i.e. key’9’ three times on the keypad, the mobile shows ‘y’ on display screen.
*Here lower case doesn’t matter. *Assuming that the smuggler one will not send any numeral characters in the original message. For example smuggler will not send any message like "I need 1000 bucks" as it contains numerals. So policemen need your help to track the smugglers. You have to write a program that decodes the sending smuggler’s string (from the number format into plain text).
Instructions to work with Open PBT Client:
Specify the work directory path in the ''Work directory Path'' field. The path should correspond to your solution Work directory.
Download the support files by clicking the Get Dev Files.
You will find the problem directories containing:
problem.h file
problem.c file
in your project directory.
Code the solution in .c file inside the problem directory
All required files will be downloaded to your work directory. Creating additional files is strongly discouraged.
Step 1:
In your Solution File:
Implement your logic in function char* decodeCode(char* encodedString)
char*   encodedString : is string which is sent by the smuggler1.
You can create more functions if required, but those functions should be in the same file.

Step 2:
In your solution keep in mind the following constraints.
In this problem you have to write a program that decodes the string, which is sent by the first smuggler.
The function decodeCode() takes the string encodedString as an argument. That string is what the first smuggler sends to the second smuggler.
The function decodeCode() returns a string, which is the decoded string in plain text.
If encodedString is empty then returns empty string.
encodedString should only contain integers, and the special character ''#'' (if needed).
encodedString should not have any alphabetic character (e.x. ''a'',''b'') else return empty string
encodedString should not have any special character except ''#'' else return empty string
The Prototype of the function is
char* decodeCode(char* encodedString) This function takes following argument.
char*    encodedString:  which represents the string which is send by the smuggler1.
function decodeCode() will return a string which is the decoded string of that string which is send by the smuggler1.
The constraints are:
encodedString should only contain integers, and the special character ''#'' (if needed).
encodedString should not contain any alphabetical characters (e.x. ''a'', ''b''); otherwise return empty string
encodedString should not contain any special characters, except ''#''; otherwise return empty string
encodedString is empty then returns empty string.

Related Discussions:- pawan

Merger accounting, MERGER ACCOUNTING: It may happen that, during a "ta...

MERGER ACCOUNTING: It may happen that, during a "take-over" of one company (A) by another company (B), shares in the latter company are issued to shareholders of the former co

Function and powers of chairman, Function and Powers of Chairman: In t...

Function and Powers of Chairman: In the case of National Dwellings Society v Sykes Chitty, J. stated: "It is the duty of the chairman, and his function, to preserve order,

Purpose and advantage of monitoring, Explain what are the primary & seconda...

Explain what are the primary & secondary sources of information that you can use to conduct your research. If it is primary/secondary, or both state reasons for your answer.

Define the term - legislature-executive trade off, Legislature-Executive Tr...

Legislature-Executive Trade off Let us move a bit closer to the reality. In standard modes of policy optimization we assure that there is a single policy maker, who controls th

Rights and duties justice and fairness, please explain these topic to me in...

please explain these topic to me in detail as soon as possible so that i can make my assignment accordingly

Suggested actions for addressing phoenix activity, Q. Suggested actions for...

Q. Suggested actions for addressing phoenix activity? The following actions are suggested for addressing phoenix activity. Those that have been suggested are the actions that:

Transactions arising in a liquidation, Transactions Arising In A Liquidatio...

Transactions Arising In A Liquidation: In collection in and realisation of assets in order to pay the company's debts and then to distribute any surplus to members the liquida

Necessaries - binding contracts, Necessaries - Binding Contracts Defin...

Necessaries - Binding Contracts Definition of 'Necessaries' cleared by S. 4(2) to the Sale of Goods Act like "goods appropriate for the condition in life of that infant or min

Explain the principles of tort law, QUESTION 1 With reference to the rel...

QUESTION 1 With reference to the relevant articles of the Mauritian Civil Code, explain the principles of tort law QUESTION 2 An employer should ensure the well being of a

Action against fraudulent phoenix activity, In the paper Action against Fra...

In the paper Action against Fraudulent Phoenix Activity: Proposals Paper, Treasury made a range of recommendations to amend director's liability provisions and taxation law. Rec

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd