Create a method that receives a string of plaintext

Assignment Help Computer Engineering
Reference no: EM132200996

Question :

Write a java program that takes an input string from ‘a' to ‘z' or ‘A' to ‘Z' and transforms it to integers from 0 to 25.

If you encounter a space, it should be mapped to 26. In the program, create a method that receives a string of plaintext corresponding to a line of input, and returns the corresponding numbers as an array of integers.

Note: 'a' and 'A' both correspomd to 0. While 'b' and 'B' both correspond to 1, etc.

Example input 1:

A car

Example output 1:

0 26 2 0 17

Example input 2:

a

B

cD

Example output 2:

0

1

2 3

Reference no: EM132200996

Questions Cloud

What has happened to the share of trade in gdp over time : This exercise is designed to help one find the World Bank's World Development Indicators, extract data, and make sense of the numbers. Go to the database.
Cost function satisfy law of diminishing returns : a. Explain if this cost function satisfy law of diminishing returns.
Amount of labor and k is the amount of capital : Consider the following production function : Q = 10L2K, where Q is the amount of production,L is the amount of Labor and K is the amount of Capital.
What is the maximum change in the money supply : Suppose John deposits 20 million into his checking account, if the reserve requirement ratio is .1, what is the maximum change in the money supply?
Create a method that receives a string of plaintext : Write a java program that takes an input string from ‘a' to ‘z' or ‘A' to ‘Z' and transforms it to integers from 0 to 25.
What is meant by the globalization of markets : What is meant by the 'Globalization of Markets, provide example derives from telecommunication industry
What is the probability of a type i error : The decision rule is adopted to shut down the filling machine if the sample mean weight for a sample of 40 bags is below 49.7.
Calculate the amount of the mortgage payment : Write a Java program that reads the amount of a mortgage payment and the amount still owed - the outstanding balance.
What is the empirical relevance of the h-o theory : What is the empirical relevance of the H-O theory and the new trade theories? What is the relationship between transportation costs and nontraded

Reviews

Write a Review

Computer Engineering Questions & Answers

  How term "educational technology" covers a wide range

The word "educational technology" covers a wide range of tools and methods exploiting computers, networks and media for delivering knowledge. Compare virtual classes with minimum  two other delivery methods (TV-based courses, on-site company trai..

  What is the value of the given twos complement number

What is the value of the following 2's complement number? Express the base 10 number 2110 as a base 4 number_________.

  How long it will take for heater to reach steady operation

An electric resistance space heater is designed such that it resembles a rectangular box 50 cm high, 80 cm long, and 15 cm wide filled with 45 kg of oil.

  Generating ten random permutations

Write down a program which generates ten random permutations of numbers 1 to 10. To produce a random permutation, you require filling a vector along with the numbers 1 to 10 so that no two entries of vector have the same contents.

  Compute the nominal effort and the development time

Compute the nominal effort and the development time for each of the three development modes (i.e. organic, semidetached, and embedded).

  How much dough mix and topping mix are leftover

Bryant's Pizza, Inc. is a producer of frozen pizza products. The company makes a net income of $1.00 for each regular pizza and $1.50 for each deluxe pizza produced. How much dough mix and topping mix are leftover

  Outline the steps necessary to prepare a storage device

Outline the steps necessary to prepare a storage device for storing files. Identify and describe the tools used to prepare a storage device for storing files.

  Define mitigation strategies to enable business continuity

It is estimated that three out of five businesses that experience downtime of 48 hours or more will be out of business within 3 years. Creating a technology risk mitigation and data protection plan requires people, method  and technology in the ri..

  What is the level of the tree

What are the indices for all nodes at level four in the tree.What is the level of the tree.

  State the objectives of file allocation strategies

State the objectives of File allocation strategies. List and compare the different strategies based on their features.

  What current certifications that companies are looking for

Scan your local newspaper's classified job listings. What are the current certifications that companies are looking for with respect to network administrators?

  Systems research and investigate novel ideas and

systems research and investigate novel ideas and applications.write a research report outlining the architecture and

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd