Different characters in the original alphabet

Assignment Help Management Information Sys
Reference no: EM13812805

Security is an important feature of information systems. Often, text is encrypted before being sent, and then decrypted upon receipt. We want to build a class (or several classes) encapsulating the concept of encryption. You will need to test that class with a client program where the main method is located.

For this project, encrypting consists of translating each character into another character. For instance, if we consider the English alphabet, including characters a through z, each character is randomly encrypted into another, which could be the same character. (if you like, you can design your program so that no character in encrypted into itself.) To represent this concept, we can have an array of characters for the original alphabet, and another array of characters for the encrypted alphabet.

To encrypt a word, each letter in the work is replaced by the corresponding letter in the encrypted alphabet. For example, the word caged would be encrypted into huzsa. To decrypt a word, the letters in the encrypted word are replaced by the corresponding letter in the original alphabet. For example, the encrypted word xssa would be decrypted as feed.

If we have 26 different characters in the original alphabet, then we will have 26 different characters in the encrypted alphabet. Furthermore, the encrypted alphabet should be randomly generated.

In your main method, you should prompt the user for a sentence. Your program should encrypt the sentence, output the encrypted sentence, then decrypt it, and output the decrypted sentence, which should be identical to the original sentence that was input by the user.

Reference no: EM13812805

Questions Cloud

Assignment-vice president of operations : Using the same scenario from Assignment, present the following findings to your Chief Executive Officer. Create a presentation in a common format (PowerPoint or a similar program) with a minimum of twenty (20) slides and corresponding speaker notes..
What is the probability that it will turn red when tested : Water specimens contain nitrates, a solution that is dropped into the water will cause the specimen to turn red 95% of the time. When used on water specimens without nitrates, the solution turns the water red 10% of the time. Past experience in the l..
Manage inventory to meet predictable variability of demand : 1. Discuss the approaches a firm can use to manage inventory to meet predictable variability of demand. (max. one and a half pages)2. Discuss key issues to be considered when implementing aggregate planning (one and a half pages)
Different characters in the original alphabet : If we have 26 different characters in the original alphabet, then we will have 26 different characters in the encrypted alphabet. Furthermore, the encrypted alphabet should be randomly generated
The information technologies : Please write a short essay about the information technologies that are or will be important to your current or future job.  Also, discuss how you plan to improve your skills with those technologies. Use job search websites to identify the skills requ..
Question regarding the marketing strategy : From the e-Activity and the "Hit & Miss: Kodak Ignores the Digital Picture" reading in Chapter 12 of the text, examine the main reasons behind Kodak reinventing itself in order to stay in business.
Describe lessons learnt by auditors in aftermath : Describe the lessons learnt by auditors in the aftermath of recent audit failures - The history of ‘whistle-blowers'reveals few to have been auditors. Why is this so?
Myth and myth theory : Myth and Myth Theory

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd