Reference no: EM13812805
Security is an important feature of information systems. Often, text is encrypted before being sent, and then decrypted upon receipt. We want to build a class (or several classes) encapsulating the concept of encryption. You will need to test that class with a client program where the main method is located.
For this project, encrypting consists of translating each character into another character. For instance, if we consider the English alphabet, including characters a through z, each character is randomly encrypted into another, which could be the same character. (if you like, you can design your program so that no character in encrypted into itself.) To represent this concept, we can have an array of characters for the original alphabet, and another array of characters for the encrypted alphabet.
To encrypt a word, each letter in the work is replaced by the corresponding letter in the encrypted alphabet. For example, the word caged would be encrypted into huzsa. To decrypt a word, the letters in the encrypted word are replaced by the corresponding letter in the original alphabet. For example, the encrypted word xssa would be decrypted as feed.
If we have 26 different characters in the original alphabet, then we will have 26 different characters in the encrypted alphabet. Furthermore, the encrypted alphabet should be randomly generated.
In your main method, you should prompt the user for a sentence. Your program should encrypt the sentence, output the encrypted sentence, then decrypt it, and output the decrypted sentence, which should be identical to the original sentence that was input by the user.
Assignment-vice president of operations
: Using the same scenario from Assignment, present the following findings to your Chief Executive Officer. Create a presentation in a common format (PowerPoint or a similar program) with a minimum of twenty (20) slides and corresponding speaker notes..
|
What is the probability that it will turn red when tested
: Water specimens contain nitrates, a solution that is dropped into the water will cause the specimen to turn red 95% of the time. When used on water specimens without nitrates, the solution turns the water red 10% of the time. Past experience in the l..
|
Manage inventory to meet predictable variability of demand
: 1. Discuss the approaches a firm can use to manage inventory to meet predictable variability of demand. (max. one and a half pages)2. Discuss key issues to be considered when implementing aggregate planning (one and a half pages)
|
Different characters in the original alphabet
: If we have 26 different characters in the original alphabet, then we will have 26 different characters in the encrypted alphabet. Furthermore, the encrypted alphabet should be randomly generated
|
The information technologies
: Please write a short essay about the information technologies that are or will be important to your current or future job. Also, discuss how you plan to improve your skills with those technologies. Use job search websites to identify the skills requ..
|
Question regarding the marketing strategy
: From the e-Activity and the "Hit & Miss: Kodak Ignores the Digital Picture" reading in Chapter 12 of the text, examine the main reasons behind Kodak reinventing itself in order to stay in business.
|
Describe lessons learnt by auditors in aftermath
: Describe the lessons learnt by auditors in the aftermath of recent audit failures - The history of ‘whistle-blowers'reveals few to have been auditors. Why is this so?
|
Myth and myth theory
: Myth and Myth Theory
|