Reference no: EM13757891
Provide a complete program that performs a simple substitution cipher. The program should take plain text and a shift value and produce the encrypted text. Then it should take encrypted text and a shift value and produce the plain text once again. A different encrypted text and shift can be entered so make sure to get input.
Example:
EASTER shifted by 3 to left would become HDVWHU
HWVDHU shifted by 3 to right would become EASTER
This is how the early Caesar Cipher worked.
Provide a main method. It should:
Get input for a string and a shift value
Convert to upper case
Only perform the following items on alphabetic characters between A and Z
Utilize a for loop which uses postfix incrementing operator
Convert character to its ASCII equivalent (type cast)
Shift buy shift value entered above
If you reach end of alphabet, wrap around
Example: A shifted to the left 2 would become Y
Convert back to its character equivalent (type cast)
Output the new character
Get input for a string and a shift value
Perform same steps above to convert the encrypted text back to plain text
Be sure to get input again as a different encrypted text may be entered
Utilize postfix increment/decrement operations and compound assignment operators for all math. Example: x++ or x+=2.
80%
Mimic the sample session precisely.
Define what is the role of the information and news media
: Does the information media have social responsibility> If yes, in what ways? If no, why not? What is the role of the information and news media in the shaping of political opinions
|
Effective use of an online library database
: Assignment: Instruction: Effective Use of an Online Library Database, Using the information you have learned write an instruction for feeding an infant. If you have some personal experience in this area, you may use this experience as a source of i..
|
How you can meet the needs of diverse families
: Include how you can meet the needs of diverse families or those that have recently moved to the area.
|
How to talk about technology
: Refer to the ERR article, "How to Talk About Technology," for communication strategies, including: Pictures, Analogies, Testimonials
|
Provide a complete program that performs substitution cipher
: Provide a complete program that performs a simple substitution cipher. The program should take plain text and a shift value and produce the encrypted text. Then it should take encrypted text and a shift value and produce the plain text once again.
|
Relationship between strategic-financial planning
: Write a 1,050-to-1,400 word paper in which you describe the relationship between strategic and financial planning. Include the following: A strategic planning initiative for the organization identified in the Week 2 assignment-Identify an initiat..
|
How the organization of time affect curriculum development
: Then, discuss with your classmates how the following factors affect curriculum: Arrangement and usability of space, Organization of time and Appropriate, quality materials & equipment.
|
Write a program that accepts as input a string variable
: Write a program that accepts as input a string variable called strFirstName, then another string variable called strLastName, and an integer variable called intAge.
|
Differences among these market structures
: What are the conditions for an oligopolistic market? How would you explain the differences among these market structures? Identify which market structure your organization competes in and why you think so.
|