subject

Algorithm The encryption algorithm is as follows. 1. The low order bit of the code will be toggled. That is, if it is a 1, it will be replaced by a 0; if it is a 0, it will be replaced by a 1. 2. The key will be added to the result of step 1 above. For example, if the input (plain text) is A and the encryption key is 6, the program should take the ASCII value of A, 01000001, toggle bit [0:0], producing 01000000 and then add the encryption key, 6. The final output character would be 01000110, which is the ASCII value F. The decryption algorithm is the reverse. 1. Subtract the encryption key from the ASCII code. 2. Toggle the low order bit of the result of step 1. For example, if the input (cipher text) is F, and the encryption key is 6, we first subtract the encryption key (i. e., we add -6) from the ASCII value of F, 01000110 + 11111010, yielding 01000000. We then toggle bit [0:0], producing 01000001, which is the ASCII value for A. The result of the encryption/decryption algorithm should be stored in locations starting from x3117. Name your program Crypt. asm. You must use routines and they must be meaningful in this program to get full credit.

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 24.06.2019 16:50
7.23 main lab 7 - online shopping cart background this main lab extends the earlier prep lab "online shopping cart part 1". (you should save this as a separate project from the earlier prep lab). you will create an on-line shopping cart like you might use for your on-line purchases. the goal is to become comfortable with setting up classes and using objects. requirements this lab can be done individually or as pair programming. expanded itemtopurchase class (15 points) extend the itemtopurchase class as follows. we will not do unit testing in this lab so we will not be giving you the names of the member functions. create good ones on your own. create a parameterized constructor to assign item name, item description, item price, and item quantity (default values of "none" for name and description, and 0 for price and quantity). additional public member functions set an item description get an item description print the cost of an item - outputs the item name followed by the quantity, price, and subtotal (see example) print the description of an item - outputs the item name and description (see example) additional private data members a string for the description of the item. example output of the function which prints the cost of an item: bottled water 10 @ $1.50 = $15.00 example output of the function which prints the item description:
Answers: 1
question
Computers and Technology, 25.06.2019 08:00
Ais the hardware where the data is actually stored.
Answers: 1
question
Computers and Technology, 25.06.2019 08:00
Aresearcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use. direct identifiers will not be collected; however, ip addresses may be present in the data set. risk of harm should be evaluated by: solely by the magnitude or severity of expected harm. both the magnitude (or severity) and the probability (or likelihood) of harm. solely by the probability of expected harm. neither the magnitude or probability of harm.
Answers: 3
question
Computers and Technology, 25.06.2019 17:30
Conrad is an architect who has just been sued because a buliding he design has collapsed and injured several people. what type of insurance would him with court costs and settlements
Answers: 3
You know the right answer?
Algorithm The encryption algorithm is as follows. 1. The low order bit of the code will be toggled....
Questions
Questions on the website: 13722363