subject

An old encryption technique involves replacing each letter in a message with another letter that is a fixed number of positions later in the alphabet (when the replacement goes past the letter Z, the cipher wraps around to the beginning of the alphabet.) Write a program that encrypts a message using this technique. The user will enter the message to be encrypted and the shift amount. Assume the message does not exceed 80 characters. Characters other than letters should be left unchanged. Lower-case letters remain lower-case when encrypted, and upper-case letters remain upper-case. To handle the wrap around problem, use the expression ((ch-'A') n)& 'A' to calculate the encrypted version of an upper-case letter (where ch sores the letter and n stores the shift amount). Use a similar expression for lower-case letters.

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 09:00
What is one way in which tablets differ from laptops and notebooks? tablets are designed for touch-based interaction. tablets are designed to be used as desktops. tablets are designed for input via a keyboard and mouse. tablets are designed to be larger than laptops.
Answers: 1
question
Computers and Technology, 22.06.2019 13:30
Asoftware company hired ray, a college graduate to work in their development team. ray is assigned to work in the coding phase of a project. what happens during the coding phase of a software development project? a. the customer receives a working model of the software. b. developers convert the program design into code. c. developers gather requirements directly from the stakeholders. d. testing teams check the product for quality.
Answers: 1
question
Computers and Technology, 23.06.2019 13:10
What is domain name system (dns)? allows dynamic ip address allocation so users do not have to have a preconfigured ip address to use the network converts ip addresses into domains, or identifying labels that use a variety of recognizable naming conventions the efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures the integration of communication channels into a single service
Answers: 2
question
Computers and Technology, 23.06.2019 18:50
What is transmission control protocol/internet protocol (tcp/ip)? software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons a standard that specifies the format of data as well as the rules to be followed during transmission a simple network protocol that allows the transfer of files between two computers on the internet a standard internet protocol that provides the technical foundation for the public internet as well as for large numbers of private networks
Answers: 2
You know the right answer?
An old encryption technique involves replacing each letter in a message with another letter that is...
Questions
question
Mathematics, 10.09.2020 14:01
question
Mathematics, 10.09.2020 14:01
question
Mathematics, 10.09.2020 14:01
question
Mathematics, 10.09.2020 14:01
question
Mathematics, 10.09.2020 14:01
question
Mathematics, 10.09.2020 14:01
question
Mathematics, 10.09.2020 14:01
question
Mathematics, 10.09.2020 14:01
question
Mathematics, 10.09.2020 14:01
question
English, 10.09.2020 14:01
question
Mathematics, 10.09.2020 14:01
question
History, 10.09.2020 14:01
question
Mathematics, 10.09.2020 14:01
question
Mathematics, 10.09.2020 14:01
question
Mathematics, 10.09.2020 14:01
question
Mathematics, 10.09.2020 14:01
question
Mathematics, 10.09.2020 14:01
question
Mathematics, 10.09.2020 14:01
question
Mathematics, 10.09.2020 14:01
question
Mathematics, 10.09.2020 14:01
Questions on the website: 13722367