subject

File encryption is the science of writing the contents of a file in a secret code. your encryption program should work like a filter, reading the contents of one file, modifying the data into a code, and then writing the coded contents out to a second file. the second file will be a version of the first file, but written in a secret code. although there are complex encryption techniques, you should come up with a simple one of your own. for example, you could read the first file one character at a time, and add 10 to the character code of each character before it is written to the second file. i would like you to modify the program slightly. you should ask the user what the number is that is going to be used for the encryption. therefore the program will prompt the user for a number and apply it to the data in the file to create the encrypted file. part 2file decryption filterwrite a program that decrypts the file produced by the program in programming challenge 7. the decryption program should read the contents of the coded file, restore the data to its original state, and write it to another file.

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 05:00
This program will store roster and rating information for a soccer team. coaches rate players during tryouts to ensure a balanced team. (1) prompt the user to input five pairs of numbers: a player's jersey number (0 - 99) and the player's rating (1 - 9). store the jersey numbers in one int vector and the ratings in another int vector. output these vectors (i.e., output the roster). (3 pts) ex: enter player 1's jersey number: 84 enter player 1's rating: 7 enter player 2's jersey number: 23 enter player 2's rating: 4 enter player 3's jersey number: 4 enter player 3's rating: 5 enter player 4's jersey number: 30 enter player 4's rating: 2
Answers: 1
question
Computers and Technology, 23.06.2019 03:10
Acomputer has a two-level cache. suppose that 60% of the memory references hit on the first level cache, 35% hit on the second level, and 5% miss. the access times are 5 nsec, 15 nsec, and 60 nsec, respectively, where the times for the level 2 cache and memory start counting at the moment it is known that they are needed (e.g., a level 2 cache access does not even start until the level 1 cache miss occurs). what is the average access time?
Answers: 1
question
Computers and Technology, 23.06.2019 20:00
What software programs are used to to create professional publication? a.) graphics programs b.) word processors c.) page layout programs d.) spreadsheet programs
Answers: 2
question
Computers and Technology, 23.06.2019 22:30
How many points do i need before i can send a chat
Answers: 1
You know the right answer?
File encryption is the science of writing the contents of a file in a secret code. your encryption p...
Questions
question
History, 27.10.2020 20:40
question
Mathematics, 27.10.2020 20:40
question
Mathematics, 27.10.2020 20:40
question
History, 27.10.2020 20:40
question
History, 27.10.2020 20:40
Questions on the website: 13722361