Computers and Technology

Write two methods: encrypt and decrypt. encrypt should #take as input a string, and return an encrypted version #of it according to the rules above. # #to encrypt the string, you would: # # - convert the string to uppercase. # - replace all js with is. # - remove all non-letter characters. # - add an x to the end if the length if odd. # - break the string into character pairs. # - replace the second letter of any same-character # pair with x (e. g. ll -> lx). # - encrypt it. # #decrypt should, in turn, take as input a string and #return the unencrypted version, just undoing the last #step. you don't need to worry about js and is, duplicate #letters, or odd numbers of characters in decrypt. # #for example: # # encrypt("ps. hello, world") -> "qlgrqtvzibtyqz" # decrypt("qlgrqtvzibtyqz") -> "pshelxoworldsx" # #hint: you might find it easier if you implement some # functions, like a find_letter function that #returns the row and column of a letter in the cipher.

answer
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 21.06.2019 18:20, dinosaur10
Geneva’s manager would like to see some additional information to make sales decisions. enter a formula in cell j4 using the if function to it whether or not the item beaded earrings should go on sale. it will go on sale if its current sales rank (in cell g4) is 8th or lower. (hint: if the cell value is greater than or equal to 8, it will go on sale.)if this condition is true, the item will go on sale. (hint: the if_true value should be “yes”.)if this condition is false, the item doesn’t need to go on sale. (hint: the if_false value should be “-”.)copy the formula created in cell j4 to the range j5: j14
Answers: 2
image
Computers and Technology, 22.06.2019 16:20, Aleja9
It policy compliance and emerging technologies respond to the following: propose at least three control measures that organizations need to put in place to ensure that they remain complaint with emerging technologies and in a continually changing it environment. examine the correlation of effective configuration management and change control procedures to remain compliant with emerging technologies and it security changes.
Answers: 2
image
Computers and Technology, 24.06.2019 03:30, live4dramaoy0yf9
Explain the importance of html in web page designing in 20 sentences..
Answers: 1
image
Computers and Technology, 24.06.2019 13:20, sanaiajohnson56
In the insert table dialog box, you select the checkbox to create the first row as the header of the table.
Answers: 3
Do you know the correct answer?
Write two methods: encrypt and decrypt. encrypt should #take as input a string, and return an encry...

Questions in other subjects:

Konu
Computers and Technology, 25.12.2020 23:40