A company that wants to send data over the Internet has asked you to write a program that will encrypt it so that it may be transmitted more securely. All the data is transmitted as four-digit integers. Your app should read a four-digit integer entered by the user and encrypt it as follows: Replace each digit with the result of adding 7 to the digit and getting the remainder after dividing the new value by 10. Then swap the first digit with the third, and swap the second digit with the fourth. Then display the encrypted integer. Write a separate app that inputs an encrypted four-digit integer and decrypts it (by reversing the encryption scheme) to form the original number. Use the format specifier D4 to display the encrypted value in case the number starts with a 0

Answers

Answer 1

Answer:

The output of the code:

Enter a 4 digit integer : 1 2 3 4

The decrypted number is : 0 1 8 9

The original number is : 1 2 3 4

Explanation:

Okay, the code will be written in Java(programming language) and the file must be saved as "Encryption.java."

Here is the code, you can just copy and paste the code;

import java.util.Scanner;

public class Encryption {

public static String encrypt(String number) {

int arr[] = new int[4];

for(int i=0;i<4;i++) {

char ch = number.charAt(i);

arr[i] = Character.getNumericValue(ch);

}

for(int i=0;i<4;i++) {

int temp = arr[i] ;

temp += 7 ;

temp = temp % 10 ;

arr[i] = temp ;

}

int temp = arr[0];

arr[0] = arr[2];

arr[2]= temp ;

temp = arr[1];

arr[1] =arr[3];

arr[3] = temp ;

int newNumber = 0 ;

for(int i=0;i<4;i++)

newNumber = newNumber * 10 + arr[i];

String output = Integer.toString(newNumber);

if(arr[0]==0)

output = "0"+output;

return output;

}

public static String decrypt(String number) {

int arr[] = new int[4];

for(int i=0;i<4;i++) {

char ch = number.charAt(i);

arr[i] = Character.getNumericValue(ch);

}

int temp = arr[0];

arr[0]=arr[2];

arr[2]=temp;

temp = arr[1];

arr[1]=arr[3];

arr[3]=temp;

for(int i=0;i<4;i++) {

int digit = arr[i];

switch(digit) {

case 0:

arr[i] = 3;

break;

case 1:

arr[i] = 4;

break;

case 2:

arr[i] = 5;

break;

case 3:

arr[i] = 6;

break;

case 4:

arr[i] = 7;

break;

case 5:

arr[i] = 8;

break;

case 6:

arr[i] = 9;

break;

case 7:

arr[i] = 0;

break;

case 8:

arr[i] = 1;

break;

case 9:

arr[i] = 2;

break;

}

}

int newNumber = 0 ;

for(int i=0;i<4;i++)

newNumber = newNumber * 10 + arr[i];

String output = Integer.toString(newNumber);

if(arr[0]==0)

output = "0"+output;

return output;

}

public static void main(String[] args) {

Scanner sc = new Scanner(System.in);

System.out.print("Enter a 4 digit integer:");

String number = sc.nextLine();

String encryptedNumber = encrypt(number);

System.out.println("The decrypted number is:"+encryptedNumber);

System.out.println("The original number is:"+decrypt(encryptedNumber));

}

}


Related Questions

Rewrite this if/else if code segment into a switch statement int num = 0; int a = 10, b = 20, c = 20, d = 30, x = 40; if (num > 101 && num <= 105) { a += 1; } else if (num == 208) { b += 1; x = 8; } else if (num > 208 && num < 210) { c = c * 3; } else { d += 1004; }

Answers

Answer:

public class SwitchCase {

   public static void main(String[] args) {

       int num = 0;

       int a = 10, b = 20, c = 20, d = 30, x = 40;

       switch (num){

           case 102: a += 1;

           case 103: a += 1;

           case 104: a += 1;

           case 105: a += 1;

           break;

           case 208: b += 1; x = 8;

           break;

           case 209: c = c * 3;

           case 210: c = c * 3;

           break;

           default: d += 1004;

       }

   }

}

Explanation:

Given above is the equivalent code using Switch case in JavaThe switch case test multiple levels of conditions and can easily replace the uses of several if....elseif.....else statements.When using a switch, each condition is treated as a separate case followed by a full colon and the the statement to execute if the case is true.The default statement handles the final else when all the other coditions are false

5.14 ◆ Write a version of the inner product procedure described in Problem 5.13 that uses 6 × 1 loop unrolling. For x86-64, our measurements of the unrolled version give a CPE of 1.07 for integer data but still 3.01 for both floating-point data. A. Explain why any (scalar) version of an inner product procedure running on an Intel Core i7 Haswell processor cannot achieve a CPE less than 1.00. B. Explain why the performance for floating-point data did not improve with loop unrolling.

Answers

Answer:

(a) the number of times the value is performs is up to four cycles. and as such the integer i is executed up to 5 times.  (b)The point version of the floating point can have CPE of 3.00, even when the multiplication operation required is either 4 or 5 clock.

Explanation:

Solution

The two floating point versions can have CPEs of 3.00, even though the multiplication operation demands either 4 or 5 clock cycles by the latency suggests the total number of clock cycles needed to work the actual operation, while issues time to specify the minimum number of cycles between operations.

Now,

sum = sum + udata[i] * vdata[i]

in this case, the value of i performs from 0 to 3.

Thus,

The value of sum is denoted as,

sum = ((((sum + udata[0] * vdata[0])+(udata[1] * vdata[1]))+( udata[2] * vdata[2]))+(udata[3] * vdata[3]))

Thus,

(A)The number of times the value is executed is up to 4 cycle. And the integer i performed up to 5 times.

Thus,

(B) The floating point version can have CPE of 3.00, even though the multiplication operation required either 4 or 5 clock.

SUMMING THE TRIPLES OF THE EVEN INTEGERS FROM 2 THROUGH 10) Starting with a list containing 1 through 10, use filter, map and sum to calculate the total of the triples of the even integers from 2 through 10. Reimplement your code with list comprehensions rather than filter and map.

Answers

Answer:

numbers=list(range(1,11)) #creating the list

even_numbers=list(filter(lambda x: x%2==0, numbers)) #filtering out the even numbers using filter()

triples=list(map(lambda x:x*3 ,even_numbers)) #calculating the triples of each even number using map

total_triples=sum(triples) #calculatting the sum

numbers=list(range(1,11)) #creating the list

even_numbers=[x for x in numbers if x%2==0] #filtering out the even numbers using list comprehension

triples=[x*3 for x in even_numbers] #calculating the triples of each even number using list comprehension

total_triples=sum(triples) #calculating the sum.

Explanation:

Go to the page where you are going to write the code, name the file as 1.py, and copy and paste the following code;

numbers=list(range(1,11)) #creating the list

even_numbers=list(filter(lambda x: x%2==0, numbers)) #filtering out the even numbers using filter()

triples=list(map(lambda x:x*3 ,even_numbers)) #calculating the triples of each even number using map

total_triples=sum(triples) #calculatting the sum

numbers=list(range(1,11)) #creating the list

even_numbers=[x for x in numbers if x%2==0] #filtering out the even numbers using list comprehension

triples=[x*3 for x in even_numbers] #calculating the triples of each even number using list comprehension

total_triples=sum(triples) #calculating the sum

What is the fastest typing speed ever recorded? Please be specific!

Answers

Answer:

250 wpm for almost an hour straight. This was recorded by Barbara Blackburn in 1946.

Implement the function get_stats The function get_stats calculates statistics on a sample of values. It does the following: its input parameter is a csv string a csv (comma separated values) string contains a list of numbers (the sample) return a tuple that has 3 values: (n, stdev, mean) tuple[0] is the number of items in the sample tuple[1] is the standard deviation of the sample tuple[2] is the mean of the sample

Answers

Answer:

Check the explanation

Explanation:

PYTHON CODE: (lesson.py)

import statistics

# function to find standard deviation, mean

def get_stats(csv_string):

   # calling the function to clean the data

   sample=clean(csv_string)

   # finding deviation, mean

   std_dev=statistics.stdev(sample)

   mean=statistics.mean(sample)

   # counting the element in sample

   count=len(sample)

   # return the results in a tuple

   return (count, std_dev, mean)

# function to clean the csv string

def clean(csv_string):

   # temporary list

   t=[]

   # splitting the string by comma

   data=csv_string.split(',')

 

   # looping item in data list

   for item in data:

       # removing space,single quote, double quote

       item=item.strip()

       item= item.replace("'",'')

       item= item.replace('"','')

       # if the item is valid      

       if item:

           # converting into float

           try:

             

               t.append(float(item))

           except:

               continue

   # returning the list of float

   return t

if __name__=='__main__':

   csv = "a, 1, '-2', 2.35, None,, 4, True"

   print(clean(csv))

   print(get_stats('1.0,2.0,3.0'))

6. Why did he choose to install the window not totally plumb?

Answers

Answer:

Because then it would break

Explanation:

You achieve this by obtaining correct measurements. When measuring a window, plumb refers to the vertical planes, and level refers to the horizontal planes. So he did not install the window totally plumb

The cord of a bow string drill was used for
a. holding the cutting tool.
b. providing power for rotation.
c. transportation of the drill.
d. finding the center of the hole.

Answers

Answer:

I don't remember much on this stuff but I think it was B

Let A be an array of n numbers. Recall that a pair of indices i, j is said to be under an inversion if A[i] > A[j] and i < j. Design a divide-and-conquer based algorithm to count the number of inversions in an array of n numbers. You can start by splitting into two subproblems. Answer clearly how you do the merge step, then obtain a recurrence relation that captures the run time of the algorithm. Solve the recurrence relation. Write the complete pseudocode.

Answers

Answer:

Check the explanation

Explanation:

#include <stdio.h>

int inversions(int a[], int low, int high)

{

int mid= (high+low)/2;

if(low>=high)return 0 ;

else

{

int l= inversions(a,low,mid);

int r=inversions(a,mid+1,high);

int total= 0 ;

for(int i = low;i<=mid;i++)

{

for(int j=mid+1;j<=high;j++)

if(a[i]>a[j])total++;

}

return total+ l+r ;

}

}

int main() {

int a[]={5,4,3,2,1};

printf("%d",inversions(a,0,4));

  return 0;

}

Check the output in the below attached image.

Components of a product or system must be
1) Reliable
2) Flexible
3) Purposeful
4)Interchangeable

Answers

Answer:

The correct answer to the following question will be Option D (Interchangeable).

Explanation:

Interchangeability applies towards any portion, part as well as a unit that could be accompanied either by equivalent portion, component, and unit within a specified commodity or piece of technology or equipment.This would be the degree to which another object can be quickly replaced with such an equivalent object without re-calibration being required.

The other three solutions are not situation-ally appropriate, so option D seems to be the right choice.

Implement the function pairSum that takes as parameters a list of distinct integers and a target value n and prints the indices of all pairs of values in the list that sum up to n. If there are no pairs that sum up to n, the function should not print anything. Note that the function does not duplicate pairs of indices

Answers

Answer:

Following are the code to this question:

def pairSum(a,x): #find size of list

   s=len(a) # use length function to calculte length of list and store in s variable

   for x1 in range(0, s):  #outer loop to count all list value

       for x2 in range(x1+1, s):    #inner loop

           if a[x1] + a[x2] == x:    #condition check

               print(x1," ",x2) #print value of loop x1 and x2  

pairSum([12,7,8,6,1,13],13) #calling pairSum method

Output:

0   4

1   3

Explanation:

Description of the above python can be described as follows:

In the above code, a method pairSum is declared, which accepts two-parameter, which is "a and x". Inside the method "s" variable is declared that uses the "len" method, which stores the length of "a" in the "s" variable. In the next line, two for loop is declared, in the first loop, it counts all variable position, inside the loop another loop is used that calculates the next value and inside a condition is defined, that matches list and x variable value. if the condition is true it will print loop value.

Define a thread that will use a TCP connection socket to serve a client Behavior of the thread: it will receive a string from the client and convert it to an uppercase string; the thread should exit after it finishes serving all the requests of a client Create a listening TCP socket While (true) { Wait for the connection from a client Create a new thread that will use the newly created TCP connection socket to serve the client Start the new thread. }

Answers

Answer:

The primary intention of writing this article is to give you an overview of how we can entertain multiple client requests to a server in parallel. For example, you are going to create a TCP/IP server which can receive multiple client requests at the same time and entertain each client request in parallel so that no client will have to wait for server time. Normally, you will get lots of examples of TCP/IP servers and client examples online which are not capable of processing multiple client requests in parallel.  

Explanation:

hope i helped

Which of the following should be the first page of a report?
O Title page
Introduction
O Table of contents
Terms of reference

Answers

Answer:

Title page should be the first page of a report.

hope it helps!

How we can earn from an app​

Answers

Answer:

Hewo, Here are some ways in which apps earn money :-

AdvertisementSubscriptionsIn-App purchasesMerchandisePhysical purchasesSponsorship

hope it helps!

the smallest unit of time in music called?

Answers

Answer:

Ready to help ☺️

Explanation:

A tatum is a feature of music that has been defined as the smallest time interval between notes in a rhythmic phrase.

Answer:

A tatum bc is a feature of music that has been variously defined as the smallest time interval between successive notes in a rhythmic phrase "the shortest durational value

Which term describes the order of arrangement of files and folders on a computer?
File is the order of arrangement of files and folders.

Answers

Answer:

Term describes the order of arrangement of files and folders on a computer would be ORGANIZATION.

:) Hope this helps!

Answer:

The term that describes the order of arrangement of files and folders on a computer is organization.

Explanation:

Your job as a researcher for a college is going well. You have gained confidence and skill at pulling data and you are not making as many rookie mistakes. The college executives are begging to take notice of your skills. The college has had serious problems with reporting in the past for several reasons. One problem is there was no centralized department for numbers. Human Resources did some reporting, financial aid another, and the rest was covered by the registrar’s office. It was difficult to determine simple things like number of students enrolled in the fall semester because different departments would generate different. The higher ups want one consistent number they can rely on and they think your department should be in charge of generating that number.
As the first report as the official office numbers they want you to generate a report that tracks student demographics over time (a longitudinal study). Your college has a large percentage of its student body who are affiliated with the military (active duty military, retired military, military spouse, military dependent). For this study the college executives want to see how they stack up to other colleges that have a large percentage of military students.
After doing some research you find a field in the database that named mil_status. The documentation you have on the field says this is the field you are looking for. Since you need to determine when the student was in the military to generate this report you look for a start and end date associated with mil_status. Sure enough the table also has a mil_status_start and a mil_status_end field. These fields when combined with enrollment data allow you to determine if a student was in the military when they were a student. You query the data to check for bad dates and discover a serious issue. Most of the start dates and end dates are NULL. You once again make some quick phone calls to find out what’s going on. It seems this field is not populated unless the college receives official paperwork from the military listing the soldier’s enlistment date. In addition to this you find out that students are not required to update their information ever semester. This means once their mil status is set it is unlikely to ever change. Based on this information prepare a post that addresses the following:
1) What recommendation(s) would you make to the college’s executives to address this issue?
2) Collecting this data will have tangible and intangible costs associated with it. For example requiring official paper work adds an extra burden on registration and on the student. Students may decide to go elsewhere instead of supplying the paperwork or may stop identifying themselves as military. The executives want the data but they don’t want its collection to impact enrollment or place an undue burden on registration (the line is long enough already). How would you respond to these concerns?
3) You noticed something odd in the mil_Status field. The possible values are "Active Duty Military", "Military spouse", "Retired military", "Military Reserves", and "Military dependent". In what way is this field problematic? How could you fix it?

Answers

Answer:

Check the explanation

Explanation:

Following are the things to be implemented immediately

Database should be maintained centralized manner so that any one can access data. Number should be given at the time of admission it should contain year of admission,course of admission …etc in the form of code eg. 2015FW1001 means year 2015 Fashion studies Winter admission no 1001. At the time of admission only they have to give the details of military status. Department which taking care of this issue should only have the permission to modify and delete the data. All the departments should be connected to the server by internet/intranet/network. Students should be given user id and password

Same database should be connected and given access through internet also with limited privileges so that user can update their status of military by submitting proof. By these information uploaded centralized administrative department update the status if they satisfied with the documents uploaded.

We can overcome the problem of mil status by giving the freedom to the student update their military status by uploading the documents.

What does the following code do?

package shop.ui;
import javax.swing.JOptionPane;
//import java.io.IOException;

final class PopupUI implements UI {
PopupUI() {}
public void displayMessage(String message) {
JOptionPane.showMessageDialog(null,message);
}
public void displayError(String message) {
JOptionPane.showMessageDialog(null,message,"Error",JOptionPane.ERROR_MESSAGE);
}
public void processMenu(UIMenu menu) {
StringBuffer b = new StringBuffer();
b.append(menu.getHeading());
b.append("\n");
b.append("Enter choice by number:");
b.append("\n");
for (int i = 1; i < menu.size(); i++) {
b.append(" " + i + ". " + menu.getPrompt(i));
b.append("\n");
}
String response = JOptionPane.showInputDialog(b.toString());
int selection;
try {
selection = Integer.parseInt(response, 10);
if ((selection < 0) || (selection >= menu.size()))
selection = 0;
} catch (NumberFormatException e) {
selection = 0;
}
menu.runAction(selection);
}
public String[] processForm(UIForm form) {
// TODO
String[]formArray = new String[form.size()];
for(int i=0;i {
String message = JOptionPane.showInputDialog(form.getPrompt(i));
formArray[i] = message;
}
return formArray;
}
}

Answers

Answer: what is this?

Explanation:

Design and implement the Heap.h header using the given Heap class below:
template
class Heap
public:
Heap();
Heap(const T elements[], int arraySize); //
Remove the root from the heap and maintain the heap property
T remove() throw (runtime_error);
// Insert element into the heap and maintain the heap property
void add(const T& element);
// Get the number of element in the heap
int getSize() const;
private:
vector v;
Removing the root in a heap - after the root is removed, the tree must be rebuilt to maintain the heap property:
Move the last node to replace the root;
Let the root be the current node;
While (the current node has children and the current node is smaller than one of its children) Swap the current node with the larger of its children; The current node now is one level down;}
Adding a new node - to add a new node to the heap, first add it to the end of the heap and then rebuild the tree as follows:
Let the last node be the current node;
While (the current node is greater than its parent)
{Swap the current node with its parent; The current node now is one level up:}
To test the header file, write the heapSort function and use the following main program:
#include
#include "Heap.h"
using namespace std;
template
void heapSort(T list[], int arraySize) 1/
your code here .. p
int main()
const int SIZE = 9;
int list[] = { 1, 2, 3, 4, 9, 11, 3, 1, 2 }; heapSort(list, SIZE);
cout << "Sorted elements using heap: \n";
for (int i = 0; i < SIZE; i++) cout << list[i] << " ";
cout << endl;
system("pause");
return;
Sample output:
Sorted elements using heap:
1 1 2 3 3 4 7 9 11

Answers

Answer:

See explaination

Explanation:

/* Heap.h */

#ifndef HEAP_H

#define HEAP_H

#include<iostream>

using namespace std;

template<class T>

class Heap

{

public:

//constructor

Heap()

{

arr = nullptr;

size = maxsize = 0;

}

//parameterized constructor

Heap(const T elements[], int arraySize)

{

maxsize = arraySize;

size = 0;

arr = new T[maxsize];

for(int i=0; i<maxsize; i++)

{

add(elements[i]);

}

}

//Remove the root from the heap and maintain the heap property

T remove() //code is altered

{

T item = arr[0];

arr[0] = arr[size-1];

size--;

T x = arr[0];

int parent = 0;

while(1)

{

int child = 2*parent + 1;

if(child>=size) break;

if(child+1 < size &&arr[child+1]>arr[child])

child++;

if(x>=arr[child]) break;

arr[parent] = arr[child];

parent = child;

}

arr[parent] = x;

return item;

}

//Insert element into the heap and maintain the heap property

void add(const T&element)

{

if(size==0)

{

arr[size] = element;

size++;

return;

}

T x = element;

int child = size;

int parent = (child-1)/2;

while(child>0 && x>arr[parent])

{

arr[child] = arr[parent];

child = parent;

parent = (child-1)/2;

}

arr[child] = x;

size++;

}

//Get the number of element in the heap

int getSize() const

{

return size;

}

private:

T *arr; //code is altered

int size, maxsize;

};

#endif // HEAP_H

///////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////

/* main.cpp */

#include<iostream>

#include "Heap.h"

using namespace std;

template <typename T>

void heapSort(T list[], int arraySize)

{

Heap<T> heap(list, arraySize);

int n = heap.getSize();

for(int i=n-1; i>0; i--)

{

list[i] = heap.remove();

}

}

int main()

{

const int SIZE = 9;

int list[] = {1, 7, 3, 4, 9, 11, 3, 1, 2};

heapSort<int>(list, SIZE);

cout << "Sorted elements using heap: \n";

for (int i = 0; i < SIZE; i++)

cout << list[i] << " ";

cout <<endl;

system("pause");

return 0;

}

3.15 LAB: Countdown until matching digits
Write a program that takes in an integer in the range 20-98 as input. The output is a countdown starting from the integer, and stopping when both output digits are identical.

Ex: If the input is:

93
the output is:

93 92 91 90 89 88
Ex: If the input is:

77
the output is:

77
Ex: If the input is:

15
or any value not between 20 and 98 (inclusive), the output is:

Input must be 20-98.


#include

using namespace std;

int main() {

// variable

int num;



// read number

cin >> num;

while(num<20||num>98)

{

cout<<"Input must be 20-98 ";

cin>> num;

}



while(num % 10 != num /10)

{

// print numbers.

cout<
// update num.

num--;

}

// display the number.

cout<
return 0;

}




I keep getting Program generated too much output.
Output restricted to 50000 characters.

Check program for any unterminated loops generating output

Answers

Answer:

See explaination

Explanation:

n = int(input())

if 20 <= n <= 98:

while n % 11 != 0: // for all numbers in range (20-98) all the identical

digit numbers are divisible by 11,So all numbers that

​​​​​​ are not divisible by 11 are a part of count down, This

while loop stops when output digits get identical.

print(n, end=" ")

n = n - 1

print(n)

else:

print("Input must be 20-98")

An organization’s SOC analyst, through examination of the company’s SIEM, discovers what she believes is Chinese-state sponsored espionage activity on the company’s network. Management agrees with her initial findings given the forensic artifacts she presents are characteristics of malware, but management is unclear on why the analyst thought it was Chinese-state sponsored. You have been brought in as a consultant to help determine 1) whether the systems have been compromised and 2) whether the analyst’s assertion has valid grounds to believe it is Chinese state-sponsored. What steps would you take to answer these questions given that you have been provided a MD5 hashes, two call back domains, and an email that is believed to have been used to conduct a spearphishing attack associated with the corresponding MD5 hash. What other threat intelligence can be generated from this information and how would that help shape your assessment?

Answers

Answer: Provided in the explanation segment

Explanation:

Below is a detailed explanation to make this problem more clearer to understand.

(1). We are asked to determine whether the systems have been compromised;

Ans: (YES) From the question given, We can see that the System is compromised. This is so because the plan of communication has different details of scenarios where incidents occur. This communication plan has a well read table of contents that lists specific type of incidents, where each incident has a brief description of the event.

(2). Whether the analyst’s assertion has valid grounds to believe it is Chinese state-sponsored.

Ans: I can say that the analyst uses several different internet protocol address located in so as to conduct its operations, in one instance, a log file recovered  form an open indexed server revealed tham an IP address located is used to administer the command control node that was communicating with the malware.

(3). What other threat intelligence can be generated from this information?

Ans: The threat that can be generated from this include; Custom backdoors, Strategic web compromises, and also Web Server  exploitation.

(4). How would that help shape your assessment?

Ans: This helps in such a way where information is gathered and transferred out of the target network which involve movement of files through multiple systems.

Files also gotten from networks as well as  using tools (archival) to compress and also encrypt data with effectiveness of their data theft.

cheers i hope this helped!!!

customer seeks to buy a new computer for private use at home. The customer primarily needs the computer to use the Microsoft PowerPoint application for the purpose of practicing presentation skills. As a salesperson what size hard disc would you recommend and why?

Answers

Answer:

A 512 GB Solid State Drive (SSD) will be recommended

Explanation:

Recommended hard disk for the installation of Microsoft PowerPoint application is 3 GB and since the computer is a new one it will be best to buy a hard disc with enough room for expansion, performance speed, durability and reliability

Therefore, a 512 GB Solid State Drive (SSD) is recommended as the price difference is small compared to the spinning hard drive and also there is ample space to store PowerPoint training presentation items locally.

To encrypt messages I propose the formula C = (3P + 1) mod 27, where P is the "plain text" (the original letter value) and C is the "cipher text" (the encrypted letter value). For example, if P = 2 (the letter 'c' ), C would be 7 (the letter 'h') since (3(2) + 1) mod 27 = 7. There is a problem though: When I send the message 'c' to my friend, encrypted as 'h', they don't know whether the original message was 'c' or another letter that also encrypts to 'h'. What other letter(s) would also encrypt to 'h' besides 'c' in this system?

Answers

Answer:

C = (3P+1) % 27

so when P will be max 26,when P is 26 the (3P+1) = 79. And 79/27 = 2 so let's give name n = 2.

Now doing reverse process

We get ,

P = ((27*n)+C-1)/3

Where n can be 0,1,2

So substituting value of n one by one and the C=7(corresponding index of h)

For n= 0,we get P=2, corresponding char is 'c'

For n=1,we get P=11, corresponding char is 'l'

For n=2,we get P= 20, corresponding cahr is 'u'.

So beside 'c',the system will generate 'h' for 'l' and 'u' also.

What should the timing of transition slides be per minute?
Maintain the flow of the presentation to
slides per minute

Answers

Answer:

15 seconds

Explanation:

A presentation slide is supposed to be on for 15 seconds and stop to ask if anyone has any questions, if you are explaining something or reading alond with the slide it could be as long as you want it to be.

Answer:

4 slides per minute

Explanation:

What do we call data that's broken down into bits and sent through a network?

Answers

Answer:

Bits

Explanation:

Who is your favorite smite god in Hi-Rez’s “Smite”

Answers

Answer:

Variety

Explanation:

Write a program that maintains a database containing data, such as name and birthday, about your friends and relatives. You should be able to enter, remove, modify, or search this data. Initially, you can assume that the names are unique. The program should be able to save the data in a fi le for use later. Design a class to represent the database and another class to represent the people. Use a binary search tree of people as a data member of the database class. You can enhance this problem by adding an operation that lists everyone who satisfi es a given criterion. For example, you could list people born in a given month. You should also be able to list everyone in the database.

Answers

Answer:

[tex]5909? \times \frac{?}{?} 10100010 {?}^{?} 00010.222 {?}^{2} [/tex]

Select the correct navigational path to create the function syntax to use the IF function.
Click the Formula tab on the ribbon and look in the ???
'gallery
Select the range of cells.
Then, begin the formula with the ????? click ?????. and click OK.
Add the arguments into the boxes for Logical Test, Value_if_True, and Value_if_False.​

Answers

Answer:

1. Logical

2.=

3.IF

Explanation:

just did the assignment

Reggie receives a phone call from a computer user at his company who says that his computer would not turn on this morning. After asking questions, Reggie realizes that the computer seems to turn on because the user can hear fans spinning and the indicator light comes on and flashes during the boot. The Num Lock key is on, but there is no video on the monitor. Reggie also learns that the computer has a new video card. The night before the computer was working fine, according to the user. Reggie tests the video cord and the monitor. When Reggie reattaches the video cable to the video card port, the computer appears to be working. What might be the problem?

Answers

Answer:

The Integrated video may not be working properly well or functioning well.

Explanation:

Solution:

In this case, it is known that the computer was working fine a night before the problem.

If the video cable is connected to a wrong video port, then the computer was unable to work previous night.the integrated video cord has not seated because most times it occurs, due to the heat sink in the card. after restoring the video cable to the video card port, it works.

If the video was disabled in  BIOS/UEFI, it does not show video, even after restoring the cable.

TRUE OR FALSE! HELP!!

Answers

Answer:

True

Explanation:

There's no one law that governs internet privacy.

What is the best thing to do if you only want your close friends to be able to see your posts?
A
Avoid posting details about your life.

B
Check your privacy settings.

C
Choose your posts carefully.

D
Only post photos instead of comments.

Answers

The answer is B (check your privacy settings) because almost all apps and websites have privacy settings that give you some options for who is allowed to see your posts.

Also, the other three answer choices don’t really respond to the question because they are not about who sees your posts, but what your posts are about.

Answer:

check privacy settings. There will be a filter i am pretty sure :)

Other Questions
Civil rights definition in relation to the federal government in 1696, apollo 11 landed on the moon. it took four days for the spacecraft to travel from earth to the moon. in 2006, new horizons left earth and reached pluto in 2015. Based on this information, what is the most reasonable estimate for a space craft to travel from Earth to Mars. a. six hours b. six days c. six months d. six years Medical calculations, any help please?? can help for this questing 1) 2) Contribution Margin Variance, Contribution Margin Volume Variance, Market Share Variance, Market Size Variance Sulert, Inc., produces and sells gel-filled ice packs. Sulerts performance report for April follows: Actual Budgeted Units sold 290,000 300,000 Sales $1,450,000 $1,515,000 Variable costs 652,500 636,300 Contribution margin $ 797,500 $ 878,700 Market size (in units) 1,250,000 1,200,000 Required: 1. Calculate the contribution margin variance and the contribution margin volume variance. In your computations, round the contribution margin per unit to three decimal places. Contribution margin variance $ Unfavorable Contribution margin volume variance $ Unfavorable 2. Calculate the market share variance and the market size variance. In your computations, round the unit contribution margin to three decimal places and round the market share percentage to one decimal place (for example, .8439 would be rounded to 84.4%). Round your final answers to the nearest dollar. (CMA adapted) Market share variance $ Unfavorable Market size variance $ Favorable Find the surface area of a cube is 150 cm2. What is the length an edge ofthe cube? (all of the sides are squares) Which new consumer product led to the growth of suburbs outside of cities in South Carolina The man who secured an agreement to bring Americans to settle in Texas was _______.Moses AustinSam HoustonSanta AnnaWilliam Travis According to the law of supply, when the price of a good increases the quantity supplied is __________. HELP HELP HELP ME ASAP! Will give BRAINLIEST! Math question down below The table represents the temperature of a cup of coffee over time.Which model best represents the data set? exponential, because there is a relatively consistent multiplicative rate of change exponential, because there is a relatively consistent additive rate of change linear, because there is a relatively consistent multiplicative rate of change linear, because there is a relatively consistent additive rate of change What best labels letter x and y? When humans plant more trees, carbon can begin entering the ____a- hydrosphere b- geosphere c- biosphere Do women have a uterus in their ears?True or False(This is a literal question on my test.) What is the solution to the system of equations?y= {x+3x = -2 A machine cost $1,238,000 on April 1, 2020. Its estimated salvage value is $139,200 and its expected life is 4 years. Calculate the depreciation expense by straight-line for 2020. (Round answer to 0 decimal places, e.g. 5,275.) Depreciation expense $ Calculate the depreciation expense by double-declining balance for 2021. (Round answer to 0 decimal places, e.g. 5,275.) Depreciation expense $ Calculate the depreciation expense by sum-of-the-years'-digits for 2021. (Round answer to 0 decimal places, e.g. 5,275.) Depreciation expense $ Which method would result in the smallest income amount for 2021 A rectangular poster has a length of 24 inches , and its width is 12 inches. What is the perimeter of the poster. helpppppp pros only helppppppp me plzzzzzzzzzzz ill reporte you if you do bad qweshtones Dana is purchasing a new car that costs $24,650. The bank is charging 4% simple interest for 6 years to finance the car. Using I = PRT, where I represents the amount of interest, P equals the amount financed, R represents the interest rate as a decimal, and T represents the number of years the car is financed, how much interest will Dana pay?