Write following functions as discussed in the class. Encryption is done by adding relative distance in alphabets (a,b,c,d ...z) for each character in the string. There is no punctuation in the input string and all alphabets in the string are upper case. string n = "HELLO WORLD THIS ZEE WORLD"; string encrypt(string) string decrypt(string) Allowed to use C++/Python/JS
Q: What Is K-means? How Can You Select K For K-means?
A:
Q: Use JAVA to create a card game in which the dealer shuffles the deck and deals 13 cards out of the…
A: The algorithm of the above code is as follows: 1. Create an array of size 52 to store the deck of…
Q: implement a c# program that tests our implementation of the CSet class by creating two sets,…
A: Here's a programme that puts our CSet implementation to the test by establishing two sets,…
Q: What is need for finding minimum spanning tree?
A: A spanning tree in which the total sum of the weight of thr edges is the minimum as it can be…
Q: Show that if signature is valid then v = r′ in DSA scheme Please send me the solution within 10…
A: The question is to show that if the signature is valid then v = r in DSA scheme.
Q: Let S be a set of sets with the following recursive definition ∅ ∈ S. If X ⊆ S, then X ∈ S. (a)…
A: Answer: Given ∅ ∈ S. If X ⊆ S, then X ∈ S.
Q: Example Side Effects modifying a non-local variable - modifying a static local variable modifying a…
A: Answer : Modifying a mutable argument passed by reference : It means that you can modify the…
Q: Suppose you are hired to design a reliable byte-stream protocol that uses a sliding window (like…
A: The solution is given in next steps
Q: How machine learning is used in real-world situations?
A: Answer:
Q: Sorry, I am not able to us CV or the.imread function unfortunately
A: Answer: Dear student, I think you haven't installed opencv in your system that's why you are not…
Q: In C++, Write a program that creates a file named "myFile.txt". Write "Hello World!" ten times to…
A: Part-1: Step-1: Start Step-2: Create a file myFile.txt with the help of ofStream Step-3: Declare…
Q: using oracle
A: write sql query to display item name, item price , customer name.
Q: Let A = {a, b, c, d] and R= {(a, a), (b, b), (c, c), (d, d), (a, d), (d, a), (b, c), (c, b)} an…
A: A relation is an equivalence relation if it is reflexive, symmetric and transitive. It is given that…
Q: Define profiling?
A:
Q: Describe five quality guidelines for documentation .? Quickly answer asap
A: A health care provider's professional goal is to heal a patient, ensure patient safety, and deliver…
Q: What is the sub-network address if the destination address is 200.45.34.56 and the subnet mask is…
A:
Q: What is a Live Lock in sql?
A: A livelock is an instance where a request for an exclusive lock is continually turned down because…
Q: Consider the subnet in Fig. 3.11.5. Distance vector routing is used and the following vectors have…
A:
Q: The format of the Malaysian identity card number features 12 digits separated into three blocks by…
A: Input the number of students - Input the number of number of students - print the number of male…
Q: Consider sending a 3500-byte datagram that has arrived at a router R₁ that needs to be sent over a…
A: Datagram size = 3500 byte Data size = (3500 - 20) = 3480 bytesMTU = 1000 bytesData allowed = (1000 -…
Q: The size of the memory could be given as: Size of the memory =Number of Wordsx Number of bits per…
A: Solution: The Address Bus is 8 bits long and the Data Bus is 32 bits long.
Q: A host was given the 192.168.2.64/27 IP address, indicate: i) Netmask of the network. ii) The…
A: Your answer is given below.
Q: Suppose all the interfaces in each of three subnets are required to have the prefix 223.1.17/24.…
A: Answer: We need provide the address constraints for the three given network correspond the subnet so…
Q: What other technological advancements can possibly be developed in the future? NO PLAGIARISM
A: Technological advancements bring revolution along with them to make the lives easier for human…
Q: Please answer this question in 10 mins I will upvote your answer. Subject: FUNDAMENTAL OF COMPUTER…
A: #include<stdio.h> #include<graphics.h> #include<math.h> main() {…
Q: ave three privateinstance variables of type double named length, width, and height. Package should…
A: import java.util.Scanner; public class Package { // Private instance variables private double…
Q: 2. Rolling Out with Networks As organizations begin to realize the benefits of adding a wireless…
A: Your answer is given below.
Q: 1- From the following tables write a SQL query to find the names of departments where more than two…
A: The required SQL query is explained in the next step.
Q: List the applications of minimum spanning tree?
A: The process of creating a set of instructions that tells a computer how to perform a task is known…
Q: • Write a PROLOG program max_tree to find the maximum value in a binary tree (bin_tree) assuming all…
A: Note :- As per our guidelines we are supposed to answer only one question. Kindly in next time…
Q: Define the term control abstraction?
A:
Q: how to write those functions recursivly for a BST C++.Also determine if the root's data appears in…
A: Given an array of integers, the task is to construct a binary tree in level order fashion using…
Q: Write the code for the ShellSort algorithm test?
A: Donald Shell, the algorithm's creator, is honoured with the ShellSort moniker. Fundamentally, this…
Q: What is greedy method?
A: Greedy Method: A greedy algorithm is a critical thinking strategy that makes the locally ideal…
Q: What is Combinatorial Problem
A:
Q: Plot Congestion Window (CWND) with time in wireshark
A: Solution: Introduction: CONGESTION WINDOW (cwnd): A TCP state variable that limits the amount of…
Q: WAP in c# to BitArray Implementation of the CSet Class?
A: Given: WAP in c# to BitArray Implementation of the CSet Class?
Q: ne Static Algorithm Visualiza
A: Introduction: Most software (or video games) that rely on a Graphical User Interface use data…
Q: Find the sub-network address for the following. Sr. No. a) b) c) IP address 141.181.14.16…
A: Answer: We have explain how to find the subnet mask from given IP address and Mask so we will see in…
Q: 5.16 LAB: Cryptographic Hashing Algorithms Encryption methods, such as the Caesar Cipher encryption,…
A: Algorithms: START define hash function Define the main method if __name__ == "__main__":…
Q: Why Data Cleansing Is Important In Data Analysis?
A: Data is the new oil in this 21st century.
Q: Consider the code segment below and create an accessor and mutator for the instance variable height:
A: Dear Student, The required codes is given below -
Q: 4. Write a flow chart that instructs the user to input a positive number (n) print all multiples of…
A:
Q: 2. Create the code to read this file and process the file as it is being processed. The file should…
A: Answer: We have done code in the c programming language because here no mention any programming…
Q: Write Algorithm for Schreier-Sims Method stripping Schreier Generators Input : a set S of generators…
A: procedure Schreier-Sims( var B : partial base; var S : set of elements; i : integer; T : set of…
Q: What Are Structural And Procedural Design Methods?
A: Given: Explain structural and procedural design methods.
Q: make Algorithm to Auxiliary methods for the lockstep protocol. in: set of senders S out: set of…
A: Answer: We have written Algorithm for the lockstep protocol in the brief explanation.
Q: #7 Please you must use the same main function code as exactly in the line 6. Because the codes in…
A: The algorithm for the program is as follows: 1. Input the number of .txt files and the all.txt files…
Q: Program 7: Reserve Conference Room Due on Sunday, 11/27/2022, by 11:59pm Lab Objectives This lab was…
A: COMPILER LINK-: https://www.onlinegdb.com/online_c++_compiler Add your name on comment Just copy…
Q: What is binary search?
A: Introduction In this question we are asked about the Binary Search
I need help with this
Step by step
Solved in 4 steps with 3 images
- Password modifier This program is: python Many user-created passwords are simple and easy to guess. Write a program that takes a simple password and makes it stronger by replacing characters using the key below, and by appending "q*s" to the end of the input string. i becomes ! a becomes @ m becomes M B becomes 8 o becomes . Ex: If the input is: mypassword the output is: Myp@ssw.rdq*s Hint: Python strings are immutable, but support string concatenation. Store and build the stronger password in the given password variable.C. Programming language: Python Share code and screenshot Write a python Program that will include the following: • It will read from the user (with the Input method) a string. The user will be able to enter whatever text he wants. • You should then read the string character by character and do the following If the character is any Latin character (lowercase or uppercase A-Z, a-z) you will print "READING ALPHABETIC CHARACTER *", where * is the character you read If the character is a number you will print "READING DIGIT *", where * is the digit read If the character is any other punctuation mark (or the space), you will print "READING SIMPLE CHARACTER *", where * is the character read • For prints please use f-stringIn c language Using function strtod(), Create a character string that contains the following string: “78.3% is the average success rate” Divide this string into double and display the rest of the string The output will be: The original string is: 78.3% is the average success rate The extracted double value is: 78.3 The remainder of the string is: % is the average success rate
- Given a string on one line and an integer number on a second line, add a copy of the last number of characters of the string to the string's end. Then, output the result. Ex: If the input is: Fuzzy bear 4 the output is: Fuzzy bearbear Note: Using a pre-defined string function, the solution can be just one line of code. #include <iostream>#include <string>using namespace std; int main() { string strVar; int substrLen; getline(cin, strVar); cin >> substrLen; /* Your code goes here */ cout << strVar << endl; return 0;}Code in C++ Language STRING FLIP ALPHABET One of the simplest cryptography technique is to invert the characters such that the first character of the alphabet will be replaced to the last character, the second character be replaced to the second to the last, and so on. So all A's are turned into Z's, B to Y, C to X, and so on until X to C, Y to B, and Z to A. In a similar fashion, numeric characters will also be inverted such that 0 will become 9, 1 to 8, 2 to 7 and so on until 7 to 2, 8 to 1, and 9 to 0. Given a string composed of uppercase and lowercase letters, numbers, and spaces, your task is to invert them. You also must keep the case of the letters as is. Input: A string composed of uppercase and lowercase letters, numbers, and spaces. The quick brown 1 Fox jumps over the 6 lazy Dogs Output: The inverted string Gsv jfrxp yildm 8 Ulc qfnkh levi gsv 3 ozab WlthPython problem To decipher a code we must make a program that performs certain operations on the input string. -If they find 3 equal letters in a row, you must replace them with the next letter in the alphabet.-If you only find 2 equal letters in a row, you must replace them with the previous letter in the alphabet.-The comma must be removed-The period should be left and a space added after it.-All other characters should be left as isNote that in this case after the "Z" is the "A", and therefore before the "A" is the "Z". Given a string S, execute the operations described above, until no more can be executed. For example: GHHGP, OOOMMZAAZ => GGGPPLZZZ => HELLO EntryThe input will be a single line containing the string S. The string only includes uppercase letters of the English alphabet and special characters. DepartureYou must print the resulting string in double quotes ". Examples Input Example 1 LLLENTTA, JDDD OBCCBUMMTO!Output Example 1 "HIDDEN MESSAGE!" Input Example 2…
- c ++ Many user-created passwords are simple and easy to guess. Write a program that takes a simple password and makes it stronger by replacing characters using the key below, and by appending "q*s" to the end of the input string. i becomes ! a becomes @ m becomes M B becomes 8 o becomes . If the input is mypassword, the output is: Myp@ssw.rdq*sPython problem To decipher a code we must make a program that performs certain operations on the input string. -If they find 3 equal letters in a row, you must replace them with the next letter in the alphabet.-If you only find 2 equal letters in a row, you must replace them with the previous letter in the alphabet.-The comma must be removed-The period should be left and a space added after it.-All other characters should be left as isNote that in this case after the "Z" is the "A", and therefore before the "A" is the "Z". Given a string S, execute the operations described above, until no more can be executed. For example: GHHGP, OOOMMZAAZ => GGGPPLZZZ => HELLO EntryThe input will be a single line containing the string S. The string only includes uppercase letters of the English alphabet (Does not include Ñ) and special characters. DepartureYou must print the resulting string in double quotes ". Examples Input Example 1 LLLENTTA, JDDD OBCCBUMMTO!Output Example 1 "HIDDEN…python: def shakespeare_position(role, section): """ Question 2 - Regex You are reading a Shakespeare play with your friends (as one frequently does) and are given a role. You want to know what line immediately precedes YOUR first line in a given section so that you are ready to go when it is your turn. Return this line as a string, excluding the character's name. Lines will always begin with the character's name followed by a ':' and end in a "." or a "?" Each line is separated by a single space. THIS MUST BE DONE IN ONE LINE. "" Args: role (str) section (str) Returns: str section_1 = 'Benvolio: By my head, here come the Capulets. Mercutio: By my heel, I care not. ' + 'Tybalt: Gentlemen, good den - a word with one of you. Mercutio: And but one word with one of us?' >>> shakespeare_position('Tybalt', section_1) 'By my heel, I care not.' >>> shakespeare_position('Mercutio', section_1) 'By my head, here…
- Python Pgogram Write a program that incorporates an algorithm with a function that will check whether or not a string is in a valid password format with the following rules: A password must have at least ten characters.A password consists of only letters, digits and symbol(s).A password must contain at least two digits. A password must contain at least one uppercase letter A password must contain at least one special symbol Your program should continue to prompt until the user enters a valid password. Regular expressions (regex) are not allowed!PYTHON without def function Create a program that takes a string and applies the Atbash cipher to it. Here are a few examples: "apple" ⇒ "zkkov" "Hello world!" ⇒ "Svool dliow!"1- Write a C# program that read a string and Compute the count of "The" in this string. Ex : if string="The flag of The country is The important thing count =3