Cryptography is the practice of encryption. Information Security uses cryptography techniques to encrypt and decrypt data. A simple encryption method might take plaintext and mix up the letters using some predetermined pattern and then use that pattern to decrypt the data for reading.

Ciphers are the algorithms used to put the data into its secret pattern and then systematically decrypt it for reading. This script is going to use a famous simple cipher called the Caesar Cipher. It is a substitution cipher where each letter in the text is 'shifted' in a certain number of places. It uses the alphabet as the primary pattern and then based on the shift number, it would shift all the letters and replace the alphabet with our pattern.

For example, if our shift number was 3, then A would be replaced with D, if we performed a right shift. As an example:

Text = "THE CAT IS VISIBLE AT MIDNIGHT" Ciphertext = "WKH FDW LV YLVLEOH DW PLGQLIJKW"

The keys to decrypt this message are the shift number and the direction. The shift value can be any integer from 0 - 25. The above example uses shift = 3 and the shift direction is right or direction = 'r'.

Complete the CipherTest class by adding a constructor to initialize a cipher item. The constructor should initialize the shift to 0, and the direction to 'r' for right shift. If the constructor is called with a shift value, and direction, the constructor should assign each instance attribute with the appropriate parameter value.

Complete the following TODO's: (1) create input for text, shift value, and direction (use lower( )) to keep l and r lower case (2) create a cipher item and use the constructor with the above input values (3) use control structures to call shifttoright() if direction is right and call shifttoleft if direction is left. Make sure you print out the return encrypted message inside the control structures.

We can create the encrypted text by using the ord ( ) function. This function will return an integer that represents the Unicode code point of the character. Character are represented by different values for upp/er and lower case so an 'a' returns the integer 97. By using the unicode value we can add and subtract our shift value represented by an integer.

The given program accepts as input a text string as our message to be encrypted, a shift value, and a direction of 'l' for left and 'r' for right. The program creates a cipher item using the input values. The program outputs the encrypted message based on the shift value and the direction provided.

Ex: If the input is text = "Cryptography is fun!", shift = 4, and direction = l.
The output is:

Answers

Answer 1

The output of the text if the shift= 4 and the direction = l would be: Y.N.U.L.P.K.C.N.W.L.D.U   E.O    B.Q.J

What is Cryptography?

This refers to the art of writing and solving codes through the use of ciphertext.

Hence, we can see that the ciphertext we have is that there is a shift of 4 and it moves in the leftward direction thus, using the letters of the English alphabet, we would encode this and the output is: Y.N.U.L.P.K.C.N.W.L.D.U   E.O    B.Q.J

ABCDEFGHIJKLMNOPQRSTUVWXYZ

Read more about cryptography here:
https://brainly.com/question/88001


#SPJ1


Related Questions

what is the best method to avoid getting spyware on a machine

Answers

Answer: The best method to avoid getting spyware on a user machine is to download software only from trusted websites. And depending on the machine it might say that "This download you are about to install might have spyware or malware and it might infect your laptop" "Do you wish to continue?"

Harmful or malicious pages should always get a page quality (PQ) rating of Lowest in rating

Answers

Harmful or malicious pages should always get a page quality (PQ) rating of Lowest in rating is a true statement.

What is a malicious webpage?

A malicious website is known to be any kind of website that is set up to bring about harm such as a phishing website.

Note that low rating of Harmful or malicious pages  will make people realize that the site is not to be trusted and people will desist from using it.

Learn more about malicious pages fromhttps://brainly.com/question/23294592

How do you properly turn off a computer?

Answers

Answer:

The Power Button

Explanation:

There should be a power button on the side of your computer. You might need to press it and hold it, but it varies on different computers. If you are using a new Mac, press and hold down the same button you use for Touch ID.

Nathan wants to use the Push transition from left to right in his presentation. After he selects the Push transition, what should he do next? Select the From Left option from the Effect Options drop-down menu. Select the From Left option from the Transition group drop-down menu. Select the From Right option from the Effect Options drop-down menu. Select the From Top option from the Transition group drop-down menu

Answers

After he selects the Push transition, He should select from Left option from the Effect Options drop-down menu.

What is push transition in PowerPoint?

The Push Transition Effect is known to be a function in a PowerPoint that helps to pushes one slide to show the other.

Note that when this is  applied to any presentation, it moves the current slide upwards to reveal the next slide and so on. A person can add use this kind of effect to present a scrolling effect to one's PowerPoint work.

Learn more about presentation from

https://brainly.com/question/24653274

Answer:

A

Explanation:

the answer is A

Which of the following best describes a comparison operator?
a. An operator that turns the Drivetrain for a specific angle.
b. A command that compares the color of a disk with the number of disks collected.
C. A control statement that uses Boolean statements as conditions.
d. An operator that compares two operands.

Answers

Answer:

C. A control statement that uses Boolean statements as conditions.

Explanation:

Boolean value can either be True or False.

Control statements check if a certain condition is met. If it is then they evaluate to be true then the necessary lines of code are executed. If it evaluates to be False, the lines of code that were suppose to be executed are skipped.

For example, if y is greater than zero, divide x by y

[tex]if \: \: y > 0 : [/tex]

[tex]a = \frac{x}{y} [/tex]

Which of these is NOT a type of spoofing? sending an e-mail that says it is from a certain bank but it is not

sending unsolicited advertisements to millions of people at once

creating a fake website for a well-known business

changing the number sent to caller ID with a phone call​

Answers

The option that is not  a type of spoofing is creating a fake website for a well-known business.

What is email spoofing?

Email spoofing is known to be a method  that is often used in spam and other forms of phishing attacks. This is often done to trick computer users to see that a message originate from a person or firm that they know.

Conclusively, The option that is not  a type of spoofing is creating a fake website for a well-known business as it is not what spoofing  is all about.

Learn more about spoofing from

https://brainly.com/question/23021587

#SJ1

Answer:

Sending unsolicited advertisements to millions of people at once.

Explanation:

I took the test.

The coordinates for the section element need not be defined as long as its position is set to

Answers

Answer:

relative.

Explanation:

The coordinates for the section element need not be defined as long as its position is set to relative.

If the position is set as relative, then it will have no effect on the positioning attributes, it will consider as static position. If positioning is mentioned explicitly like top: 20px; then it will position 10 pixels down from where it is located. An ability for positional shifts is extremely helpful.

Two things happen when an element is set as relative, one is it introduces the ability to use z-index on that element, second is it limits the scope of absolutely positioned child elements.  

why do you want to work from our company?​

Answers

Answer:

Hwhat

Explanation:

Answer:

I am dedicated, focused and loyal. I believe I am a right fit for this company because I will put in the hours and go the extra mile when necessary. In addition to that, I am also extremely punctual.

Spell all words correctly.

Ben knows that procedural programming structures a computer program as a set of computational steps consisting of computer code that performs a specific task. What should Ben call such sets of code?

Procedural programming structures a computer program as a set of computational steps consisting of computer code that performs a specific task.Such sets of code are called procedures or ___________.

Answers

Answer:

functions

Explanation:

i just took the test

Which CPT icon should be considered when entering CPT codes into a spreadsheet for numerical sorting

Answers

Answer:

##

Hashtag##

Explanation:

Hashtag (#) symbols identifies codes out of numerical sequence. These codes are listed in Appendix N. Star symbols identify codes that, when appended by modifier 95, can be used to report telemedicine services.

I need to write my initials. My name is Michael. Help please! Write my name in binary code!

Answers

Answer:

01001101 01101001 01100011 01101000 01100001 01100101 01101100

Explanation:

found it online ? its a science website that explains how to do it and what it means.

Answer:

01001101 01101001 01100011 01101000 01100001 01100101 01101100

Explanation:

What variation pairs a new employee with an employee who has been with the company for 20 years?

Answers

The variation pairs a new employee with an old employee usually focus on employee accomplishments, and criteria that employee meets or not.

What are the Appraisal Methods used to evaluate an employee's performance?

The behavioral method is known to be one of the ways to check an employee's actions within a given job.

Conclusively, There is also the use of Comparative methods that tends to compare one employee with different employees. The use of Results methods are the ones that looks into  employee accomplishments.

Learn more about variation pairs from

https://brainly.com/question/19262673

Answer:

expert-novice

Explanation:

4. Cash inflows from investing activities normally arise from all of the following EXCEPT

a. selling fixed assets.
b. issuing stock.
c. selling investments.
d. selling intangible assets.

Answers

The answer is b. issuing stock

This is your code. >>> A = [21, 'dog', 'red'] >>> B = [35, 'cat', 'blue'] >>> C = [12, 'fish', 'green'] >>> e = [A,B,C] How do you refer to 'green'? e(2, 2) e(2, 2) e(2)(2) e(2)(2) e[2][2] e[2][2] e[2, 2] e[2, 2]

Answers

Explanation:

e[2][2] gives you the output for green

I hope it helped you

Start every formula with a(n) _____.

asterisk

addition sign

minus sign

equals sign

Answers

Start every formula with a(n) equals sign. Check more about formula below.

What is Excel Formulas about?

All formulas in Excel is known to often start with an equals sign (=).

This is base on the fact that the cell has , or is the same with the formula and the numbers or values that it is said to be calculating.

Conclusively, therefore, all one has to start every formula with a(n) equals sign.

Learn more about formula from

https://brainly.com/question/1216161

#SPJ1

Can someone answer the question s please

Answers

Answer:

1. it the point of art and they do it for fun

2. Yes I done that a couple of time and the reason why is because it fun and it u that is acknowledging your own work that u done for later memories even tho you know it wont last long.

3. I would love to create a sand castle I think or something about kpop

The content of a Wiki is organized by
chronological order
topics
news postings
comments

Answers

Topics, each wiki page is separated into different topics about the subject

in your own view, how can social media be used in teaching and learning in higher education?

Answers

Answer:

through the use of zoom to teach.And reading books online

Design an algorithm that will prompt for and receive pairs of numbers from an operator at a terminal and display their sum, product and average on the screen. If the calculated sum is over 200, an asterisk is to be displayed beside the sum. The program is to terminate when a pair of zero values is entered.

Answers

Explanation:

The Program is written in Python

What is the output of this program? numA = 2 numB = 3 if numA == 2 or numB == 2: print("yes") elif numA == 2 and numB == 3: print("no") Output:

Answers

Answer:

The outcome would be "yes".

Explenation:

numA = 2

numB = 3

if numA == 2 or numB == 2:

   print("yes")

elif numA == 2 and numB == 3:

   print("no")

numA = 2

This line of code declares the variable numA and gives it a value of 2

numB = 3

This line of code declares the variable numB and gives it a value of 3

if numA == 2 or numB == 2:

This part activate the next line of code only if the statement (numA == 2 or numB == 2) is True

   print("yes")

   This code prints out "yes" in the terminal.

elif numA == 2 and numB == 3:

This line of code is similar to the ifstatement above. The code below activates only if the statement (numA == 2 and numB == 3) is True and the previous ifstatement wasn't True.

   print("no")

   This code prints out "no" in the terminal.

Answer:

yes

Explanation:

You are the Emergency Management Director of a small island nation. Your nation has come under Cyber-attack and the attackers have made non-functional the Communications system (Phone, Internet, and Cellular), Water supply, Electrical, Natural Gas, and Waste Treatment. Your staff assures you that each system can be recovered but will take an undetermined time period. You must decide what system should be made operational first with the limited staff available to you.

Answers

Answer:

okay actually what are you trying to get an answer for

Explanation:

..........................

Answers

Answer:

there is no question write the question for an answer

…………….? Hope this helps

What are the correct answers to the following questions?

What are physical waves that travel through matter?
Analog Sound / Digital Sound / Pixels

What are electrical impulses represented as 0’s and 1’s?
Digital Sound / Analog Sound / Slot

What are the tiny dots that make up the images seen on a monitor called?
Pixels / Buses / Slots

What is a network that is confined to a small area?
Local Area Network / Bus / Slot

What is a subsystem that either transfers data between computer components or between computers? Bus / Digital Sound / Analog Sound

What are openings in a computer where printed circuit boards can be inserted to expand the computer’s capabilities called? Slots / Buses / Pixels

Answers

Answer:1.) Analog

2.) Digital

3.) Pixels

4.) Local Area Network

5.) Bus

6.) Slots

Explanation:

The answers to the given questions are:

Analog Sound

Digital Sound

Pixels

Local Area Network (LAN)

Bus

Slots

Physical waves that travel through matter are referred to as analog sound waves.

These waves are continuous and represent the variations in air pressure caused by sound.

Analog sound is used in older forms of audio technology like vinyl records and cassette tapes.

Hence, Analog Sound are physical waves that travel through matter.

Electrical impulses represented as 0's and 1's are characteristic of digital sound.

In digital sound, sound signals are converted into binary code (0's and 1's) which can then be processed and transmitted by computers and other digital devices.

Hence, Digital Sound  are electrical impulses represented as 0’s and 1’s.

The images seen on a monitor or screen are made up of tiny dots called pixels.

Each pixel represents a single point of color or light, and when millions of pixels are combined, they create the images and videos that we see on digital displays.

Hence, the tiny dots that make up the images seen on a monitor called Pixels.

A Local Area Network (LAN) is a network that is confined to a small geographic area, such as within a building, a campus, or a specific group of interconnected buildings.

LANs are commonly used to connect computers and devices within a limited area.

So, Local Area Network is a network that is confined to a small area.

A bus is a subsystem in a computer that facilitates the transfer of data between different computer components (such as the CPU, memory, and peripherals) or between different computers in a network.

Buses can be thought of as communication pathways that enable the flow of information.

Hence, Bus is a subsystem that either transfers data between computer components or between computers.

Slots are openings in a computer's chassis or motherboard where printed circuit boards (also known as expansion cards) can be inserted. These expansion cards can add various capabilities to the computer, such as graphics processing, sound, network connectivity, and more.

Hence,  in a computer where printed circuit boards can be inserted to expand the computer’s capabilities called slots.

To learn more on Computer click here:

https://brainly.com/question/34803897

#SPJ3

why do we need ro use drafting tools. materials and equipment according to its job requirements​

Answers

Answer:

Drafting tools may be used for measurement and layout of drawings, or to improve the consistency and speed of creation of standard drawing elements.

Explanation:

Drafting tools may be used for measurement and layout of drawings, or to improve the consistency and speed of creation of standard drawing elements.

Which of the following data types makes the most sense to use as a constant?

Answers

Answer:

static data

Explanation:

static data doesn't change

Name the malware which looks for security flaws in applications and systems.

Answers

Answer: Worm

Explanation: Worms are one of the most common forms of malware, as they spread easily by finding and expoliting secuirty flaws in operating systems.

Allen is a financial advisor. He would like to show his clients how much their investment has increased over the past year. What type of graph should he use?


a area graph
a pie graph
a line graph
a bar graph

Answers

Answer:

I think it is a line graph

Explanation:

..

What is installing?
the process of putting new software on a computer
the process of replacing an older version of software with a newer version
O the process of limiting who is allowed to access your information
O the process of programming a language to use on a web page

Answers

Answer:

The process of putting a new software on a computer.

Explanation:

Installing is the process of putting a new software on a computer.

Updating is process of replacing an older version of software with a newer version.

what is a buffer in c++

Answers

Answer:

A buffer is temporary storage of data that is on its way to other media or storage of data that can be modified non-sequentially before it is read sequentially. It attempts to reduce the difference between input speed and output speedExplanation:

Coral 3.22 LAB: Loops: Countdown until matching digits

Answers

Answer:

//in c++

#include <iostream>

using namespace std;

int main() {

   int i;

   cin >> i;

   do { cout <<i<<" "; } while (i--);

   return 0;

}

Other Questions
please help me I will give BRAINLY , 5 STARS and a THANKS 59. If [tex]\lim _{x \rightarrow 1} \frac{f(x)-8}{x-1}=10,[/tex] find [tex]\lim _{x\rightarrow1}f(x)\text{.}[/tex] Duriing exercise, what body condition is the body trying to keep in homeotasis? which expression is equivalent to 16 + 2 x 36? The arts of the High Renaissance in Italy are characterized by (choose one) A. Dramatically lit, theatrical compositions that exhibit spectacular subjects and diagonal movements in space, seeking to evoke intense emotional responses from viewers. B. Images that replicate the detailed appearance of the natural world in ways that simulate surfaces, visual effects, and textures. C. A self-confident and expanded humanism, an enduring admiration of classical forms combined with naturalistic representation, and a dominating sense of stability and order. D. None of the above Meredith would like a job in the arts where she is self-employed. which job would give her the best chance of working for herself? photographer actress sound engineering technician broadcast news analyst computer career opportunities3 types HELP QUICK PLEASE! Ben wants to find out how much time off he is allowed if he and his spouse adopt a baby. Which of his coworkers is MOST likely to know this information?A. benefits specialistB. training specialistC. job analysis specialistD. external trainer The moment of inertia about the axis of a solid cylinder is _____ the moment of inertia of a cylindrical shell having the same mass and radius. What is the value of x? At the neuromuscular junction of vertebrates the neurotransmitter acetylcholine is released suppose the acceleration function of an object moving along a line is given by a(t) =0.2t. find the position of the object if you know the initial velocity was v(0) =-3 and initial position was s(0) =1 What was the purpose of the war powers act of 1973? to limit the presidents ability to commit troops to give the us military more power overseas to limit congresss ability to declare war to bring an end to the vietnam war Plot the image of point A under a dilation about the origin (0,0) with a scale factor of 1/3 When using PCR to study DNA, the base pairs split and the DNA cleaves into single strands. What stage of the process does this MOST accurately describe?A. annealingB. denaturizationC. extensionD. hybridization Which of the following is NOT a guaranteed basic right according to the United Nations Declaration of Human Rights?The right to liberty.The right to enjoy a basic standard of living.The right to a life devoid of all problems.The right to own property. Is the equation balanced? Why or why not? 2 Zn + 2 HCl ----------> 2 H2 + 2 ZnCl2 SPS3.bGroup of answer choicesYes because the law of conservation of matter is being followed. The mass of the reactants is equal to the mass of the products.No because the law of conservation of energy is not followed. There are different amounts of energy in the reactants and products.Yes because the law of conservation of energy is followed. There are equal amounts of energy in the reactants and products.No because the law of conservation of mass is not being followed. The hydrogen and chlorine atoms have different numbers of atoms in the reactants and products. Matter and energy are transferred food webs, beginning with solar energy used for photosynthesis. A catastrophic events eliminate all plants life associated with this food web. Hypothesize as to the result of eliminating all the plants in this situation Everyone I really need the answers now I know that the points I offer are not much but I need I really need someone to answer this. Thank you to whoever answers Select the correct answer.While revising an interpretive essay on a novel for coherence, you would check: A. the essayist's depth and diversity of interpretationB. the sequence of paragraphs to support the thesisC. the crossreferences used for comparative studiesD. background literary information relevant to the novel