subject

Using Scheme higher-order function map to implement the string encryption and decryption. 1.1 The encryption function must (1) take the encryption key (key can be between 1 and 4) from the keyboard using (read); and (2) encrypt alphabetic characters and digits only.
1.2 The decryption function must (1) Use the same encryption key from 1.1 for decryption and (2) decrypt the string generated from your encryption function.
Test cases:
(encrypt "Hello CSE240!")
(decrypt "Khoor FVH573!")
3
"Khoor FVH573!"
3
"Hello CSE240!"
Note: When you encrypt a valid character (letters and digits), you add a key to the character. When you decrypt, you will have a different set of the valid characters, which is caused by +key. You can limit the allowed key value to be 1, 2, 3, and 4.

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 00:50
Is one of the most injurious events that can happen to a person in a crash.
Answers: 1
question
Computers and Technology, 22.06.2019 11:30
Awell-diversified portfolio needs about 20-25 stocks from different categories is this true or false?
Answers: 2
question
Computers and Technology, 22.06.2019 17:00
Match the following. 1. show grouping of word processing tasks that can be performed quick access toolbar 2. shortcut location for commonly used elements scroll bars 3. organized commands used to modify documents ribbon 4. used to align and measure content in a word screen zoom bar 5. vertical and horizontal bars that are used to navigate through a document contextual tabs 6. displays the name of the document in use ruler 7. allows users to enlarge or shrink a visual of a word document title bar
Answers: 2
question
Computers and Technology, 22.06.2019 22:00
What is the name of the option in most presentation applications with which you can modify slide elements? 1. the option enables you to modify a slide element in most presentation applications.
Answers: 3
You know the right answer?
Using Scheme higher-order function map to implement the string encryption and decryption. 1.1 The...
Questions
question
Social Studies, 05.11.2019 23:31