1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
enot [183]
3 years ago
13

Your program will demonstrate use of arrays, searching an array, using methods, passing parameters by reference, returning value

s from a method, loops, user input, and user display.
For this assignment, you will be creating your own secret code program. Using two arrays, you will initialize one with the lower case alphabet, the other array will consist of a set of alternate symbols or letters, that will form a replacement cipher. The program will start with displaying a description of the program and instructions for the user. Then the user will enter a sentence. The program will then replace each letter with the alternate symbol or letter with the corresponding subscript in the second array (you may treat spaces as a "space" or choose to code the space). The program should then allow the user to enter a "secret code" and translate it back to the original English sentence. The program will use a method that receives the array name and returns the value of the subscript. This value is then used to retrieve the alternative symbol or letter. This method is used for both coding and decoding. The example at the end of these instructions provides a sample display of a cipher program. For this example simple numbers corresponding to their position in the alphabet will be used as the cipher. Your secret code may not use the simple number code in the example, it should use a unique approach that cannot be easily translated without the program.
You will submit your program files and execution screenshots demonstrating all the functionality of the program with at least two examples each of coding and decoding. Remember that your code must be executable. Remember to review the rubric to ensure you have met all the program grading requirements to maximize your grade.
SAMPLE OUTPUT:
This program will translate your input into a secret code. It can also translate your secret code back into English for the receiver. When prompted, enter your input and the program will provide the code or accompanying translation.
Do you want to code or decode? Enter 1 for code or 2 for decode
1
Enter your sentence all in lowercase with no punctuation:
when will the semester start
Your message is:
22 7 4 13 22 8 11 11 19 7 4 18 4 12 4 18 19 4 17 18 19 0 17 19
Do you want to code or decode? Enter 1 for code or 2 for decode
2
Enter your sentence all in secret code with no punctuation:
7 4 11 11 14
Your message is:
hello
Computers and Technology
1 answer:
Contact [7]3 years ago
4 0

woahhhhhhhhhhhhhhhhhh dude

You might be interested in
The physical parts of the computer that you can see and touch are called______.
Tatiana [17]
Physical parts of computer: Computer Hardware
5 0
2 years ago
~ I already know this ~ who was the bits victim in five nights at freddys 4 <br> ___10 points___
Andreas93 [3]

Answer:

i dont know anything about them only that the bear is the ducks son and the duck is the fox mom.

Explanation:

6 0
2 years ago
Read 2 more answers
What is software piracy
Tju [1.3M]
Software piracy is the illegal copying, distribution, or use of software.
8 0
3 years ago
Read 2 more answers
Stella likes to work with colors and moving pictures. She is good at drawing. Which job role should she choose
PilotLPTM [1.2K]

Answer:

Digital Art or Animator for moving picture art.

Explanation:

7 0
3 years ago
Read 2 more answers
Savings accounts _____.
klemol [59]
???????????????????????
7 0
3 years ago
Other questions:
  • What mode is generally used when delivering a presentation to an audience?
    8·2 answers
  • Henry is sent to work with a customer at the company’s satellite branch in another town. During his visit, he notices that most
    6·1 answer
  • 30
    5·1 answer
  • A bank uses a computer program during the night to tell if the alarm should ring. Sensors in the bank set the following Boolean
    5·1 answer
  • 802.11ac provides an advantage over 802.11n by incorporating increased channel bonding capabilities. What size bonded channels d
    10·1 answer
  • Instructions
    8·1 answer
  • Teniendo en cuenta la realidad mundial acerca de la pandemia, ¿cómo crees que impacta
    9·1 answer
  • What are the different types of application architecture
    5·1 answer
  • The people on this platform are unbelievably nice. its almost rare to see this type of kindness online these days. Just wanted t
    14·1 answer
  • . Question 2 Fill in the blank: R Markdown notebooks can be converted into HTML, PDF, and Word documents, slide presentations, a
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!