1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
enot [183]
4 years ago
13

Your program will demonstrate use of arrays, searching an array, using methods, passing parameters by reference, returning value

s from a method, loops, user input, and user display.
For this assignment, you will be creating your own secret code program. Using two arrays, you will initialize one with the lower case alphabet, the other array will consist of a set of alternate symbols or letters, that will form a replacement cipher. The program will start with displaying a description of the program and instructions for the user. Then the user will enter a sentence. The program will then replace each letter with the alternate symbol or letter with the corresponding subscript in the second array (you may treat spaces as a "space" or choose to code the space). The program should then allow the user to enter a "secret code" and translate it back to the original English sentence. The program will use a method that receives the array name and returns the value of the subscript. This value is then used to retrieve the alternative symbol or letter. This method is used for both coding and decoding. The example at the end of these instructions provides a sample display of a cipher program. For this example simple numbers corresponding to their position in the alphabet will be used as the cipher. Your secret code may not use the simple number code in the example, it should use a unique approach that cannot be easily translated without the program.
You will submit your program files and execution screenshots demonstrating all the functionality of the program with at least two examples each of coding and decoding. Remember that your code must be executable. Remember to review the rubric to ensure you have met all the program grading requirements to maximize your grade.
SAMPLE OUTPUT:
This program will translate your input into a secret code. It can also translate your secret code back into English for the receiver. When prompted, enter your input and the program will provide the code or accompanying translation.
Do you want to code or decode? Enter 1 for code or 2 for decode
1
Enter your sentence all in lowercase with no punctuation:
when will the semester start
Your message is:
22 7 4 13 22 8 11 11 19 7 4 18 4 12 4 18 19 4 17 18 19 0 17 19
Do you want to code or decode? Enter 1 for code or 2 for decode
2
Enter your sentence all in secret code with no punctuation:
7 4 11 11 14
Your message is:
hello
Computers and Technology
1 answer:
Contact [7]4 years ago
4 0

woahhhhhhhhhhhhhhhhhh dude

You might be interested in
You are a website designer for a travel website. You have to design an enchanting website. The website should be interactive. Me
levacccp [35]

Answer:

the graphics are lilttle images inside

Explanation:

6 0
4 years ago
It's nothing about a problem just about another thing. How do I change my name for this? I'm just not sure so I need some assist
Mrac [35]
You can’t really change your name but you can make a new account
8 0
3 years ago
Read 2 more answers
Which of the following is true of binary files?
alina1380 [7]
Try using socrative to answer your question it’s really good
3 0
3 years ago
Read 2 more answers
What best describes the difference between plagiarism and fair use
Colt1911 [192]
The answer is ..........
 
<span>Fair use </span>

The doctrine of fair use allows the limited use of copyrighted material for certain educational, scholarly and research purposes without the permission of the copyright owner. It applies to any copyrighted material regardless of source, including the Internet. If you photocopy a page from one of your textbooks or print a page from a copyrighted Internet site for certain educational, scholarly or research purposes, your actions may fall under the doctrine of fair use. The copyright laws give you permission to copy the work<span> (with certain limitations), even though the owner of the copyright did not.


V.S

</span>Plagiarism

Plagiarism is "the representation of another's work or ideas as one's own; it includes the unacknowledged word-for-word use and/or paraphrasing of another<span> person's work, and/or the inappropriate unacknowledged use of another person's </span><span>ideas" (The Ohio State University Code of Student Conduct). This means that if </span><span>you use another person's work when completing any academic assignment,</span><span> </span><span>regardless </span>

5 0
4 years ago
Read 2 more answers
Juan arrives at the clinic 40 minutes late for his follow+ up visit. With a great of gesture and mannerisms, he explains that th
kenny6666 [7]

Answer:

Juan demonstrated high-context communication style as he demonstrated the reason of being late not only by explicitly stating the reasons but also using contextual elements like gestures , body language, facial expressions etc.                          

Explanation:

  • In high-context communication a major part of a communication is read from the context.
  • This context can be an individual, his behavior and nonverbal actions, personal history, facial expressions, the communicative circumstance, body language and the communication process.
  • In high-context communication a person can be regarded as elusive, secretive, not punctual , not able to stick to plans, or inept due to a lack of ability to work on their own.
  • In this communication the circumstance, people, and non-verbal aspects are more important than the communicated words.
  • Decisions and events are based on face-to-face contact, often around a central figure of authority.
  • This communication is viewed as an art form and a way to involve others.
4 0
3 years ago
Other questions:
  • Why is it important to use a structured cabling standard when installing and managing cabling systems?
    12·1 answer
  • Explain the differences between kernel applications of the OS and the applications installed by an organization or user.
    6·1 answer
  • The primary difference between a DVD and a CD is that one is read and written using optics while the other uses magnets.
    12·2 answers
  • private int product(int n) { if(n &lt;= 1) return 1; else return n * product(n-2); } What is the output when product(6) is calle
    6·1 answer
  • Pls help.
    10·2 answers
  • What term is used to refer to the requesting of information from a database?
    10·2 answers
  • in an advertisement is made of a wireless keyboard and a mouse.Name two commonly used methods of connecting devices wirelessly​
    11·1 answer
  • A regional bank implemented an automated solution to streamline their operations for receiving and processing checks/cheques. Th
    8·1 answer
  • Any information that is processed by and sent out from a computer or other electronic device is considered __________.
    13·2 answers
  • write a recursive bool valued function containsvowel that accepts a string and returns true if the string contains a vowel
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!