1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oxana [17]
3 years ago
10

One method of encoding messages is known as the "expanding square code". this method encodes message by placing the character of

the message in an odd order square matrix row by row, and then retrieving them in a clockwise expanding square spiral from the center of the matrix. if the message is not exactly the right length to fill the matrix, the rest of the matrix is filled with asterisk characters (*). for example, the two square matrices below show the order in which the characters are placed in the matrix, and the order in which they are retrieved. notice that the order of retrieval begins at the center, then proceed to the right, and then spirals clockwise order in order out 1 2 3 4 5 21 22 23 24 25 6 7 8 9 10 20 7 8 9 10 11 12 13 14 15 19 6 1 2 11 16 17 18 19 20 18 5 4 3 12 21 22 23 24 25 17 16 15 14 13 message in: "this is a test message!!" message out: "stssees a a*!!egmtithis " your program must be able to encode messages by this method. the input (from standard in) will consist of a string of text entered by the user, containing an unknown number of characters n (0 < n <= 1000). from the length of the message, you should determine the minimum odd order required for the matrix, and perform the specified operation. the output for you program will be the encoded message.
Computers and Technology
1 answer:
mars1129 [50]3 years ago
4 0
Wow!! that is ALOT of info,I dont think i could help with this one Umders 699 maybe someone else can sorry that i couldn`t help :)
You might be interested in
Describe how an operating system interacts with the computer.
enyata [817]
The user requests an application to run by making a system call to get it started
6 0
3 years ago
Read 2 more answers
How do you make computers or microwaves?
solniwko [45]

Answer:

Using the correct parts.

Explanation:

A computer requires a bunch of parts to be put together, it can be really fun to do. What I recommend doing, if you are wanting to create your own computer is to search online what are the necessary parts and then watch a "creating YOUR first PC" video :)

Hope this helped,

Zaxoosh.

8 0
3 years ago
What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter d
kipiarov [429]

Answer:

D. Hybrid

Explanation:

Hybrid attack is a dictionary attack combined with a brute Force attack, alter the dictionary word by adding numbers at the end of the password, spelling the word backward and slightly misspelling or adding special characters to the word.

Brute Force attack is a password hacking technique that continuously input various values to crack or guess a correct password value.

4 0
3 years ago
Read 2 more answers
In IDLE, which symbols are used for the prompt? <br>*** <br>&lt;&lt;&lt;<br> &gt;&gt;&gt;<br> ---​
Norma-Jean [14]

Answer: >>>

Explanation:

just finished the test and got this right

7 0
3 years ago
How I delete my account of Brainly?
seropon [69]

Answer:

The option to remove your account may be found under Privacy in your Profile Settings.

When you click the box labeled "I wish to remove my account," a request to delete the account will be issued.

Explanation:

5 0
2 years ago
Read 2 more answers
Other questions:
  • How is an orthographic drawing similar or different from an isometric drawing
    12·1 answer
  • Um can anyone who is really into science and physics answer this question
    7·1 answer
  • Change the screen resolution so you can view more information on your screen. Use the resolution that enables you to fit the mos
    6·1 answer
  • Which of the following is NOT a good way to treat an EPA or OSHA inspector?
    15·2 answers
  • Information about hardware engineers?
    9·1 answer
  • Company Wizzy is having trouble with network security. Issues with authentication, viruses, malware/spyware, and other network i
    12·1 answer
  • 1. A truck leaves a stop sign and accelerates uniformly over a time of 5.21 seconds for a
    10·1 answer
  • Create a new Java program called MyInfo. Create one or more method(s) that pass the following information as parameters and prin
    8·1 answer
  • 3.1.14 Wormhole CodeHS <br><br> May I have it in a copy and paste, please?
    5·1 answer
  • Please answer this question​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!