1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oxana [17]
4 years ago
10

One method of encoding messages is known as the "expanding square code". this method encodes message by placing the character of

the message in an odd order square matrix row by row, and then retrieving them in a clockwise expanding square spiral from the center of the matrix. if the message is not exactly the right length to fill the matrix, the rest of the matrix is filled with asterisk characters (*). for example, the two square matrices below show the order in which the characters are placed in the matrix, and the order in which they are retrieved. notice that the order of retrieval begins at the center, then proceed to the right, and then spirals clockwise order in order out 1 2 3 4 5 21 22 23 24 25 6 7 8 9 10 20 7 8 9 10 11 12 13 14 15 19 6 1 2 11 16 17 18 19 20 18 5 4 3 12 21 22 23 24 25 17 16 15 14 13 message in: "this is a test message!!" message out: "stssees a a*!!egmtithis " your program must be able to encode messages by this method. the input (from standard in) will consist of a string of text entered by the user, containing an unknown number of characters n (0 < n <= 1000). from the length of the message, you should determine the minimum odd order required for the matrix, and perform the specified operation. the output for you program will be the encoded message.
Computers and Technology
1 answer:
mars1129 [50]4 years ago
4 0
Wow!! that is ALOT of info,I dont think i could help with this one Umders 699 maybe someone else can sorry that i couldn`t help :)
You might be interested in
Modify the Eggs program to create a new one named EggsInteractive that prompts the user for and accepts a number of eggs for eac
rjkz [21]

Please provide the eggs program!

7 0
3 years ago
Ashley Baker has been the webmaster for Berryhill Finance only ten days when she received an e-mail that threatened to shut down
Natasha_Volkova [10]

Answer:

cyber-extortion

Explanation:

Ashley Baker has been the webmaster for Berryhill Finance only ten days when she received an e-mail that threatened to shut down Berryhill's website unless Ashley wired payment to an overseas account. Ashley was concerned that Berryhill Finance would suffer huge losses if its website went down, so she wired money to the appropriate account. The author of the e-mail successfully committed cyber-extortion.

7 0
3 years ago
Logic errors are easily identified when a program is compiled true or false
lord [1]
<span>A compiler executes each program statement as soon as it is translated.
</span>The statement that logic errors are easily identified when a program is compiled is false, because the compiler locates only syntax errors, but logic errors <span>can be eliminated only through careful examination of your program. </span>
Logic errors are usually more difficult to find and resolve than syntax errors.


7 0
3 years ago
Read 2 more answers
A 1000 elements array is used to store integers ascending order . The array is used to search binary search algorithm for the in
Yuri [45]

Answer:

The overview of the given scenario is described in the explanation section below.

Explanation:

  • BTS (Binary search tree) tends to be a tree with several nodes noting that perhaps the left sub-tree, along with its leaf, tends to have a key which is less than or equal to anything like the parental node value. The do-tree, including its leaf, seems to have a value greater than those of the key from it's own parent node.
  • Binary search algorithm finds a general vicinity in the collection of O(log n) time complexity items whereby n represents the number of elements in the array.

So the provided has never been the binary search trees of its algorithm.

A. 249

B. 342

5 0
3 years ago
Use the following to calculate the acid-test ratio. (Round your answer to two decimal places.) Cash: $100,000 Short-term investm
uysha [10]

Answer: 0.48

Explanation:

The acid test ratio will be calculated as:

Cash = $100,000

Add: Short term investments = $17,000

Add: Net Current Receivables = $250,000

Total Assets = $367,000

/ Total Current Liabilities = $760,000

Acid Test Ratio will now be:

= Total Assets / Total Liabilities

= $367000/$760000.

= 0.48

Therefore, the acid test ratio is 0.48.

5 0
3 years ago
Other questions:
  • Consider a multiprocessor CPU scheduling policy. There are 2 options: 1) a singlecommon ready queue of jobs; when a CPU becomes
    8·1 answer
  • "The correct syntax for passing an array as an argument to a method when a method is called and an array is passed to it is: "
    15·1 answer
  • Which domain ending can only be used by the U.S. government?
    14·2 answers
  • Which is one use for a hyperlink? A. to create a heading style B. to animate important text C. to create a link to a website. D.
    7·1 answer
  • I'm not so good with games and stuff. So, PLZZZ help!!!
    7·2 answers
  • Which UML relationships should be used between a subclass and a superclass? For example, suppose there is an interface or abstra
    5·1 answer
  • Help me please I will make BRAINLIEST
    5·1 answer
  • Choose the assistive technology that best completes each sentence.
    13·1 answer
  • Cui documents must be reviewed to which procedures before destruction?
    13·1 answer
  • You are writing code to store the length of a side of a square. Which one is a good variable name
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!