1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kifflom [539]
3 years ago
14

Suppose you are given a text file. Design a Python3 program to encrypt/decrypt that text file as follows:

Computers and Technology
1 answer:
Allushta [10]3 years ago
7 0

Answer:

Explanation:

Please find attachment for the Python program

Download docx
You might be interested in
A data use agreement is required when a researcher uses a limited data set (lds). an lds must have:_________
svetoff [14.1K]

An LDS must have all direct identifiers removed.

According to the HIPPA policy, a Limited Data Set (LDS) is a kind of data set in which direct identifiers are removed.

Limited Data Set  (LDS) is a set of data that can be used for research purposes under the HIPPA policy without any authorization from the patient. However, this kind of data ensures that any kind of identifier information such as the patient's name, relative's name, address, number etc is not shared and not made a part of the research.

Limited Data Set (LDS) shows common information like age, city, and gender information from the data.

The Limited Data Set (LDS) is available to only those researchers with whom the data use agreement has been signed.

To learn more about  Limited Data Set (LDS), click here:

brainly.com/question/2569524

#SPJ4

7 0
1 year ago
Give a pseudo-code description of the O(n)-time algorithm for computing the power function p(x,n).Also draw the trace of computi
laila [671]

Answer:

p(x,n)

1. if(n==0)    [if power is 0]

2.    then result =1.

3.else

4. {    result=1.

5.      for i=1 to n.

6.          {  result = result * x. }  [each time we multiply x once]

7.       return result.

8.  }

Let's count p(3,3)

3\neq0, so come to else part.

i=1: result = result *3 = 3

i=2: result = result *3 = 9

i=2: result = result *3 = 27

Explanation:

here the for loop at step 4 takes O(n) time and other steps take constant time. So overall time complexity = O(n)

6 0
3 years ago
Write a python program to accept a number and check whether it is divisible by 4 or not​
Alenkasestr [34]

Answer:

number = int(input("Enter number: "))

if (number % 4):

 print("{} is not divisible by 4".format(number))

else:

 print("{} is divisible by 4".format(number))

Explanation:

If the %4 operation returns a non-zero number, there is a remainder and thus the number is not divisable by 4.

5 0
2 years ago
Which of the following grinding methods is best suited to a shorter cylindrical workpiece?
schepotkina [342]
well i dont know but i would go with b :D

4 0
3 years ago
Which information is required when designing a field? check all that apply.
Alex_Xolod [135]

Answer:

Explanation:

dimensions or calculation

3 0
2 years ago
Other questions:
  • Trading your bicycle for a snowboard exemplifies ?
    15·1 answer
  • Identify the computer cycle in each of the descriptions below by choosing the answer from the
    12·1 answer
  • Do the shape of a sign gives you a clue about the information contained on the sign
    7·1 answer
  • Can your digital footprint be destroyed or does it remain active on the internet forever
    5·1 answer
  • Consider a system that uses a 32-bit unique salt where users have a 4-digit number as a password (e.g. 6813). Eve wants to crack
    8·2 answers
  • Give your own example of a nested conditional that can be modified to become a single conditional, and show the equivalent singl
    12·1 answer
  • PLEASE HURRY I WILL GIVE BRAILIEST TO WHO EVER ANSWERS AND IS CORRECT
    14·2 answers
  • A recursive method that computes the number of groups of k out of n things has the precondition that ______. n is a positive num
    12·1 answer
  • JAVA
    12·1 answer
  • a web server will utilize a directory protocol to enable users to authenticate with domain credentials. a certificate will be is
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!