Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

CSE 110 Intro to Computer Science I Lab #8 Requirements (Encrypted Message) Char, the String Class and member functions Design and develop the solution using

CSE 110 Intro to Computer Science I Lab #8 Requirements (Encrypted Message) Char, the String Class and member functions Design and develop the solution using String Class and char operations and functionality. Encrypted messages have been intercepted by your department. The department believes that the message has to do with a shipment on the SS Worthington arriving in port soon, that the encryption algorithm utilizes the ASCII character set (appendix A), and uses an offset of minus 9,plus 3, minus 9, plus 3, repeating throughout the message. Messages also typically contain a semicolon as the end-of-line markers, and the date of the event and the agents name embedded in the message. Write a program that reads the encrypted message below from a file, and displays the unencrypted message, the date of the event, and the name of the agent sending the message. After decryption, the event date is the number of upper case characters in the message as day/month. The number of digits in the message is the year. The name of the agent sending the message is made up of the first decrypted letter, and then the letters at multiples of 41, and is believed to be Tara E in this case. Create a file named encrypted.txt and paste the following single line of characters in it. ]en\\PhTXO]ERKPQXKhtriu k}b{\}en\q^{_xoh^}\:2C09\NP]8h>{orsrkp\mllh|fmbh.@79D\kb{qq\@8hmxo}\|fmbharpnjk^{hD\Lojqn\wrv_nohf|\:A5N8hTjo}lw\`^{bql~pn\|qjqrlw\J.:B;8hJnb}fwdh/;79-hTjonexr|bhpxr}eh`xowb{8h?[BTBWORAPBhl~qD Program format: main should contain the stream declaration, and file opening with error handling (page 286). If the file is opened successfully, call a function that unencrypts and displays the message. Functions are to be in a separate header file. Lab references: isupper, isdigit, strings, char, string[x], and type casting (page 103). The unencrypted output should appear in this format. Replace underscores in the output with spaces: XXX XXX XX XXXXXXXXXXX XXXX XXXXX XXX XXXXXX XX XXXXX XXX; XXXXXXXX XXXXXXXX XXXXX; XXXXX X; XXXX XXXX XXXXXXXXX; XXXXX XXXXXX XX XXXXX; XXXXXX XXXXXXXXX XXXXXXX XXXXX; XXXXXXX XXXXX XXXXXXXXX XXXXX XXXXXX; XXXXXXXXXXX XXX; The event date is: #/#/## The Agent is: XXX XXXXX XX CSE 110 Intro to Computer Science I Grading will be based on meeting all of the lab requirements, operation of the program, accurate output, and adherence to programming standards (white space, comments, variable names, functions names, indentation, etc.). Program note: the project can be solved by determining the ASCII value for each character in the encrypted message and using the offset to unencrypt while counting uppercase letters and digits.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Spatial Database Systems Design Implementation And Project Management

Authors: Albert K.W. Yeung, G. Brent Hall

1st Edition

1402053932, 978-1402053931

More Books

Students also viewed these Databases questions

Question

Under what conditions will a firm shut down temporarily? Explain.

Answered: 1 week ago

Question

=+ What substantive provisions are identified?

Answered: 1 week ago