I need to create a Transposition Cipher in Java that runs in Eclipse. The programs need to ask the user to encrypt or decrypt, read/accept a user's text file(.TXT) (NOT PLAIN TEXT), and save it as a new text file (.TXT). Please include as many comments as possible that help explains each line of code.
Q: Write a Python program to implement Caesar cipher. Caesar cipher is used to encrypt text by…
A: Required: Required code with comments for explanation and screenshot of both code and output has…
Q: Implement a SMS spam detection program in python using the Naive Baiyes algorithm. The program…
A: The answer is given below:-
Q: Write a script (yourname.m file in MATLAB) to evaluate the value of D according to the following…
A: MATLAB Code: y=input('Enter the value of y: ');if y<=10000 D=200;else if y>10000…
Q: Write a Java program to encrypt and decrypt a phrase using two similar approaches, each insecure by…
A: note : The question was incomplete I'm doing this question with my experience on subject Answer :
Q: Write a c++ code that takes run time live price of Bitcoin and Ethereum from internet and then…
A: ANSWER: Program:
Q: Write a Python program to implement Caesar cipher. Caesar cipher is used to encrypt text by…
A: def encrypt(text,s): result = "" for i in range(len(text)): char = text[i]…
Q: What are the two lines that your program must have in order to be able to call logging.debug()? What…
A: 1. You must have these two lines at the beginning of your programme to be able to call…
Q: Write an anonymous block to read two numbers from the keyboard, then find out what's the maximum…
A: Code: declare a number; b number;begin a:= &a; b:= &b; if a>b then…
Q: You're interested in looking at trending Twitter hashtags, but you notice that people aren't very…
A: Answer:- Coding def get_hashtagslist(string): ret = [] s='' hashtag = False for char in…
Q: Write an activity that will replace the letter c2 for all the forms of the letter c1 and vice versa.…
A: Create the method with 3 arguments 1st string 2 vice versa string create the variable to store the…
Q: can you plz write in in java.util.scanner and can you make it so i can copy and past it
A: import java.util.*;public class Main { public static void percentEven(int nums[]) { int…
Q: • Modify the previous program such that only the users Alice and Bob are greeted with their names.…
A: Please Provide the previous program.
Q: Kreate the following pattern using java for loops 0 1 9. 9. 4 9. 9. 6. 8 9 96 3. 2.
A: Program Approach: Importing necessary package Defining main class Defining the main method Create…
Q: Open a file and write a program in C++, for example: #include void main { int x int y X=x+y } Then…
A: To take advantage of both languages' strengths, programmers employ Python bindings, which enable…
Q: passcode = [ 6. domain = input("Enter a passcode! ") 8 9 for i in domain: 10 11 12 %3D 13
A: domain = input("Enter a passcode") domain.upper() passcode = domain + len(domain) print(passcode)
Q: You are in the process of choosing between two 3rd party libraries that implement some algorithm and…
A: You are in the process of choosing between two 3rd party libraries that implement some algorithm and…
Q: Write a shell script with a while loop that keeps on accepting strings and outputs them till…
A: LINUX shell script: The shell script is a programming language that is used to write programs to run…
Q: How to do a flowchart on Caesar cipher on paper?
A: Here is the flowchart about the Creaser cipher:
Q: Write a C++ Program to generate random password we are going to see a C++ program through that we…
A: The Answer is
Q: Write a method in Python to read lines from a text file FILE.TXT and display those lines, which are…
A: Define lines() function which includes following statements: Open the file "file1.txt" in read mode…
Q: please give give codes in java/python. C++ also possible but need it to be able to run.
A: import java.util.Scanner; import java.io.File; import java.io.IOException; import…
Q: What does this regex do? re.compile(r'[ckCK]ath([e]*r[yi]n[e]*|[yi])') What are 6 stings that would…
A: What does this regex do?re.compile(r'[ckCK]ath([e]*r[yi]n[e]*|[yi])') Answer: The given regex is…
Q: Project 1: Caesar Cipher
A:
Q: Your task is to implement a cryptographic system, using Java, that encrypts/decrypts all text files…
A: import java.io.File; import java.io.FileInputStream; import java.io.FileOutputStream; import…
Q: Write a script (yourname.m file in MATLAB) to evaluate the value of D according to the following…
A: (1)First we need to read the value of y from the keyboard (2)Use the value y and compute the D…
Q: What is the runtime analysis (expressed using Big-O notation) of the following code snippet?…
A: The above question is solved in step 2 :-
Q: Write a program in C++ that will authenticate a password of 7586, if it is correct it prints "login…
A: Please find the answer below
Q: Write an application in java that encrypts and decrypts on Counter mode using: Aphine chiper…
A: Encryption and decryption: The AES uses two different keys of 128, 192, or 256 bits to interpret…
Q: to print the new dataframe, I get a sytax error in pythong; shouldn't the last line be…
A: Please refer to the following step for the complete solution to the problem above.
Q: Hello. Please look at the following code. When I run it from the command line, I am supposed to get…
A: Try to run the code mentioned in the second step. it should solve your issue.
Q: On a piano, a key has a frequency, say f0. Each higher key (black or white) has a frequency of f0 *…
A: A required C++ program is as follows, File name: “main.cpp” #include<iostream>…
Q: Start up an interactive Python session and try typing in each of the follow-ing commands. Write down…
A: a) print ("Hello, world! ") result: Hello, world! b) print("Hello", "world!") result: Hello world!…
Q: Write a Java Program to a string from user, does "abc" appear in the middle of the string? To define…
A: Answer the above program are as follows
Q: Given the following table. Write a C program to implement Mono-alphabetic cipher for encrypting and…
A: Mono-alphabetic Cipher: Any cipher in which the plain text letters are mapped to cipher text letters…
Q: What is the result of the expression below using the numpy module in Python? 25 x * sin(x/2) S= 26 -…
A: Your python program is given below as you required with an output.
Q: Write a java program that enables the user to enter a string and an index,then cuts the letter in…
A: A part of String is called substring.
Q: write a java code to readn from screen continuing way and stop when reading -1 value then this code…
A: program: import java.util.*;public class Main{ public static void main(String[] args) {…
Q: Write a program in java to take the value of x from user and find the value of 2*x^3 -3x^2+ 5*x+ 16…
A: import java.util.*; public class HelloWorld{ public static void main(String []args){…
Q: As usual, we recommend you approach the program in stages, rather than trying to complete everything…
A: Java code : EncriptionMachine.java import java.util.*; public class EncriptionMachine{ //Method…
Q: Consider the given code. What will be the test cases (values of x and y) that are needed to do full…
A: The test cases that are needed to do full loop coverage for the foo function is as follows.
Q: Can this code be made to news all the way to the cheese and displayed with a "*" instead of finding…
A: Here is the detailed answer of the given problem:
Q: s the user options to encrypt and decrypt with DES and AES. The program should further offer the…
A: Q. Write a program (in JAVA) that gives the user options to encrypt and decrypt with DES and AES.…
Q: ES Mode: CBC Padding: PKCS5
A: Write a program in Java that will read a line of text from keyboard and then encrypt the text using…
Q: Write a program in C to decrypt a cipher text using Caesar Cipher substitution method.Plain text was…
A: Write a program in C to decrypt a cipher text using Caesar Cipher substitution method.Plain text was…
Q: int baselineTemp = 0; int celsius = 0; int fahrenheit = 0; void setup() { pinMode(A0, INPUT);…
A: C++ is the powerful and mostly used programming language that is used among developers. It has very…
Q: 5. Implement fl(x2, x₁) = Σ 0,3, and £2(x2, x₁) = 0,1,2, using a 4×2ROM? ✓ CI Familia v
A: It is defined as Read Only Memory, is a memory device or storage medium that stores information…
Q: Write out the memory snap shot of all declared variables after the following is executed. double…
A: Note: Answering in C++ as no language is mentioned. Input : Value of a. Value of n. Output :…
I need to create a Transposition Cipher in Java that runs in Eclipse. The programs need to ask the user to encrypt or decrypt, read/accept a user's text file(.TXT) (NOT PLAIN TEXT), and save it as a new text file (.TXT). Please include as many comments as possible that help explains each line of code.
Step by step
Solved in 2 steps
- The task is to implement part of a linter program using python. Specifically, you must be able to scan for grouping symbols ( "()", "[]", "{}") and ensure that there are no hanging open symbols or stray closing symbols in the source file. There will be files you will need to scan so you need the open() in your code. Also, you can use the read() or readlines() to know which lines has no opening or stray closing symbols. Example: You scan this code from a file, and you notice that there is a stray closing symbol ")". 1 int main(void) { . 123 2 3 4 printf("Hello world")); return 0; } The implementation must involve recursion in terms of scanning for the scope. If a different closing symbol is encountered or the end of file is reached, the error message "Line : missing closing symbol for "" should be displayed. For stray closing tags, the message "Line : stray closing symbol for "". Do not use "stack" in your code.Please give me the output code in python to the following scenario: Implement function links() that takes as input the name of an HTML file (as a string) and returns the number of hyperlinks in that file. To do this you will assume that each hyperlink appears in an anchor tag. You also need to know that every anchor tag ends with the substring</a>In Java Suppose you are given a text file that contains the names of people. Every name in the file consistsof a first name and a last name. Unfortunately, the programmer that created the file of names hada strange sense of humor and did not guarantee that each name was on a single line of the file.Write a program that reads this file of names and writes them to a new text file, one name per line.For example, if the input file (Names.txt) contains:Bob Jones FredCharles EdMarstonJeffWilliamsThe output file (RecoveredName.txt) should be:Bob JonesFred CharlesEd MarstonJeff WilliamsSample Output:Enter the name of the input file:Names.txtEnter the name of the output file: RecoveredName.txtFile processing completed.
- Write a Java program that opens a file and counts the whitespace-separated words in that file. You may obtain the name of the input file either from the command line or via prompt and user input. Be sure to clearly document the method chosen. You may test your program using any number of text files; however, you must be sure to test your program using the Sample Text File provided at the end (excerpt.txt). Sample Text File There was nothing so VERY remarkable in that; nor did Alice think it so VERY much out of the way to hear the Rabbit say to itself, `Oh dear! Oh dear! I shall be late!' (when she thought it over afterwards, it occurred to her that she ought to have wondered at this, but at the time it all seemed quite natural); but when the Rabbit actually TOOK A WATCH OUT OF ITS WAISTCOAT- POCKET, and looked at it, and then hurried on, Alice started to her feet, for it flashed across her mind that she had never before seen a rabbit with either a waistcoat-pocket, or a watch to…JAVA print a list of names in a table with a fixed-width font. Names must be alphabetized top to bottom, then left to right, and be in columns with an equal number of names, (last column can have less names). The columns can have width that is unequal but have to be as narrow as possible. Use as many columns as you can fit on the page. The size of each column is the number of characters with the longest name in the column. Columns should also be separated by a fixed gutter of various spaces (columns separated by g spaces), the width of the page = 1sws1000 and the size of the gutter = 1sgs1000. If any names have more characters than the width of the page, then the program should print: "hello" input should be taken from the standard input stream (via scanner) and first line should contain two integers separated by a space. Then the first line should be followed by a number of names in the form of a single string per line (names should not contain any whitespace in them and should…I have a text file that have a list of employee's Id and name correspond to it. All the IDs are unique. What I want to do is I want to read from the text file and then sort the Id in order then put it back into the text file. How can I do this in java? Can you write a code for it in java. For example: the text file text.txt contains Id Name 3 Kark 1 Mia 5 Tyrus 2 John After sort, the text.txt will be 1 Mia 2 John 3 Karl 5 Tyrus
- The example of the two CSV files is attached below. One of the file is the crime database and the other one is the suspect database. Specification Your task is to write a python program that will take three CSV file names on the command line. The first CSV file contains STR counts for DNAs found in a list of crime scenes; the second CSV file contains a list of suspect's names and their DNA sequences; the third CSV file name is the output file where you write a CSV file that maps each suspect's name to the list of Crimes that have DNAs matching the suspect. Your program will take three file names on the command line: The first command line argument is a file name for a crime database file in csv file format. The header row would look like this:CrimeID,STR1,STR2,STR3,...Where each STRi is a short DNA sequence that is composed of DNA bases A/C/G/T. And each row will comprise of a CrimeID of the form CIDXXXXX, an integer count for each of the STRs. The second command line argument is a…You are building an application running inside the web browser (a classic SPA). You have to read a list of user's followers' usernames from the server. This list can contain thousands of usernames. You need to implement a component that finds a username from the list based on user input. For example given a list of usernames 'fred', 'frank', 'jerry' . When a user types fr , you should filter the list so that usernames starting with fr are included ( fred and frank in this case). How would you implement this (data structures and algorithms)?In Java: The CSV (or comma-separated values) format is commonly used for tabular data. Each table row is a line, with columns separated by commas. Items may be enclosed in quotation marks, and they must be if they contain commas or quotation marks. Quotation marks inside quoted fields are doubled. Here is a line with four fields:1729, San Francisco, "Hello, World", "He asked: ""Quo vadis?""" Implement a class CSVReader that reads a CSV file, and provide methodsint numberOfRows()int numberOfFields(int row)String field(int row, int column)
- 2 Please help me, I am using Java and it has to be AES As part of this project, you need to consider the following steps in your implementation: 1. With an AES encryption algorithm 2. Sender: Given a document X, write a program that can encrypt X with a passsword. Let’s say the password-protected document is Y 3. Receiver: Given Y, write a program that can ask the user to enter a password and perform decryption process to extract the original document X 4. During your implementation, you can also consider how to incorporate the following case: how a given document can be securely shared with several users. For example, if X is a document, then your platform can support multiple (authorized) users to securely access X.UOWD Library is asking you to write a Java program that manages all the items in the Library. The library has books, journals, and media (DVD for example). All items have a name, author(s), and year of publication. A journal also has a volume number, while a media has a type (audio/video/interactive). The user of your program should be able to add an item, delete an item, change information of an item, list all items in a specific category (book, journal, or media), and print all items (from all categories). A menu asks the user which operation s/he wants to perform. Important: make use of collections, inheritance, interfaces, and exception handling wherever appropriate..Write code for below problem. The input below is just an example and you should implement independent from the input. Please paste the link to the answer shared using pastebin, dotnetfiddle, jsfiddle, or any other similar web-site. You will have an orthogonal triangle input from a file and you need to find the maximum sum of the numbers according to given rules below; 1. You will start from the top and move downwards to an adjacent number as in below. 2. You are only allowed to walk downwards and diagonally. 3. You can only walk over NON PRIME NUMBERS. 4. You have to reach at the end of the pyramid as much as possible. 5. You have to treat your input as pyramid. According to above rules the maximum sum of the numbers from top to bottom in below example is 24. *1 *8 4 2 *69 85*9 3 As you can see this has several paths that fits the rule of NOT PRIME NUMBERS; 1>8>6>9, 1>4>6>9, 1>4>9>9 1 + 8 + 6 + 9 = 24. As you see 1, 8, 6, 9 are all NOT PRIME NUMBERS and walking over these yields the…