subject

Using Scheme higher-order function map to implement the string encryption and decryption. 1.1 The encryption function must (1) take the encryption key (key can be between 1 and 4) from the keyboard using (read); and (2) encrypt alphabetic characters and digits only.
1.2 The decryption function must (1) Use the same encryption key from 1.1 for decryption and (2) decrypt the string generated from your encryption function.
Test cases:
(encrypt "Hello CSE240!")
(decrypt "Khoor FVH573!")
3
"Khoor FVH573!"
3
"Hello CSE240!"
Note: When you encrypt a valid character (letters and digits), you add a key to the character. When you decrypt, you will have a different set of the valid characters, which is caused by +key. You can limit the allowed key value to be 1, 2, 3, and 4.

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 23:30
In my email i got a message it says a quick message and in message details on who its from its says nicole and under nicole is [email protected] -
Answers: 1
question
Computers and Technology, 23.06.2019 02:00
Which software would you use to create a print design? a. illustrator b. audacity c. reaper d. dreamweaver
Answers: 2
question
Computers and Technology, 23.06.2019 11:30
In cell h5 enter a formula that will calculate the percentage of attendees that went to the altamonte springs job fair in 2018.
Answers: 1
question
Computers and Technology, 23.06.2019 14:30
Which of the following would not be considered a pc? a. mainframe b. desktop c. tablet pc d. laptop
Answers: 2
You know the right answer?
Using Scheme higher-order function map to implement the string encryption and decryption. 1.1 The...
Questions
Questions on the website: 13722367