Answer:
A java code was used to write a program that will encrypt and secure a company data that is transmitted over the Internet.
The Java code is shown below
Explanation:
Solution:
CODE IN JAVA:
Encryption.java file:
import java.util.Scanner;
public class Encryption {
public static String encrypt(String number) {
int arr[] = new int[4];
for(int i=0;i<4;i++) {
char ch = number.charAt(i);
arr[i] = Character.getNumericValue(ch);
}
for(int i=0;i<4;i++) {
int temp = arr[i] ;
temp += 7 ;
temp = temp % 10 ;
arr[i] = temp ;
}
int temp = arr[0];
arr[0] = arr[2];
arr[2]= temp ;
temp = arr[1];
arr[1] =arr[3];
arr[3] = temp ;
int newNumber = 0 ;
for(int i=0;i<4;i++)
newNumber = newNumber * 10 + arr[i];
String output = Integer.toString(newNumber);
if(arr[0]==0)
output = "0"+output;
return output;
}
public static String decrypt(String number) {
int arr[] = new int[4];
for(int i=0;i<4;i++) {
char ch = number.charAt(i);
arr[i] = Character.getNumericValue(ch);
}
int temp = arr[0];
arr[0]=arr[2];
arr[2]=temp;
temp = arr[1];
arr[1]=arr[3];
arr[3]=temp;
for(int i=0;i<4;i++) {
int digit = arr[i];
switch(digit) {
case 0:
arr[i] = 3;
break;
case 1:
arr[i] = 4;
break;
case 2:
arr[i] = 5;
break;
case 3:
arr[i] = 6;
break;
case 4:
arr[i] = 7;
break;
case 5:
arr[i] = 8;
break;
case 6:
arr[i] = 9;
break;
case 7:
arr[i] = 0;
break;
case 8:
arr[i] = 1;
break;
case 9:
arr[i] = 2;
break;
}
}
int newNumber = 0 ;
for(int i=0;i<4;i++)
newNumber = newNumber * 10 + arr[i];
String output = Integer.toString(newNumber);
if(arr[0]==0)
output = "0"+output;
return output;
}
public static void main(String[] args) {
Scanner sc = new Scanner(System.in);
System.out.print("Enter a 4 digit integer:");
String number = sc.nextLine();
String encryptedNumber = encrypt(number);
System.out.println("The decrypted number is:"+encryptedNumber);
System.out.println("The original number is:"+decrypt(encryptedNumber));
}
}
1. It defines the amount of white space that appears at the top, bottom, left, and right edge of
our document.
d clipboard.
Answer:
Margin is the correct answer to the given question .
Explanation:
The main objective of the margin is to setting the white space that are showing up at the top , bottom, left and the right corners of the file or the document .
Following are steps to setting the white space that are showing up at the top , bottom, left and the right corners of the file or the document
Firstly click on the page layout options .After that click on the margin tab .In this tab you will given the the top, bottom, left, and right margin according to your need Finally click on ok to finish them .the hose is 2 inches in diameter. What circumference does the plug need to be? remember to type just a number
Answer:
6.28
Explanation:
This problem bothers on the mensuration of flat shapes, a circle.Given data
Diameter d= [tex]2in[/tex]
Radius r = [tex]\frac{d}{2} = \frac{2}{2} = 1in[/tex]
We know that the expression for the circumference of a circle is given as
[tex]C= 2\pi r[/tex]
Substituting our given data and solving for C we have
[tex]C= 2*3.142*1\\C= 6.28[/tex]
An encryption system works by shifting the binary value for a letter one place to the left. "A" then becomes: 1 1 0 0 0 0 1 0 This binary value is then converted to hexadecimal; the hexadecimal value for "A" will be:
Answer:
The hexadecimal equivalent of the encrypted A is C2
Explanation:
Given
Encrypted binary digit of A = 11000010
Required
Hexadecimal equivalent of the encrypted binary digit.
We start by grouping 11000010 in 4 bits
This is as follows;
1100 0010
The we write down the hexadecimal equivalent of each groupings
1100 is equivalent to 12 in hexadecimal
So, 1100 = 12 = C
0010 is represented by 2 in hexadecimal
So, 0010 = 2
Writing this result together; this gives
1100 0010 = C2
Going through the conversion process;
A is first converted to binary digits by shifting a point to the left
A => 11000010
11000010 is then converted to hexadecimal
11000010 = C2
Conclusively, the hexadecimal equivalent of the encrypted A is C2
anyone got a class named computer literacy? or sum similar to using Microsoft programs? i need a lotttt of help, im 3 units behind and school ends Friday. plsssss help meeee btw, im not gonna pay you with just 15 points, i'll pay you with friendship lol and maybe more points to lol
Answer:
I use google docs
Explanation:
I am in 6th grade but i am in expert in computers.
Answer:j
Explanation:
Once a business determines that change needs to occur, what ahould the
business create?
A. Business operation
B. Business analysis
C. Business model
D. Business strategy
Answer:
D. Business strategy
Explanation:
Kono Dio Da!!
There are two types of artificial intelligence, ANI and AGI. What are the main differences between ani and agi?
Answer:ANI is good at performing single tasks, such as playing chess, making predictions and suggestion.Artificial general intelligence (AGI) is the representation of generalized human cognitive abilities in software so that, faced with an unfamiliar task, the AI system could find a solution. An AGI system could perform any task that a human is capable of.Artificial Narrow Intelligence (ANI) has a limited range of abilities.
Explanation:
1).
What is a resume?
A collection of all your professional and artistic works.
A letter which explains why you want a particular job.
A 1-2 page document that demonstrates why you are qualified for a job by summarizing your
skills, education, and experience.
A 5-10 page document that details your professional and educational history in great detail.
Answer:
option 1
Explanation:
its not a job application cause your not appling for a job, a resume is a list of all the things you have done that would be beneficial to a job. for example, previous jobs, skills you have, hobby that pertain to a job you want, education and other professional things.
Hope this helps:)
The different between a compiler and a translaror
Answer:
Compiler converts the program from one computer language to another computer language that is translating from a higher level language to a lower level language. A translator usually has a fixed body of code that is required to translate the program.
Answer:
Answer: Compiler converts the program from one computer language to another computer language that is translating from a higher level language to a lower level language. ... A translator usually has a fixed body of code that is required to translate the program.
Explanation:
Create a story that depicts the events leading up to a vehicle crash fatality, the crash itself, and the emotional aftermath on the family and victims of the crash. In this scenario the crash should be written from your own perspective of losing a close family member in a crash caused by another person making a poor choice (i.e. texting, dui, road rage).
Answer:
About 5 years ago my girlfriend and I were taking a summer camping trip in southern Alberta. I was in the passenger seat trying to find the campground on a map when she drove over the crest of a hill, was blinded by the sun drove into the ditch. It was a seriously steep ditch but we weren't going very fast so all was fine. I looked over at her and laughed before returning my attention to the map, assuming she could safely bring the vehicle back onto the road.
The next thing I knew, the SUV launched onto the pavement and she lost control and we began swerving. I remember feeling the wheels on the driver's side lift off the ground, then the impact as I was slammed into the door and glass exploded into my face. We barrel rolled and we rolled over-front for a seriously long way.
At some point during the chaos I looked over at her to make sure she was "ok", and just as I did so I watched as she was thrown into the ground through her door window and the corner of the roof just above her seat was crushed inward. The way it looked to me was that she had just been crushed between the ground and the roof of the vehicle. I passed out at that point.
When I came to I had somehow already unbuckled myself from my seat and the vehicle was on its roof. I crawled over to her seat and was in absolute shock to see that she was still in one piece. I removed her from her seat and got us out through the windshield before carrying her for about a half a kilometer down the road, still in shock and fueled entirely by adrenaline.
We were found by a driver who had gone past the wreckage and we were eventually taken to a hospital. I broke 3 ribs on my right side and dislocated my right shoulder, she was severely concussed and scraped up but otherwise mostly okay. However she was 7 weeks pregnant at the time and we found out while in hospital that her body had rejected it under the immense and sudden stress.
We are still together and have 3 amazing and beautiful children, but she still holds onto a lot of guilt surrounding the accident and the loss.
Explanation:
Isabela wants to add an image to her presentation. Which tab should she use?
Answer:Insert
Explanation:
Edg. 2021
Which jobs are most likely to be replaced by robots and what effect will this have
Answer:
Here we go. Generally the robots are designed in order to do the work which has very much risk and Humans find it too laborious or hard to do. The robots will be used for the army, or as laborers. In my country Nepal, there's a restaurant where robots are used as waiters. They take order from you and provide you the food. The robots can be used for various purposes but I don't think they will be appointed for the job of higher authority. The use of robots will have massive effect in human life. The use of robots and appointing them in various jobs will cause the problem of unemployment. The poor will be affected and their existence may get into problem. This is one effect but there can be many effects from the use of robots. Using robot in army can reduce human deaths but also people get unemployed. There is both advantage and disadvantage from their use.
Explain how Steve Jobs created and introduced the iPhone and iPad.
Answer:Today, we're introducing three revolutionary products. The first one is a widescreen iPod with touch controls. The second is a revolutionary mobile phone. And the third is a breakthrough Internet communications device. So, three things: a widescreen iPod with touch controls, a revolutionary mobile phone, and a breakthrough Internet communications device. An iPod, a phone, and an Internet communicator. An iPod, a phone...are you getting it? These are not three separate devices. This is one device. And we are calling it iPhone. Today, Apple is going to reinvent the phone.
Late last year, former Apple engineer Andy Grignon, who was in charge of the radios on the original iPhone, gave behind-the-scenes look at how Apple patched together demos for the introduction, with Steve Jobs showing off developmental devices full of buggy software and hardware issues. The iPhone team knew that everything had to go just right for the live iPhone demos to succeed, and they did, turning the smartphone industry on its head even as Apple continue to scramble to finish work on the iPhone.
Apple had actually been interested first in developing a tablet known as "Safari Pad", but as noted by a number of sources including Steve Jobs himself, the company shifted gears once it became clear how revolutionary the multi-touch interface developed for the tablet could be for a smartphone. Apple's tablet wouldn't surface until the launch of the iPad in 2010, three years after the introduction of the iPhone.
Seven years after the famous Macworld 2007 keynote, the iPhone has seen significant enhancements in every area, but the original iPhone remains recognizable as Apple has maintained the overall look of a sleek design with a larger touchscreen and a single round home button on the face of the device.
Explanation:
6. A small design agency you are consulting for will be creating client websites and wants to purchase a web server so they can host the sites themselves. How will you advise them on this purchase?
Answer:
Explanation:
The best way to advise the agency in this matter would be to help them completely understand the total cost of ownership of the server. This includes the server itself but many other factors as well. Such as any and all server software and application software that they will need, an IT server manager, facility costs, security costs, backup features. These are some of the main costs that they will be incurring but there may be more unforeseen costs. Therefore the best way to advise them is by providing all of this information so that they can make the most informed decision possible.
Briefly explain the purpose of the design process
Answer:
When you want to create something or if you want to solve a problem or if you have been assigned a task but the steps towards the results are not clear yet. The purpose of a design-process is to shape and guide your work and thoughts to improve the outcome.
Explanation:
Don is creating a very long document, and he would like to create an introductory page that contains the title of the document and the name of the author along with the date.
Answer:
This is a very good choice, to do so Don can insert a cover page. He can go to the options menu, pick the "insert" lash, and then to the "pages" square in the far left of the toolbox. There he will find a "cover page" section that will automatically add a cover page at the beginning of the document.
Explanation:
The reasons for this answer are that in the first place, it is very difficult to go o the first page of the document and move everything down because the format would be lost. Then, he would require to edit everything. It would also result in the same in case he only added a white page and started writing. So he needs a specific object that wouldn't damage the format if edited on the first page.
Fill in each blank with the correct answer/output.
int[] vals = {7,5,3,9,0,37,93,16,68,6,99};
System.out.println(vals[vals[1]+vals[4]]);
Answer:
37
Explanation:
Given int[] vals = {7,5,3,9,0,37,93,16,68,6,99};
In programming, the position of each value in the list are known as index. The first value is always assigned index of 0 not 1, the second value is assigned index of 1 and so on. For example;
val[0] = 7 i.e value with index 0
val[1] = 5
val[4] = 0
In order to print out this value
System.out.println(vals[vals[1]+vals[4]]);
Substituting the index value val[1] and val[4] into the argument given
vals[vals[1]+vals[4]]
= vals[5+0]
= vals[5]
= 37 (value at the 5th index)
System.out.println(vals[vals[1]+vals[4]]);
= 37
This means that the system will print out 37 to the console
What is the different between a computer and a phone?
The most obvious difference between a cell phone and PC is the size. Cell phones are significantly smaller than PCs, and are able to fit in the palm of one's hand. ... Cell phones have less command functions than a PC's keyboard and considerably less storage space. Some cell phones may be used as a GPS device
A soldier white line down the center of a two lane road indicates
Answer:
This indicates that you may carefully switch lanes.
Explanation:
If dotted line, then yes.
Sarah works in a coffee house where she is responsible for keying in customer orders. A customer orders snacks and coffee, but later, cancels the snacks, saying she wants only coffee. At the end of the day, Sarah finds that there is a mismatch in the snack items ordered. Which term suggests that data has been violated?
Answer:
Stack
Explanation:
Stack is a linear data structure that follows a particular order in the way an operation is done or sequence a job is completed.
It uses either LIFO ( Last In, First Out) which is also known as first come first served sequence or FILO (First In, Last Out) sequence.
There are several real life examples of which we can use the example of replacing the snack items Sarah brought for the customer.
If Sarah used the LIFO method, it means she replaced the snack items first ontop of the already existing snack items that's why there is a mismatch.
Answer:
c
Explanation:
how do u type faster
Answer:
by learning the right home keys and how to place the fingers
Explanation:
the left hand side : A,S,D,F
the right hand side: :, L, K, J
the two little fingers are guide keys
guide keys: letter A and column
Benefits of Computer Science?
[tex]<marquee>Thanks♥️</marquee>[/tex]
Answer:
1.It paves the way for a more equitable world
It could be a tool for societal rebalance regarding gender identity, ethnicity, background and more.
2. Computer science can empower those who are often overlooked.
The tools to build revenue and solve business problems are available to everyone, it could level the playing field.
3.It also accelerate the healthcare progress.
Healthcare seems to be a pretty high priority once considering to improve lives.
So, computer science has the power to enhance and accelerate every other field, including the healthcare aspect.
4.Computer science can expand communication.
We now have social media, chatting and video calling apps along with other applications that could allow you to share
photos and documents with people almost all over the world.
5.It also furthers the education.
btw how do you do that????
Consider sending a 1,600-byte datagram into a link that has an mtu of 500 bytes. suppose the original datagram is stamped with the identification number 291. how many fragments are generated? what are the values in the various fields in the ip datagram(s) generated related to fragmentation?
Explanation:
Step one
The maximum size of data field in each fragment = 480
(because there are 20 bytes IP header) Thus the number of required
fragments [tex]=\frac{1600-20}{480} \\\\= \frac{1580}{480} \\\\=3.29\\\\[/tex]
thus the number of required fragment is 4
Step two
Each fragment will have identification number 291. each fragment except the last one will be of size 500 bytes (including IP header). the offset of the fragments will be 0, 60, 120, 180. each of the first 3 fragments will have
flag = 1; the last fragment will have flag =0
Using the appropriate formula, the number of fragments which would be present in the datagram to be sent would be 4
The minimum length of IP header = 20 bytes
Maximum transmission unit (mtu) = 500 bytes
Hence, the payload would be calculated thus :
mtu - header ;Payload = 500 - 20 = 480Hence, the maximum size of data field per Fragment = 480 bytes
The number of fragments required :
[tex]\frac{datagram \: size - Header \: size}{payload} [/tex][tex] Number \: of \: fragments = \frac{1600 - 20}{480} = 3.29[/tex]
Hence, the number of fragments is 4
Size per Fragment would be 500 bytes each ; the last Fragment would be about 100 bytes Each Fragment would bear the identification number 291.Learn more : https://brainly.com/question/16289731
Explain in detail how we could collect solar energy from space and get it to earth
Answer: Reflectors or inflatable mirrors spread over a vast swath of space, directing solar radiation onto solar panels. These panels convert solar power into either a microwave or a laser, and beam uninterrupted power down to Earth. On Earth, power-receiving stations collect the beam and add it to the electric grid.
Hoped This Helped!!!!
Answer: Reflectors or inflatable mirrors spread over a vast swath of space, directing solar radiation onto solar panels. These panels convert solar power into either a microwave or a laser, and beam uninterrupted power down to Earth. On Earth, power-receiving stations collect the beam and add it to the electric grid.
Explanation:
Please don’t comment if you don’t know the answer.
So I have an hp laptop that I have a year with and everything was working great until a month ago when it started saying that the battery couldn’t hold charge anymore.
Since I didn’t want to buy a battery I simply started using while connected with the charger.
But after a few days of saying the battery couldn’t hold charge out of a sudden when I tried connecting my mouse or controller it would recognized.
It passed power to whatever I connected to it but it simply wouldn’t work.
Can it be fixed?
Or do I have to buy a new one.
Answer:If your notebook computer battery does not power the notebook or will not hold a charge, troubleshoot the battery to see if it needs to be replaced. If the battery indicator LED, located near the power icon, does not glow or always blinks, there is a battery problem. Your computer might operate correctly when it is connected to the power adapter, but not when using battery power.
Explanation:
the blue course at the ski club is 5.8 km long. The red course is 10.3 km long. Mark skied the blue course 15 times and Katy skied the red course 15 times. How much further did Katy ski than Mark?
Answer:
67.5km
Explanation:
mark = 5.8 x 15 = 87km
Katy = 10.3 x 15 = 154.5km
154.5 - 87 = 67.5km
Manuel is working on a project in Visual Studio. He wants to keep this program showing on the entire desktop, but he also needs to have several other applications open so that he can research the project.
Answer:
d. Task View
Explanation:
Based on the scenario being described within the question it can be said that the best feature for this would be the Windows 10 task view. This is a task switcher and virtual desktop system included in the Windows 10 operating system, and allow the individual user to quickly locate, manage, open or hide different windows/tasks. Such as having several projects open in different monitors running at the same time.
A customer seeks to buy a new computer for a private use at home.The customer primarily needs the computer to use the Microsoft PowerPoint application for the purpose of practice presentation skills.As a sales person what size hard disc would you recommend and why?
Answer:
The most common size for desktop hard drives is 3.5 inches, they tend to be faster and more reliable, and have more capacity. But they also make more noise.
Explanation:
If you are continually deleting and installing programs or creating content, the disc must have good reliability.
Keep in mind that larger hard drives are also a little slower, so it is preferable to opt for two smaller ones. Large hard drives are partitioned so there is no problem gettin
chbdg good performance, but if you put everything on one big disk and it breaks, you will lose everything.
If you buy 2 small disks, check that the motherboard does not limit the speed of a second hard disk.
Mention one application of AI from the real world and describe the use of of this application what is the type of learning used in this application
Answer:
The real world AI application is Google Duplex. It is able to receive orders for making reservations. Then it calls the shop or the place and deals with the person and talks to him very fluently and informs you about the reservation. Some other general types of AI application are Google Assistant, Siri , Amazon Alexa and so on. But google Duplex is lot more advanced than them.
Which of the following is a country that cruise ships commonly sail under the flag of?
O United States
O Canada
O Panama
O South Africa
< Previous
Answer:
Panama
hope this helps!
What five safety habits are you using for the internet?
Answer: Keep Personal Information Professional and Limited.
Keep Your Privacy Settings On.
Practice Safe Browsing.
Make Sure Your Internet Connection is Secure.
Be Careful What You Download.
Choose Strong Passwords.
Explanation:that’s what is think