(7) Accept a 4-digit number from a user. Your task is to create a simple encrypted corresponding value
of this number. First separate each number into its individual digits. For each individual digit, if the
individual digit is greater than or equal to 5, subtract that value from 9. Output the new value (in its
individual digits) which would now represent the encrypted corresponding value. For example, if the
user entered 5678, the encrypted corresponding value would be 4 2 3 1. (Required: IPO chart,
Pseudocode, C-program and Python)

Answers

Answer 1

Using the knowledge in computational language in python it is possible to write a code that create a simple encrypted corresponding value

of this number.

Writting in the C code:

#include<stdio.h>

int main()

{

   int num,r,rev=0;

   scanf("%d",&num);

   while(num!=0)

   {

       r=num%10;

       rev=rev*10+r;

       num=num/10;

   }

   while(rev!=0)

   {

       r=rev%10;

       if(r>=5)

       {

           r=9-r;

       }

       printf("%d ",r);

       rev=rev/10;

   }

   return 0;

}

Writting in python code:

num=int(input("Enter number:"))

rev=int(str(num)[::-1])

while rev!=0:

   r=rev%10

   if r>=5:

       r=9-r

   print(r,end=" ")

   rev=rev//10

See more about python at brainly.com/question/12975450

#SPJ1

(7) Accept A 4-digit Number From A User. Your Task Is To Create A Simple Encrypted Corresponding Valueof

Related Questions


Write three tasks students can perform in a digital
classroom.

Answers

Answer:

Collaborating with peers through online forums, and meeting apps.

Ability to get more instructional materials and content from relevant websites and applications.

Students could undertake test, assignments online and monitor their progress in real time.

Using the encoding process as a model, create a function that will decipher an encrypted into a plaintext message or encrypt a plaintext message into cipher text string

Answers

The encoding process that creates a function that will decipher an encrypted into a plaintext message or encrypt a plaintext message into cipher text string is given below:

The Code

using System;

namespace EncryptStringSample

{

   class Program

   {

      static void Main(string[] args)

       {

           Console.WriteLine("Please enter a password to use:");

           string password = Console.ReadLine();

          Console.WriteLine("Please enter a string to encrypt:");

           string plaintext = Console.ReadLine();

           Console.WriteLine("");

           Console.WriteLine("Your encrypted string is:");

           string encryptedstring = StringCipher.Encrypt(plaintext, password);

           Console.WriteLine(encryptedstring);

           Console.WriteLine("");

          Console.WriteLine("Your decrypted string is:");

 string decryptedstring = StringCipher. Decrypt (encryptedstring, password);

           Console.WriteLine(decryptedstring);

           Console.WriteLine("");

           Console.WriteLine("Press any key to exit...");

           Console.ReadLine();

       } 

   }

}

Read more about encoding here:

https://brainly.com/question/19746078

#SPJ1

What does 'volatile' mean for a computer's memory?

Answers

Answer:

Explanation:

Volatile memory is a type of memory that maintains its data only while the device is powered. If the power is interrupted for any reason, the data is lost.

Hope this helped and have a good day

Fill in the blank: Problem statements are a succinct way to reference a user’s needs. They also help designers _____. (UX)

build wireframes and prototypes

establish the intent of a design

develop a design system

create a user group

Answers

Answer:

Problem statements are a succinct way to reference a user’s needs. They also help designers establish the intent of a design. (UX)

Why we need deterministic finite automata

Answers

It’s the simplest we can use.

Choose the word that matches each definition. A(n) is a statement that assigns a value to a variable.

Answers

An assignment statement is a statement that assigns a value to a variable.

What is a variable?

A variable can be defined as a specific name which refers to a location in computer memory and it is typically used for storing a value such as an integer.

This ultimately implies that, a variable refers to a named location that is used to store data in the memory of a computer. Also, it is helpful to think of variables as a storage container which holds data that can be changed in the future.

The methods for passing variables.

In Computer technology, there are two main methods for passing variables to functions and these include the following:

Pass-by-value.Pass-by-reference.

In conclusion, an assignment statement refers to a type of statement which s typically used by computer programmers and software developers to assign a value to a variable.

Read more on assignment statement here: https://brainly.com/question/25875756

#SPJ1

There are five goals of a network security program. Describe each.

Answers

The five goals of a network security program are as follows:

Confidentiality.Integrity.Availability.Reliability.Optimization.

What is a Network security program?

A network security program may be defined as a type of program that significantly maintains and controls the durability, usability, reliability, integrity, safety, etc. of a network and its data appropriately.

Confidentiality determines the safety and security of personal data and information that can not be shared or divulged to third-party members. Integrity illustrates that the data and information in your computer system are generally maintained without the actual influence of unauthorized parties.

Availability means that personal data and information are accessed by the user whenever they need it. Reliability determines the capability of a system in order to operate under specific conditions for a particular period of time.

Optimization deals with the group of tools and strategies which are ideal for monitoring, controlling, and enhancing the overall performance of the program.

Therefore, the five goals of a network security program are well described above.

To learn more about Network security, refer to the link:

https://brainly.com/question/24122591

#SPJ1

What is the most common fix for duplicate content

Answers

Answer:

redirecting duplicate content to the canonical URL

I'm stuck in this question please help

Q) Will robots replace humans one day?

Answers

Answer:

Robots will not replace humans

Explanation:

Robots will not replace humans – But they will make us smarter and more efficient. More than three-quarters of those polled (77%) believe that in fifteen years, artificial intelligence (AI) will significantly speed up the decision-making process and make workers more productive.

please make my answer as brainelist

How does an IXP earn money?

Answers

Answer:

IXPs sell their services based on a port

Explanation:

Fill in the blank: When outlining your goals in a competitive audit, you should include your users, _____, and the product’s industry. (UX)

specific information about your product

the competition’s goals

how your product can beat the competition

a list of the competitors

Answers

Answer:

When outlining your goals in a competitive audit, you should include your users, how your product can beat the competition, and the product’s industry.

Explanation:

Assume there is a variable , h already associated with a positive integer value. Write the code necessary to count the number of perfect squares whose value is less than h, starting with 1. (A perfect square is an integer like 9, 16, 25, 36 that is equal to the square of another integer (in this case 33, 44, 55, 66 respectively).) Assign the sum you compute to a variable q For example, if h is 19, you would assign 4 to q because there are perfect squares (starting with 1) that are less than h are: 1, 4, 9, 16.

Answers

There are different approaches to this problem and they are listed below:

Approach 1

>>> highest = 19 # in your case this is h

lst = list (n**2 for n in range(1, highest + 1))

lst

[1, 4, 9, 16]

>>> print '\n'.join(str(p) for p in lst)

1

4

9

16

Approach 2

h = int(input('insert positive integer: '))

i = 1

total = 0

while total <= h:

   total += i ** 2

   i += 1

print(total)

Approach 3

h = int(input())

n = int((h - 1) ** 0.5)

q = n * (n + 1) * (2*n + 1) // 6

print(q)

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

What is a disadvantage of a company having a widespread data capture strategy

Answers

Answer: it is illegal to generate data about a person

why photography came to be invented in the 1800s ?

Answers

Explanation:

Did you mean why it became invented well. Because photography allowed a glimpse of the past in new and utterly novel ways, it altered the perception of familiar places and things. Suddenly, one could move away from home but preserve a photograph of a birthplace, study the likeness of a dead relative, or see what a parent had looked like as a child.

Acme Parts runs a small factory and employs workers who are paid one of three hourly rates depending on their shift:

first shift, $17 per hour
second shift, $18.50 per hour
third shift, $22 per hour

Each factory worker might work any number of hours per week; any hours greater than 40 are paid at one and one-half times the usual rate. In addition, second and third shift workers can elect to participate in the retirement plan for which 3% of the worker’s gross pay is deducted from the paychecks.

Write the AcmePay program that prompts the user for hours worked, shift, and, if the shift is 2 or 3, whether the worker elects the retirement (1 for yes, 2 for no). Display:

Hours worked
Hourly pay rate
Regular pay
Overtime pay
Retirement deduction, if any
Net pay.

An example of the program is shown below:

Please enter shift - 1, 2, or 3
2
Please enter hours worked
9
Do you want to participate in the retirement plan?
Enter 1 for Yes and 2 for No.
1

Hours worked is 9.0
Hourly pay rate is 18.5
Regular pay is 166.5
Overtime pay is 0.0
Retirement deduction is 4.995
Net pay is....................161.505

Answers

import java.util.*;

public class AcmePay {

   public static void main(String[] args) throws Exception {

       double regularPay = 0, overPay = 0;

       double wage1 = 17, wage2 = 18.50, wage3 = 22, time = 0;

       double overworkMethod = 1.5, retirementDeduction = 0;

       Scanner input = new Scanner (System.in);

       System.out.println("Please enter shift - 1, 2, or 3");

       int shift = input.nextInt();

       System.out.println("Please enter hours worked");

       double hoursWorked = input.nextDouble();

       //regular pay

       if (shift == 1 && hoursWorked > 40){

           regularPay = (40 * wage1);

       }

       else if (shift == 2 && hoursWorked > 40){

           regularPay = (40 * wage2);

       }

       else if (shift == 3 && hoursWorked > 40){

           regularPay = (40 * wage3);

       }

       else if (shift == 1 && hoursWorked < 40){

           regularPay = wage1 * hoursWorked;

       }

       else if (shift == 2 && hoursWorked < 40){

           regularPay = wage2 * hoursWorked;

       }

       else if (shift == 2 && hoursWorked < 40){

           regularPay = wage2 * hoursWorked;

       }

       // OVER PAY

       if (hoursWorked > 40 && shift == 1){

           overPay = (hoursWorked - 40) * (wage1 * 1.5);

       }

       else if (hoursWorked > 40 && shift == 2) {

           overPay = (hoursWorked - 40) * (wage2 * 1.5);

       }

       else if (hoursWorked > 40 && shift == 3){

           overPay = (hoursWorked - 40) * (wage3 * 1.5);

       }

       else if (hoursWorked < 40 && (shift == 1 || shift == 2 || shift == 3)){

           overPay = 0.0;

       }

       //NET PAY

       double netPay = 0;

       if (shift == 1) {

           netPay = overPay + regularPay;

       }

       else if ((shift == 2 || shift == 3) && retirementDeduction == 0.0){

           netPay = overPay + regularPay;

       }

       else if ((shift == 2 || shift == 3) && retirementDeduction > 0.0){

           netPay = ((overPay + regularPay) - retirementDeduction);

       }

       //retirement deduction

       if (shift == 2 || shift == 3) {

           System.out.println("Do you want to participate in the retirement plan?\n  Enter 1 for Yes and 2 for No.");

           int chooseRetirement = input.nextInt();

           if (chooseRetirement == 1 && shift == 2) {

               retirementDeduction = (netPay * 0.03);

       }

           else if (chooseRetirement == 1 && shift == 3){

               retirementDeduction = (netPay * 0.03);

           }

       }

       System.out.println("Hours worked is    " + hoursWorked);

       if (shift == 1){

           System.out.println("Hourly pay rate is " +wage1);

       }

       else if (shift == 2){

           System.out.println("Hourly pay rate is " +wage2);

       }

       else {

           System.out.println("Hourly pay rate is " +wage3);

       }

       

       System.out.println("Regular pay is     " + regularPay);

       System.out.println("Overtime pay is    " + overPay);

       System.out.println("Retirement deduction is " + retirementDeduction);

       System.out.println("Net pay is...................." + (netPay - retirementDeduction));

   }

}

Explain the function of the Page Map Table in all of the memory allocation schemes described in this chapter that make use of it. Explain your answer by describing how the PMT is referenced by other pertinent tables in each scheme.

Answers

In all memory storage allocation schemes, the Page Map Tables keep track of a page's assignment to a page frame. The Page Map Tables, on the other hand, are referenced directly from the Job Table in the Paged and Demand Paged schemes.

What is Page Map Table?

A page table is the file format used by a virtual memory foundation in a PC operating system to store the routing between physical and virtual regions.

A page table is a critical component of a virtual memory system that stores the mapping between virtual and physical addresses.

The Page Map Tables are used in all memory storage allocation schemes to keep track of a page's assignment to a page frame.

In the Paged and Demand Paged schemes, the Page Map Tables are mentioned straightforwardly from the Job Table.

Thus, this is the function of the Page Map Table in all of the memory allocation schemes.

For more details regarding page table, visit:

https://brainly.com/question/25757919

#SPJ1

Princeton 3 Company has the following information for May: Cost of direct materials used in production $17,300 Direct labor 44,700 Factory overhead 28,800 Work in process inventory , May 1 72,100 Work in process inventory , May 31 76,400 Finished goods inventory , May 1 30,300 Finished goods inventory , May 31 34,600

Answers

In order to get total cost of goods manufactured we have to add all the figures. After that total cost of good manufactured is $158,760.

What are goods?

Goods are the objects or articles that are manufactured and produced in the factories of daily household works and these are meant for the purpose of use and several goods are very important for the humans.

There is huge amount of goods produced yearly by factories and after selling these provide proper growth and profit to GDP of the country. GDP stands for gross domestic products and this is the total income of the country.

Therefore, In order to get total cost of goods manufactured we have to add all the figures. After that total cost of good manufactured is $158,760.

Learn more about goods here:

https://brainly.com/question/15727371

#SPJ1

define spreadsheet in terms of its purpose ​

Answers

Answer:

A spreadsheet is a computer program that can capture, display and manipulate data arranged in rows and columns. Spreadsheets are one of the most popular tools available with personal computers. A spreadsheet is generally designed to hold numerical data and short text strings.

Answer:

A spreadsheet is a piece of software that can store, display, and edit data that has been organized into rows and columns.

Explanation:

Is Film is a rapid succession of still images played at a fast rate true or false

Answers

Answer:

True

Hope this helps with your question :)

HELP ME OUT PLEASE!!!!!!!!!

Question 3 (1 point)

Which is NOT a design principle?

O Contrast

O Alignment

O Balance

O Tint

----------------------------------------------------

Question 4 (1 point)

______ grants the creator of work exclusive rights for use and distribution.

O Intellectual Property

O Derivative Works

O Fair Use Doctrine

O Copyrighted

-------------------------------------------------------

Question 5 (1 point)

Intellectual Property is a work or invention that is a result of your intelligence or creativity and cannot be used without your permission.

O True

O False​

Answers

Answer:

Q3 = Contrast

Q4 = Copyright law

Q5 = True

I hope this helps!

• List 2 examples of media balance:

Answers

Answer: balance with other life activities

spending time with family

studying / school work

Explanation:

I NEED ASAP

Write a technical document (at least 500 words in length).

Identify the step-by-step instructions needed to operate a tool, design a system, or explain the bylaws of an organization.
Include all factors and variables that need to be considered.
Use headings, different fonts and other formatting techniques to aid in organization and comprehension.

PLEASE I CAN'T FIND SOMETHING THAT WILL MAKE 500 WORDS

Answers

Answer: The above question wants to analyze your writing skill, for that reason I can't write the document for you, but I will show you how to do it.

First, you will have to search for a tool that you want to present in your document. Also, you should research how this tool works.

A technical document needs to present a technical language, that is, you need to use professional words, in addition to maintaining a standard and formal language.

Steps to write the document:

Introduce the tool.

Show situations where it should be used.

Present a tutorial for the efficient use of the tool.

Be clear and objective, presenting direct information.

Explanation:

Determine the price elasticity of demand for a microwave that experienced a 20% drop in price and a 50% increase in weekly quantity demanded.

Answers

Based on the calculations, the price elasticity of demand for a microwave is equal to 2.5.

What is the price elasticity of demand?

The price elasticity of demand can be defined as a measure of the responsiveness of the quantity demanded by a consumer with respect to a specific change in price of the product, all things being equal (ceteris paribus).

Mathematically, the price elasticity of demand can be calculated by using the following formula;

Price elasticity of demand = (Q₂ - Q₁)/[(Q₂ + Q₁)/2]/(P₂ - P₁)/[(P₂ + P₁)/2]

Price elasticity of demand = Percentage change in quantity demanded)/(Percentage change in price)

Substituting the given parameters into the formula, we have;

Price elasticity of demand = 50/20

Price elasticity of demand = 2.5

In this context, we can reasonably infer and logically deduce that the price elasticity of demand for a microwave is equal to 2.5.

Read more on price elasticity here: https://brainly.com/question/24384825

#SPJ1

Which type of memory management system is feasible for mobile computing.

Answers

Built-in memory memory management systems are known to be feasible for mobile computing (RAM).

What exactly is mobile memory management?

Memory management is defined as the act of controlling and coordinating computer memory.

It is one that tends to share some components known as blocks with a large number of running programs in order to optimize the overall performance of the system.

To manage memory, the Android Runtime (ART) and Dalvik virtual machine employ paging and memory-mapping (mmapping).

Thus, as a result of the foregoing, the type of memory management system that is feasible for mobile computing is known to be built in memory (RAM).

For more details regarding memory management, visit:

https://brainly.com/question/27993984

#SPJ1

Bartering involves exchanging goods and services. But today,
can be exchanged for goods and services.

Answers

Explanation:

Yes, but is an old method of trade. Nowadays people prefer money to buy things more than barter trade

What are five of the B2C Business models? Explain what each model is with a detailed example to back up your explanation.

Answers

The five of the B2C Business models are:

Direct sellersOnline intermediariesAdvertising-basedCommunity-basedFee-based.

What is B2C model?

Business-to-consumer (B2C) is known to be a type of business model that is one where   products or services are said to be sold straight to consumers.

Direct sellers - sold directly to consumers. Online intermediaries - online salesAdvertising-based - making of adsCommunity-based - Sales to a specific CommunityFee-based - sales based on subscription

Therefore, The five of the B2C Business models are:

Direct sellersOnline intermediariesAdvertising-basedCommunity-basedFee-based.

Learn more about B2C Business models  from

https://brainly.com/question/13621652
#SPJ1

Homework:
Think of/ Research a developing technology, how do you think it will impact an organisation? Write no less or more than 200 words.

Level 2 BTEC First Certificate in Information and Creative Technology

Answers

Answer:

I think we can use that: How do you think the Lumiere brothers would react to today's cinema world? Do you think filmmakers have gotten more creative, or do they just have more technology to create with? What do you think the Lumiere brothers would be able to do with today's cinema technology?

And then...

Considering that they created "Arrival of a Train" in 1896, we can understand that the industry and the movie making process has changed a lot in 124 years. I think that if you bring them out of 1896, they will be shocked to see how people make movies these days.

I think that they would be shocked because:

a) the movies usually have a meaning and stand as some sort of political or emotional message. b) there is a lot of CGI that is used to make imaginary or non existent characters exist in a realistic way such as "groot" from the GOTG movies. c) people today use movies to get their own imaginations out in the world and it isn't just for the entertainment of the audience anymore. As sad as that may be, it's true that movies today are always made to prove something or bring up an issue by the people involved so it can be argued by everyone (basically some people make controversial movies just for clout and not 'cause they actually care about that particular issue" so this may not be digestible to the Lumiere Brothers since they actually loved doing what they did for personal reasons, if that makes sense.

I think that if the Lumiere brothers were still here then they would make movies to connect with the audience. More emotional than political. Something that amazes people who are foreign maybe or poor or rich or anything else.

Explanation: Not my answer (btw) I'm not taking credit just trying to help other people>3

f a student creates a five second animation with
two keyframes using 30 fps, how many tweens are used?

Answers

Answer:

Basing it on the information provided, a student that would want to make a short animation that is five seconds long, has two key frames and uses 30 frames per second (fps), he would be using 298 betweens. This is a key process in creating it.

Explanation:

While you can save files on OneDrive, you're unable to share them with
other people.
True
False

Answers

Answer:

I think it's false, hope this helps.

I need help writing this in python code:


If I need to travel more than 1000 miles, I'll fly
My flying speed will always average 550 miles per hour
If I need to travel at least 50 miles, but not far enough to fly, I'll drive
My driving speed will average 50 miles per hour
If I am travelling less than 50 miles, I'm going to hike. I'm on vacation!
My hiking speed is an average of 3 miles per hour

Answers

Question:

If you’re flying in a plane going 500 mph, how long would it take to travel one mile?

Explanation:

Travelling at 500mph, you'll be covering one mile in 7.2 seconds, doesn't seem so fast, right? Well, don't let a huge aircrafts size fool you, these amazing birds would leave the fastest car in the dust, at 500mph, by the time you covered one mile in 7.2 seconds, the Bugatti veyron, chiron which hits around 270mph would have covered maybe 0.5 - 0.6 miles or so, and there's another car which hit 305mph or so, the world's fastest car?! Even then, you would only cover around 0.6 - 0.7 miles

500mph = 223.52 meters per second/7.2 secs per mile

305mph = 136.34 meters per second/11.8 secs per mile

267mph = 119.35 meters per second/13.48 meters per mile

You see, there we have it! A 500mph bird is much faster than your sports car, so if anyone ever tell you that an aircraft is slow, just tell them that if 500mph is slow, than your Lamborghini or whatever you drive is a snail or is really slow.

GET THIS ANSWER FROM quora.com

Other Questions
A 120 V power supply is used to power a TV. If the TV draws 0.25 A of current and the TV is used for 1.20 h, how much energy, in kilojoules, is used? 5. An arithmetic sequence is defined by:a = -8an = an-1+4What is the 7th term of the sequence? an extension cord 20m long uses no. 12 gauge copper wire (cross section area 0.033 cm ^2 resistivity 1.710^-8 ohms - m Does (10, 9) make the inequality 10x + 13y > 10 true?yesno. Describe what you think the server engineer did next to provide the client another server If there is 6 A of current through the filament of a lamp, how many coulombs of charge move through the filament in 1.75 s? Top hedge fund manager Sally Buffit believes that a stock with the same market risk as the S&P 500 will sell at year-end at a price of $53. The stock will pay a dividend at year-end of $2.30. Assume that risk-free Treasury securities currently offer an interest rate of 2.3%. Identification of the mistake. of the nucleotides in the gene were changed as indicated in the mistake sequence, what type of mutation would this be? explain. _____ biometrics is related to the perception, thought processes, and understanding of the user. a coin is flipped 10 times with the following results: {T,T,H,T,T,T,H,T} where H is heads and T is tails. what is the experimental probability that the coin will be heads when it is flipped?a. 0.5b. 0.3c. 0.7d. 1.0 Consider the equation 2y-5x = 30. Determine the x-intercept.Enter your response in the boxes.2.-5r = 30_52 = 30- 30x = Need asap What is the product of 11/12 and 240/121 4. an ancient marathoner covered the first 20 miles of the race in 4 hours. can you determine how fast he was running when he passed the 10-mile marker? why is the brevity of the U.S. Constitution considered to be one of its greatest strengths? Distance between (0,0) to (2,5) Based on the underlined sentence on page 4,what can be inferred about Vivian?Vivian was excited to stand up to her parents forthe first time.Vivian's guilt about disobeying her family dimmedher enjoyment of her move.Vivian was ashamed of how harshly she treatedher family.Vivian's belief in her move was strong enough toovercome her usual reserve? What is the turning point of the graph of (x) = |x| +4 ? (0,4) (0, 4) (4,0) (-4, 0) Identify the property that justifies the statement. ~ BC and ABC ~ PQR, so XYZ ~ PQR. Adventure Travel has an Adjusted Trial Balance for Year Ended December 31, 20XX with the following account balances:DEBITS: Cash: 25,000; Accounts Receivable: 15,000; Office Supplies: 4,300; Office Equipment: 29,600CREDITS: Accumulated depreciation - office equipment: 5,000; Salaries Payable: 2,800; Long-term notes payable: 22,200; Common Stock: 20,000; Retained Earnings: 10,260DEBIT: Cash Dividends: 1,000CREDITS: Fees Earned: 75,000DEBITS: Salaries Expense: 32,800; Rent Expense: 16,800; Depreciation expense - office equipment: 3,960; Advertising expense: 4,000; Office supplies expense: 2,800.Total Debits = 135,260; Total Credits = 135,260You have prepared the financial statements for December 20XX. Now, it is time to make the closing entries.We will close the revenue accounts first: what dollar amount will I record for the debit and credit accounts? Specify as a whole number. The boy who harnessed the wind uncle John died from?