Computer Networking: A Top-Down Approach (7th Edition)
Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN: 9780133594140
Author: James Kurose, Keith Ross
Publisher: PEARSON
Bartleby Related Questions Icon

Related questions

Question
subtracting 1 from it. Function main calls functions encrypt and decrypt and prints the
encrypted string.
// A simple encryption/decryption program
#include "stdafx.h"
#include <iostream>
using namespace std;
// write the prototype for function encrypt
// write the prototype function decrypt
int main()
{
// create a string to encrypt
char string[] = "this is a secret!";
cout « "Original string is : " « string « endl;
encrypt(string);
cout « "Encrypted string is : " « string <« endl;
decrypt(string);
cout « "Decrypted string is : " «string<< endl;
return 0;
}
// encrypt data
void encrypt(char e[])
{
// Write implementation for function encrypt
} // end function encrypt
// decrypt data
void decrypt(char *ePtr)
// Write implementation for function decrypt
} // end function decrypt
Sample output
E CAWINDOWSlsystem32\cmd.exe
Original string is : this is a secret!
Encrypted string is : uijt!jt!b!tfdsfu"
Decrypted string is : this is a secret!
Press any key to continue .
expand button
Transcribed Image Text:subtracting 1 from it. Function main calls functions encrypt and decrypt and prints the encrypted string. // A simple encryption/decryption program #include "stdafx.h" #include <iostream> using namespace std; // write the prototype for function encrypt // write the prototype function decrypt int main() { // create a string to encrypt char string[] = "this is a secret!"; cout « "Original string is : " « string « endl; encrypt(string); cout « "Encrypted string is : " « string <« endl; decrypt(string); cout « "Decrypted string is : " «string<< endl; return 0; } // encrypt data void encrypt(char e[]) { // Write implementation for function encrypt } // end function encrypt // decrypt data void decrypt(char *ePtr) // Write implementation for function decrypt } // end function decrypt Sample output E CAWINDOWSlsystem32\cmd.exe Original string is : this is a secret! Encrypted string is : uijt!jt!b!tfdsfu" Decrypted string is : this is a secret! Press any key to continue .
2. Write a simple encryption/decryption program. Function encrypt takes a character
pointer as a parameter and uses pointer-subscript notation to change the value in the
address pointed to by adding 1 to it. Function decrypt takes a character pointer as a
parameter and uses pointer notation to change the value in the address pointed to by
subtracting 1 from it. Function main calls functions encrypt and decrypt and prints the
encrypted string.
// A simple encryption/decryption program
#include "stdafx.h"
#include <iostream>
using namespace std;
// write the prototype for function encrypt
// write the prototype function decrypt
int main()
{
// create a string to encrypt
char string[] = "this is a secret!";
cout « "Original string is : " « string « endl;
encrypt(string);
cout « "Encrypted string is :
« string <« endl;
decrypt(string);
cout <« "Decrypted string is :
«string<< endl;
expand button
Transcribed Image Text:2. Write a simple encryption/decryption program. Function encrypt takes a character pointer as a parameter and uses pointer-subscript notation to change the value in the address pointed to by adding 1 to it. Function decrypt takes a character pointer as a parameter and uses pointer notation to change the value in the address pointed to by subtracting 1 from it. Function main calls functions encrypt and decrypt and prints the encrypted string. // A simple encryption/decryption program #include "stdafx.h" #include <iostream> using namespace std; // write the prototype for function encrypt // write the prototype function decrypt int main() { // create a string to encrypt char string[] = "this is a secret!"; cout « "Original string is : " « string « endl; encrypt(string); cout « "Encrypted string is : « string <« endl; decrypt(string); cout <« "Decrypted string is : «string<< endl;
Expert Solution
Check Mark
Knowledge Booster
Background pattern image
Similar questions
Recommended textbooks for you
Text book image
Computer Networking: A Top-Down Approach (7th Edi...
Computer Engineering
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:PEARSON
Text book image
Computer Organization and Design MIPS Edition, Fi...
Computer Engineering
ISBN:9780124077263
Author:David A. Patterson, John L. Hennessy
Publisher:Elsevier Science
Text book image
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:9781337569330
Author:Jill West, Tamara Dean, Jean Andrews
Publisher:Cengage Learning
Text book image
Concepts of Database Management
Computer Engineering
ISBN:9781337093422
Author:Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:Cengage Learning
Text book image
Prelude to Programming
Computer Engineering
ISBN:9780133750423
Author:VENIT, Stewart
Publisher:Pearson Education
Text book image
Sc Business Data Communications and Networking, T...
Computer Engineering
ISBN:9781119368830
Author:FITZGERALD
Publisher:WILEY