C How to Program (8th Edition)
C How to Program (8th Edition)
8th Edition
ISBN: 9780133976892
Author: Paul J. Deitel, Harvey Deitel
Publisher: PEARSON
bartleby

Concept explainers

Question
Book Icon
Chapter 11, Problem 11.19MD
Program Plan Intro

Program Plan:

  • Include the required header files.
  • Create an array phish to store the list of phishing words.
  • Create an array points to store the point associated with each word.
  • Declare array total points to store the total points associated with each word.
  • Read file name from user.
  • Use file pointer to open the file in read mode.
  • Traverse through each word in file and compare it with the list of phishing words. It match is found increment the total points for that phishing word and move onto next word.
  • Define a function outputResult to show the phishing word found and final phishing score of the document.
  • Call this function in main.

Program description:

This program checks a random text file for phishing words and provides the phishing score for the document.

Blurred answer
Students have asked these similar questions
In cryptography, salt is used to make passwords more difficult to decipher.
Hacktivism emphasises computer security.
Public-key cryptography's asymmetric encryption is clever. Cryptography uses public keys.
Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Recommended textbooks for you
Text book image
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning