C How to Program (8th Edition)
8th Edition
ISBN: 9780133976892
Author: Paul J. Deitel, Harvey Deitel
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 11, Problem 11.19MD
Program Plan Intro
Program Plan:
- Include the required header files.
- Create an array phish to store the list of phishing words.
- Create an array points to store the point associated with each word.
- Declare array total points to store the total points associated with each word.
- Read file name from user.
- Use file pointer to open the file in read mode.
- Traverse through each word in file and compare it with the list of phishing words. It match is found increment the total points for that phishing word and move onto next word.
- Define a function outputResult to show the phishing word found and final phishing score of the document.
- Call this function in main.
Program description:
This program checks a random text file for phishing words and provides the phishing score for the document.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
In cryptography, salt is used to make passwords more difficult to decipher.
Hacktivism emphasises computer security.
Public-key cryptography's asymmetric encryption is clever. Cryptography uses public keys.
Chapter 11 Solutions
C How to Program (8th Edition)
Ch. 11 - Prob. 11.5ECh. 11 - Prob. 11.6ECh. 11 - (Creating Data for a File-Matching Program) Write...Ch. 11 - (File Matching) Exercise 11.3 asked the reader to...Ch. 11 - (Testing the File-Matching Exercises) Run the...Ch. 11 - Prob. 11.10ECh. 11 - (Write Statements to Accomplish a Task) Write...Ch. 11 - (Hardware Inventory) Youre the owner of a hardware...Ch. 11 - (Telephone-Number Word Generator) Standard...Ch. 11 - Prob. 11.14E
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- For many reasons, hashing passwords in files is preferable than encrypting them.arrow_forwardcryptography Encrypt the message MATH using the RSA system with prime numbers p = 43 and q = 59 and n = 5arrow_forwardkeylogging software runs undetected and stores every keystroke in a file later retrieval.true or falsearrow_forward
- Salt in cryptography protects passwords.arrow_forwardEmail scams often alert the recipient that their personal information has been stolen. Think about it, that's all.arrow_forwardCRYPTOGRAPHY Encrypt the message STOP using the RSA system with p = 43 and q = 59 and n = 13, translating each letter into integers and grouping together pairs of integersarrow_forward
- Many asymmetric encryption algorithms are used in public key cryptography.arrow_forwardq25- In cryptography we often use the term 'keyspace'. Briefly explain what this term means, and how it affects the effectiveness of cryptography.arrow_forwardComputer Science XOR encryption - Demonstrate how you would implement a one time pad to encrypt a message "APPLE".arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Enhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning