menu
QAmmunity.org
Login
Register
My account
Edit my Profile
Private messages
My favorites
Ask a Question
Questions
Unanswered
Tags
Categories
Ask a Question
Write a recursive function encode that takes two Strings as an input. The first String is the message to be encoded and the second String is the key that will be used to encode the message. The function
asked
Jul 10, 2022
43.9k
views
3
votes
Write a recursive function encode that takes two Strings as an input. The first String is the message
to be encoded and the second String is the key that will be used to encode the message. The function
should check if the key and message are of equal length. If they are not the function must return the
string “Key length mismatch!” Otherwise the function must get the ASCII value of each character in
the key string and check if it is divisible by 2 if it is then the respective character in the message will be
encoded by getting the ASCII value of that character and adding 5. If corresponding key character it is
not divisible by 2 then 3 is added instead. Can someone help please
Computers and Technology
college
Mohitp
asked
by
Mohitp
8.7k
points
answer
comment
share this
share
0 Comments
Please
log in
or
register
to add a comment.
Please
log in
or
register
to answer this question.
1
Answer
2
votes
Answer:
85
Step-by-step explanation:
jdjdjdjfjfjcjjcjrtgtggtfg g hi i
Subbaraoc
answered
Jul 15, 2022
by
Subbaraoc
8.7k
points
ask related question
comment
share this
0 Comments
Please
log in
or
register
to add a comment.
← Prev Question
Next Question →
Related questions
asked
Nov 9, 2024
158k
views
To encode 70 different characters in binary form, what's the minimal number of total bits required? with your answer, when all 70 characters are encoded, how many more could be encoded if we want to maximize
Albert Lee
asked
Nov 9, 2024
by
Albert Lee
8.0k
points
Computers and Technology
high-school
1
answer
5
votes
158k
views
asked
Apr 2, 2024
278
views
Which two statements are true about Cisco UCS Manager, Cisco UCS Director, or Cisco Intersight APIs? (Choose two.) A. UCS Manager uses JSON to encode API interactions and utilizes Base64-encoded credentials
Williem
asked
Apr 2, 2024
by
Williem
8.5k
points
Computers and Technology
high-school
1
answer
0
votes
278
views
asked
Jul 10, 2024
131k
views
How does DNA (deoxyribonucleic acid) encode information? A. The DNA molecule is composed of many amino acids joined together to form a functional protein. B. Information is encoded in the different shapes
John Stritenberger
asked
Jul 10, 2024
by
John Stritenberger
7.9k
points
Biology
high-school
1
answer
0
votes
131k
views
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
9.5m
questions
12.2m
answers
Other Questions
“What does it mean when we “rework” copyrighted material?”
The book shows how to add and subtract binary and decimal numbers. However, other numbering systems are also very popular when dealing with computers. The octal (base 8) numbering system is one of these.
describe an advance in technology that makes life more enjoyable. what discoveries contribute to this technology?
Disadvantages of using animation in advertising? advantages and disadvantages of using animation for education? advantages and disadvantages of using animation in entertainment?
Explain why binary codes are used to represent characters, numbers and symbols :)
Twitter
WhatsApp
Facebook
Reddit
LinkedIn
Email
Link Copied!
Copy
Search QAmmunity.org