SlideShare a Scribd company logo
Encryption Using File Streams
Part A
Complete the following questions:
Write C++ code to open a document with the name Hello.txt,
place the message “Hello, World!” in the document, and exit the
document. Re open the file you closed, and read the message
into a string variable. Exit out of the file.
When do you open the file as an ifstream, as an ofstream, or as
an fstream? Could you simply open all files as an fstream?
Why is the ifstream parameter of the read_data procedure in the
previous question a reference parameter and not a value
parameter?
What is the difference between a text file, and a binary file?
Part B
Random monoalphabet cipher.
The caeser cipher, which shifts all letters by a certain amount,
is easy to decipher. Try this, instead of numbers use letters.
Consider this, the word is FEATHER. Remove duplicate letters,
making FEATHR, and append the rest of the letters of the
alphabet in reverse order.
Now encrypt the letters as follows:
See exhibit A
Now, write a program that encrypts or decrypts a file using this
cipher.
For example,
crypt –d –kFEATHER encrypt.txt output.txt
decrypts a file using the keyword FEATHER. You must always
supply a keyword.
Submit a screenshot of the executed program and the code of
the program.
Encryption Using File StreamsPart AComplete the following questi.docx

More Related Content

Similar to Encryption Using File StreamsPart AComplete the following questi.docx

Satz1
Satz1Satz1
Satz1
rajeshmhvr
 
Bt0067 c programming and data structures2
Bt0067 c programming and data structures2Bt0067 c programming and data structures2
Bt0067 c programming and data structures2
Techglyphs
 
Lesson 03 python statement, indentation and comments
Lesson 03   python statement, indentation and commentsLesson 03   python statement, indentation and comments
Lesson 03 python statement, indentation and comments
Nilimesh Halder
 
Unit VI
Unit VI Unit VI
File handling3 (1).pdf uhgipughserigrfiogrehpiuhnfi;reuge
File handling3 (1).pdf uhgipughserigrfiogrehpiuhnfi;reugeFile handling3 (1).pdf uhgipughserigrfiogrehpiuhnfi;reuge
File handling3 (1).pdf uhgipughserigrfiogrehpiuhnfi;reuge
vsol7206
 
INSTRUCTIONS For this assignment you will be generating all code on y.pdf
 INSTRUCTIONS For this assignment you will be generating all code on y.pdf INSTRUCTIONS For this assignment you will be generating all code on y.pdf
INSTRUCTIONS For this assignment you will be generating all code on y.pdf
adayarboot
 
1
11
Clean Code Tutorial maXbox starter24
Clean Code Tutorial maXbox starter24Clean Code Tutorial maXbox starter24
Clean Code Tutorial maXbox starter24
Max Kleiner
 
Python file handlings
Python file handlingsPython file handlings
Python file handlings
22261A1201ABDULMUQTA
 
Python programming msc(cs)
Python programming msc(cs)Python programming msc(cs)
Python programming msc(cs)
KALAISELVI P
 
Python
PythonPython
M02 un04 p03
M02 un04 p03M02 un04 p03
M02 un04 p03
Intan Jameel
 
7 Data File Handling
7 Data File Handling7 Data File Handling
7 Data File Handling
Praveen M Jigajinni
 
Bioinformatica 27-10-2011-p4-files
Bioinformatica 27-10-2011-p4-filesBioinformatica 27-10-2011-p4-files
Bioinformatica 27-10-2011-p4-files
Prof. Wim Van Criekinge
 
Chapter10
Chapter10Chapter10
Chapter10
vishalw24
 
Data export in matlab alvian zainuddin
Data export in matlab alvian zainuddinData export in matlab alvian zainuddin
Data export in matlab alvian zainuddin
Alvianzainuddin
 
Perly Parallel Processing of Fixed Width Data Records
Perly Parallel Processing of Fixed Width Data RecordsPerly Parallel Processing of Fixed Width Data Records
Perly Parallel Processing of Fixed Width Data Records
Workhorse Computing
 
1. introduction to computer
1. introduction to computer1. introduction to computer
1. introduction to computer
Shankar Gangaju
 
Python Tutorial
Python TutorialPython Tutorial
Python Tutorial
AkramWaseem
 
Python tutorial
Python tutorialPython tutorial
Python tutorial
Dominik KAszubowski
 

Similar to Encryption Using File StreamsPart AComplete the following questi.docx (20)

Satz1
Satz1Satz1
Satz1
 
Bt0067 c programming and data structures2
Bt0067 c programming and data structures2Bt0067 c programming and data structures2
Bt0067 c programming and data structures2
 
Lesson 03 python statement, indentation and comments
Lesson 03   python statement, indentation and commentsLesson 03   python statement, indentation and comments
Lesson 03 python statement, indentation and comments
 
Unit VI
Unit VI Unit VI
Unit VI
 
File handling3 (1).pdf uhgipughserigrfiogrehpiuhnfi;reuge
File handling3 (1).pdf uhgipughserigrfiogrehpiuhnfi;reugeFile handling3 (1).pdf uhgipughserigrfiogrehpiuhnfi;reuge
File handling3 (1).pdf uhgipughserigrfiogrehpiuhnfi;reuge
 
INSTRUCTIONS For this assignment you will be generating all code on y.pdf
 INSTRUCTIONS For this assignment you will be generating all code on y.pdf INSTRUCTIONS For this assignment you will be generating all code on y.pdf
INSTRUCTIONS For this assignment you will be generating all code on y.pdf
 
1
11
1
 
Clean Code Tutorial maXbox starter24
Clean Code Tutorial maXbox starter24Clean Code Tutorial maXbox starter24
Clean Code Tutorial maXbox starter24
 
Python file handlings
Python file handlingsPython file handlings
Python file handlings
 
Python programming msc(cs)
Python programming msc(cs)Python programming msc(cs)
Python programming msc(cs)
 
Python
PythonPython
Python
 
M02 un04 p03
M02 un04 p03M02 un04 p03
M02 un04 p03
 
7 Data File Handling
7 Data File Handling7 Data File Handling
7 Data File Handling
 
Bioinformatica 27-10-2011-p4-files
Bioinformatica 27-10-2011-p4-filesBioinformatica 27-10-2011-p4-files
Bioinformatica 27-10-2011-p4-files
 
Chapter10
Chapter10Chapter10
Chapter10
 
Data export in matlab alvian zainuddin
Data export in matlab alvian zainuddinData export in matlab alvian zainuddin
Data export in matlab alvian zainuddin
 
Perly Parallel Processing of Fixed Width Data Records
Perly Parallel Processing of Fixed Width Data RecordsPerly Parallel Processing of Fixed Width Data Records
Perly Parallel Processing of Fixed Width Data Records
 
1. introduction to computer
1. introduction to computer1. introduction to computer
1. introduction to computer
 
Python Tutorial
Python TutorialPython Tutorial
Python Tutorial
 
Python tutorial
Python tutorialPython tutorial
Python tutorial
 

More from elishaoatway

PROBLEM IDENTIFICATION AND RECOMMENDATIONS FOR SFK ORGANIZATION .docx
PROBLEM IDENTIFICATION AND RECOMMENDATIONS FOR SFK ORGANIZATION .docxPROBLEM IDENTIFICATION AND RECOMMENDATIONS FOR SFK ORGANIZATION .docx
PROBLEM IDENTIFICATION AND RECOMMENDATIONS FOR SFK ORGANIZATION .docx
elishaoatway
 
Problem Set #2 SCOR470 Fall 2015 Topics Soil water pote.docx
Problem Set #2 SCOR470 Fall 2015 Topics Soil water pote.docxProblem Set #2 SCOR470 Fall 2015 Topics Soil water pote.docx
Problem Set #2 SCOR470 Fall 2015 Topics Soil water pote.docx
elishaoatway
 
Problem descriptionThe Jim Thornton Coffee House chain is .docx
Problem descriptionThe Jim Thornton Coffee House chain is .docxProblem descriptionThe Jim Thornton Coffee House chain is .docx
Problem descriptionThe Jim Thornton Coffee House chain is .docx
elishaoatway
 
Problem 5The probability distributions for inter-arrival a.docx
Problem 5The probability distributions for inter-arrival a.docxProblem 5The probability distributions for inter-arrival a.docx
Problem 5The probability distributions for inter-arrival a.docx
elishaoatway
 
Problem 4-6 Calculating Internal Growth [LO3]The most recent fin.docx
Problem 4-6 Calculating Internal Growth [LO3]The most recent fin.docxProblem 4-6 Calculating Internal Growth [LO3]The most recent fin.docx
Problem 4-6 Calculating Internal Growth [LO3]The most recent fin.docx
elishaoatway
 
PROBLEM 8-18a. Fill in the worksheet with the appropriate value.docx
PROBLEM 8-18a. Fill in the worksheet with the appropriate value.docxPROBLEM 8-18a. Fill in the worksheet with the appropriate value.docx
PROBLEM 8-18a. Fill in the worksheet with the appropriate value.docx
elishaoatway
 
PROBLEM 5-5BPrepare a correct detailed multiple-step income st.docx
PROBLEM 5-5BPrepare a correct detailed multiple-step income st.docxPROBLEM 5-5BPrepare a correct detailed multiple-step income st.docx
PROBLEM 5-5BPrepare a correct detailed multiple-step income st.docx
elishaoatway
 
Problem BackgroundYour project consists of six activities show.docx
Problem BackgroundYour project consists of six activities show.docxProblem BackgroundYour project consists of six activities show.docx
Problem BackgroundYour project consists of six activities show.docx
elishaoatway
 
Problem 8-2B(a) Journalize the transactions, including explanati.docx
Problem 8-2B(a) Journalize the transactions, including explanati.docxProblem 8-2B(a) Journalize the transactions, including explanati.docx
Problem 8-2B(a) Journalize the transactions, including explanati.docx
elishaoatway
 
Problem B Regulatory Compliance 1 No.docx
Problem B Regulatory Compliance     1  No.docxProblem B Regulatory Compliance     1  No.docx
Problem B Regulatory Compliance 1 No.docx
elishaoatway
 
PROBLEM 3-22EventProduct CostsPeriod Costsa.b..docx
PROBLEM 3-22EventProduct CostsPeriod Costsa.b..docxPROBLEM 3-22EventProduct CostsPeriod Costsa.b..docx
PROBLEM 3-22EventProduct CostsPeriod Costsa.b..docx
elishaoatway
 
Problem 3 15 pointsThe following items were taken from the po.docx
Problem 3 15 pointsThe following items were taken from the po.docxProblem 3 15 pointsThe following items were taken from the po.docx
Problem 3 15 pointsThe following items were taken from the po.docx
elishaoatway
 
Problem 3-1A Identifying adjusting entries with explanations LO C3.docx
Problem 3-1A Identifying adjusting entries with explanations LO C3.docxProblem 3-1A Identifying adjusting entries with explanations LO C3.docx
Problem 3-1A Identifying adjusting entries with explanations LO C3.docx
elishaoatway
 
Essay 21) Describe the opportunities and challenges posed by the d.docx
Essay 21) Describe the opportunities and challenges posed by the d.docxEssay 21) Describe the opportunities and challenges posed by the d.docx
Essay 21) Describe the opportunities and challenges posed by the d.docx
elishaoatway
 
Essay 11) Evaluate the Articles of Confederation as a guide for su.docx
Essay 11) Evaluate the Articles of Confederation as a guide for su.docxEssay 11) Evaluate the Articles of Confederation as a guide for su.docx
Essay 11) Evaluate the Articles of Confederation as a guide for su.docx
elishaoatway
 
Essay (1) QuestionWhat is the so-called Machine Age How was it .docx
Essay (1) QuestionWhat is the so-called Machine Age How was it .docxEssay (1) QuestionWhat is the so-called Machine Age How was it .docx
Essay (1) QuestionWhat is the so-called Machine Age How was it .docx
elishaoatway
 
Essay #2 addresses some topic in the broad scope of Transcendentalis.docx
Essay #2 addresses some topic in the broad scope of Transcendentalis.docxEssay #2 addresses some topic in the broad scope of Transcendentalis.docx
Essay #2 addresses some topic in the broad scope of Transcendentalis.docx
elishaoatway
 
Essay # 2 The Tempest Prompt4-5 pages (MLA format)Char.docx
Essay # 2 The Tempest Prompt4-5 pages (MLA format)Char.docxEssay # 2 The Tempest Prompt4-5 pages (MLA format)Char.docx
Essay # 2 The Tempest Prompt4-5 pages (MLA format)Char.docx
elishaoatway
 
Es la actividad que hacemos con pecesEs un animal blanco y negro q.docx
Es la actividad que hacemos con pecesEs un animal blanco y negro q.docxEs la actividad que hacemos con pecesEs un animal blanco y negro q.docx
Es la actividad que hacemos con pecesEs un animal blanco y negro q.docx
elishaoatway
 
Erving Goffman is one of the most important sociological thinkers in.docx
Erving Goffman is one of the most important sociological thinkers in.docxErving Goffman is one of the most important sociological thinkers in.docx
Erving Goffman is one of the most important sociological thinkers in.docx
elishaoatway
 

More from elishaoatway (20)

PROBLEM IDENTIFICATION AND RECOMMENDATIONS FOR SFK ORGANIZATION .docx
PROBLEM IDENTIFICATION AND RECOMMENDATIONS FOR SFK ORGANIZATION .docxPROBLEM IDENTIFICATION AND RECOMMENDATIONS FOR SFK ORGANIZATION .docx
PROBLEM IDENTIFICATION AND RECOMMENDATIONS FOR SFK ORGANIZATION .docx
 
Problem Set #2 SCOR470 Fall 2015 Topics Soil water pote.docx
Problem Set #2 SCOR470 Fall 2015 Topics Soil water pote.docxProblem Set #2 SCOR470 Fall 2015 Topics Soil water pote.docx
Problem Set #2 SCOR470 Fall 2015 Topics Soil water pote.docx
 
Problem descriptionThe Jim Thornton Coffee House chain is .docx
Problem descriptionThe Jim Thornton Coffee House chain is .docxProblem descriptionThe Jim Thornton Coffee House chain is .docx
Problem descriptionThe Jim Thornton Coffee House chain is .docx
 
Problem 5The probability distributions for inter-arrival a.docx
Problem 5The probability distributions for inter-arrival a.docxProblem 5The probability distributions for inter-arrival a.docx
Problem 5The probability distributions for inter-arrival a.docx
 
Problem 4-6 Calculating Internal Growth [LO3]The most recent fin.docx
Problem 4-6 Calculating Internal Growth [LO3]The most recent fin.docxProblem 4-6 Calculating Internal Growth [LO3]The most recent fin.docx
Problem 4-6 Calculating Internal Growth [LO3]The most recent fin.docx
 
PROBLEM 8-18a. Fill in the worksheet with the appropriate value.docx
PROBLEM 8-18a. Fill in the worksheet with the appropriate value.docxPROBLEM 8-18a. Fill in the worksheet with the appropriate value.docx
PROBLEM 8-18a. Fill in the worksheet with the appropriate value.docx
 
PROBLEM 5-5BPrepare a correct detailed multiple-step income st.docx
PROBLEM 5-5BPrepare a correct detailed multiple-step income st.docxPROBLEM 5-5BPrepare a correct detailed multiple-step income st.docx
PROBLEM 5-5BPrepare a correct detailed multiple-step income st.docx
 
Problem BackgroundYour project consists of six activities show.docx
Problem BackgroundYour project consists of six activities show.docxProblem BackgroundYour project consists of six activities show.docx
Problem BackgroundYour project consists of six activities show.docx
 
Problem 8-2B(a) Journalize the transactions, including explanati.docx
Problem 8-2B(a) Journalize the transactions, including explanati.docxProblem 8-2B(a) Journalize the transactions, including explanati.docx
Problem 8-2B(a) Journalize the transactions, including explanati.docx
 
Problem B Regulatory Compliance 1 No.docx
Problem B Regulatory Compliance     1  No.docxProblem B Regulatory Compliance     1  No.docx
Problem B Regulatory Compliance 1 No.docx
 
PROBLEM 3-22EventProduct CostsPeriod Costsa.b..docx
PROBLEM 3-22EventProduct CostsPeriod Costsa.b..docxPROBLEM 3-22EventProduct CostsPeriod Costsa.b..docx
PROBLEM 3-22EventProduct CostsPeriod Costsa.b..docx
 
Problem 3 15 pointsThe following items were taken from the po.docx
Problem 3 15 pointsThe following items were taken from the po.docxProblem 3 15 pointsThe following items were taken from the po.docx
Problem 3 15 pointsThe following items were taken from the po.docx
 
Problem 3-1A Identifying adjusting entries with explanations LO C3.docx
Problem 3-1A Identifying adjusting entries with explanations LO C3.docxProblem 3-1A Identifying adjusting entries with explanations LO C3.docx
Problem 3-1A Identifying adjusting entries with explanations LO C3.docx
 
Essay 21) Describe the opportunities and challenges posed by the d.docx
Essay 21) Describe the opportunities and challenges posed by the d.docxEssay 21) Describe the opportunities and challenges posed by the d.docx
Essay 21) Describe the opportunities and challenges posed by the d.docx
 
Essay 11) Evaluate the Articles of Confederation as a guide for su.docx
Essay 11) Evaluate the Articles of Confederation as a guide for su.docxEssay 11) Evaluate the Articles of Confederation as a guide for su.docx
Essay 11) Evaluate the Articles of Confederation as a guide for su.docx
 
Essay (1) QuestionWhat is the so-called Machine Age How was it .docx
Essay (1) QuestionWhat is the so-called Machine Age How was it .docxEssay (1) QuestionWhat is the so-called Machine Age How was it .docx
Essay (1) QuestionWhat is the so-called Machine Age How was it .docx
 
Essay #2 addresses some topic in the broad scope of Transcendentalis.docx
Essay #2 addresses some topic in the broad scope of Transcendentalis.docxEssay #2 addresses some topic in the broad scope of Transcendentalis.docx
Essay #2 addresses some topic in the broad scope of Transcendentalis.docx
 
Essay # 2 The Tempest Prompt4-5 pages (MLA format)Char.docx
Essay # 2 The Tempest Prompt4-5 pages (MLA format)Char.docxEssay # 2 The Tempest Prompt4-5 pages (MLA format)Char.docx
Essay # 2 The Tempest Prompt4-5 pages (MLA format)Char.docx
 
Es la actividad que hacemos con pecesEs un animal blanco y negro q.docx
Es la actividad que hacemos con pecesEs un animal blanco y negro q.docxEs la actividad que hacemos con pecesEs un animal blanco y negro q.docx
Es la actividad que hacemos con pecesEs un animal blanco y negro q.docx
 
Erving Goffman is one of the most important sociological thinkers in.docx
Erving Goffman is one of the most important sociological thinkers in.docxErving Goffman is one of the most important sociological thinkers in.docx
Erving Goffman is one of the most important sociological thinkers in.docx
 

Recently uploaded

Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Diana Rendina
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 

Recently uploaded (20)

Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 

Encryption Using File StreamsPart AComplete the following questi.docx

  • 1. Encryption Using File Streams Part A Complete the following questions: Write C++ code to open a document with the name Hello.txt, place the message “Hello, World!” in the document, and exit the document. Re open the file you closed, and read the message into a string variable. Exit out of the file. When do you open the file as an ifstream, as an ofstream, or as an fstream? Could you simply open all files as an fstream? Why is the ifstream parameter of the read_data procedure in the previous question a reference parameter and not a value parameter? What is the difference between a text file, and a binary file? Part B Random monoalphabet cipher. The caeser cipher, which shifts all letters by a certain amount, is easy to decipher. Try this, instead of numbers use letters. Consider this, the word is FEATHER. Remove duplicate letters, making FEATHR, and append the rest of the letters of the alphabet in reverse order. Now encrypt the letters as follows: See exhibit A Now, write a program that encrypts or decrypts a file using this cipher. For example, crypt –d –kFEATHER encrypt.txt output.txt decrypts a file using the keyword FEATHER. You must always supply a keyword. Submit a screenshot of the executed program and the code of the program.