Write a recursive function encode that takes two Strings as an input. The first String is the message
to be encoded and the second String is the key that will be used to encode the message. The function
should check if the key and message are of equal length. If they are not the function must return the
string “Key length mismatch!” Otherwise the function must get the ASCII value of each character in
the key string and check if it is divisible by 2 if it is then the respective character in the message will be
encoded by getting the ASCII value of that character and adding 5. If corresponding key character it is
not divisible by 2 then 3 is added instead. Can someone help please

Answers

Answer 1

Answer:

85

Explanation:

jdjdjdjfjfjcjjcjrtgtggtfg g hi i


Related Questions

Hi I got a new phone and my photos are taking so long to download, on Friday it was at 13000 what do I do it’s taking so long

Answers

Answer:

Try to use your mobile data but it might use up quite a bit. Also instead of downloading it transfer it to a laptop or a usb stick, or you can upload your photos to the cloud.

example of graphics packages​

Answers

Answer:

adobe photoshop, ms paint, corel draw..and more

Which of the following are benefits of designing a scalable system? Choose 3 options.

ability to maintain a high level of service for customers

system will never need to grow again

ability to respond to user volume issues more quickly

guaranteed system access for all users

users may never know that a site has experienced tremendous growth

Answers

Which of the following are benefits of designing a scalable system? Choose 3 options.

ability to maintain a high level of service for customers

system will never need to grow again

Ability to respond to user volume issues more quickly guaranteed system access for all users

users may never know that a site has experienced tremendous growth

The benefits of designing scalable system involves ability to  maintain high level of service for customers, respond quickly to user volume issues, and guaranteed access for all users. Thus, options A, C, and D are correct.

What is a scalable system?

A scalable system can be given as the system that has the ability to accommodate large amount of data. The capacity of the working of scalable system varies, for example the working of hardware with the increase in number of users.

The designing of scalable system forms multiple benefits, such as:

ability to maintain a high level of service for customersability to respond to user volume issues more quicklyguaranteed system access for all users

Thus, options A, C, and D are correct.

Learn more about scalable system, here:

https://brainly.com/question/24252482

#SPJ5

chọn lợn theo hướng lấy thịt

Answers


bạn muốn tôi làm điều đó như thế nào? Tôi sẽ giúp bạn nếu tôi có thể. Xin lỗi. Chúa phù hộ

Define the by_job function, which takes a database as an argument; it returns a dictionary (dict or defaultdict) associating a job name with an inner dictionary (dict or defaultdict) of all the people who can do that job: its keys are names, each associated with the skill level for that name. For example, if db is the database above, calling by_job(db) would return a dictionary whose contents were

Answers

Spelling error in your paragraph

code for apples and oranges codehs plz​

Answers

function start(){
var numApps = 20;
println("Number of Apples: " + numApps);

var numOra = 15;
println("Number of Oranges: " + numOra);

var numOrg = 0;
println("Number of Apples: " + numApps);

println("Number of Apples: " + numOra);
}

In this exercise, using the knowledge of computational language in python, we have that this code will be written as:

The code is in the attached image.

We can write the python  as:

function start(){

var numApps = 20;

println("Number of Apples: " + numApps);

var numOra = 15;

println("Number of Oranges: " + numOra);

var numOrg = 0;

println("Number of Apples: " + numApps);

println("Number of Apples: " + numOra);

}

See more about python at brainly.com/question/13437928

Problem: A manufacturing company has classified its executives into four levels for the benefits of certain perks. The levels and corresponding perks are shown below:
Perks
Level ------------------------------------------------------------------- Conveyance Entertainment
allowance allowance

1 1000 500
2 750 200
3 500 100
4 250 -

An executive’s gross salary includes basic pay, house rent allowance at 25% of basic pay and other perks. Income tax is withheld from the salary on a percentage basis as follows:

Gross salary Tax Rate

Gross<=2000 No tax deduction
2000< Gross<=4000 3%
4000 Gross>5000 8%

Write a program that will read an executive’s job number, level number, and basic pay and then compute the net salary after withholding income tax.
Problem Analysis:
Gross salary=basic pay+ house rent allowance +perks
Net salary=Gross salary- income tax

The computations of perks depends on the level, while the income tax depends on the gross salary.
The major steps are Read data, calculate perks, calculate gross salary, calculate income tax, compute net salary and print the results.

How tomake it Visual Basic in Visual studio?

Answers

Answer:

I think its 1 1000 500

The program that will read an executive’s job number, level number, and basic pay and then compute the net salary after withholding income tax is in explanation part.

What is computer programming?

Making a set of instructions that instruct a computer how to carry out a task is the process of programming. Computer programming languages like JavaScript, Python, and C++ can all be used for programming.

The program can be:

using namespace std;

float taxCalculate(float basicPay){

   float tax = 0.0

   if(basicPay <= 20000){

              tax = 0.0 ;

   }

   else if(basicPay <=35000){

       tax = 0.20 * basicPay ;

   }

   else if(basicPay <=65000){

       tax = 0.25 * basicPay ;

   }

   else if(basicPay > 65000){

       tax = 0.30 * basicPay ;

   }

   return tax ;

}

int main()

{

   string name ;

   int job_number, level_number;

   float basic_pay, house_rent ;

   cout << "Enter employee name: " ;

   getline(cin, name);

   cout << "Enter executive job number: " ;

   cin >> job_number ;

   cout << "Enter level number: ";

   cin >> level_number ;

   cout << "Enter basic pay: ";

   cin >> basic_pay ;

   cout << "Enter house rent: ";

   cin >> house_rent;

   float gross_salary = 0.0 ;

   switch(level_number){

       case 1:

           gross_salary = basic_pay + ((0.25 * basic_pay) + house_rent + 1000 + 500) - (basic_pay - (taxCalculate(basic_pay))) ;

           break;

       case 2:

           gross_salary = basic_pay + ((0.25 * basic_pay) + house_rent + 750 + 200) - (basic_pay - (taxCalculate(basic_pay))) ;

           break;

 

       case 3:

           gross_salary = basic_pay + ((0.25 * basic_pay) + house_rent + 500 + 100) - (basic_pay - (taxCalculate(basic_pay))) ;

           break;

       case 4:

           gross_salary = basic_pay + ((0.25 * basic_pay) + house_rent + 250) - (basic_pay - (taxCalculate(basic_pay))) ;

           break;

       // default case

       default:

           cout << "Invalid level number." << endl ;

   }

   cout << "The net/gross salary is " << gross_salary << endl ;

   return 0;

}

Step: 2

//function basic to calculate tax

float taxCalculate(float basicPay){

   float tax = 0.0 ;

   if(basicPay <= 20000){

       tax = 0.0 ;

   }

   else if(basicPay <=35000){

       tax = 0.20 * basicPay ;

   }

   else if(basicPay <=65000){

       tax = 0.25 * basicPay ;

   }

   else if(basicPay > 65000){

       tax = 0.30 * basicPay ;

   }

   return tax ;

Thus, above mentioned is the program for the given scenario.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ2

True or false?

A database system is typically much less complex then a file processing system containing a series of lists or even a spreadsheet, but it requires more memory for storage allocation

Answers

Answer:

true

Explanation:

sometimes you've just gotta roll with it. the final parts of the statement is what gives away the answer.

A database system is typically much less complex then a file processing system containing a series of lists or even a spreadsheet, but it requires more memory for storage allocation.

What is a  database system?

A database serves as an organized  structured information, which is needed in the computer system for management purpose.

Therefore, it it requires more memory for storage allocation.

compare with the  file processing system.

Learn more about database at:https://brainly.com/question/518894

#SPJ9

Problem Solving while not necessary for every situation, it is recommended to follow most if not all steps. O True O False​

Answers

Answer:

True

Explanation:

Problem Solving is really important.

You used a website to learn about the child-rearing practices in China. Your study is related most to which aspect
of life?
ethics
society
culture
economy

Answers

Studying child-rearing practices in China through a website can provide insights into various aspects of life, but it is most closely related to the aspect of culture.

Culture encompasses the beliefs, values, customs, and practices of a particular group of people, and child-rearing practices are an integral part of cultural norms and traditions.

Examining how children are raised in China allows us to understand the values and principles that shape their upbringing. This may include aspects such as the importance placed on filial piety, discipline and obedience, education, and the role of extended family in child-rearing. These practices are deeply rooted in Chinese cultural traditions, influenced by historical, social, and philosophical factors.

Understanding child-rearing practices in China also provides insights into societal dynamics. It reveals the expectations and socialization processes children undergo, the intergenerational relationships, and the roles of parents, grandparents, and other family members.

Furthermore, child-rearing practices can impact the broader society by shaping individuals' values, behaviors, and contributions as they grow into adulthood.

While child-rearing practices can have implications for ethics, society, and even the economy, the study primarily aligns with the aspect of culture due to its focus on understanding the values, customs, and traditions specific to child-rearing in China.

For more such questions on culture,click on

https://brainly.com/question/18770704

#SPJ8

What operating system are you using? On most computers, you can answer this question by right-clicking on the "My Computer" icon on the desktop and selecting Properties from the menu. The line under System: tells you the name of your operating system. Enter the name of your OS in the space provided

Answers

Answer

Chrome OS

Explanation:

i cant tell whether this is a question you c&p'd or if your genuinely asking people what os they're running

Paul is a baker who wants to improve his recipe for muffins because they turn out with a greasy flavor. What ingredient should he change?

Answers

Cereals or sugar one of these two.

urgent. I will mark you brainliest. explain why cyber warfare is a real threat.​

Answers

Answer: Cyber warfare is a real threat since being able to hack another computer especially a countries computer with lots of info in their weaknesses can lead to their downfall. Since they can even possibly if their skilled enough hack their entire data base system and leak it to the public and that wouldn't be good for them not in a single possible way. That's the reason it's dangerous not only that but also because they can access their servers; which can let them access anything online from the whole country including banking information military info which can let them know which area there gonna go to next equipment there gonna bring and where they're gonna launch missiles, bombs, even nukes if they decide to launch one. And being able to hijack the computer that launches the nukes can make the hacker launch the nuke to a different place or launch the nuke on the country trying to launch the nuke.

Explanation:

Answer:

Cyber warfare can present a multitude of threats towards a nation.

Explanation:

At the most basic level, cyber attacks can be used to support traditional warfare. For example, tampering with the operation of air defenses via cyber means in order to facilitate an air attack.

wdlwmddwwddwwdwdwdwwddwdw

Answers

Answer: hjhihjhjgjgjgjgjgjgjgjgjgjjgj

Answer:

wdlwmddwwddwwdwdwdwwddwdw

In which 3 cases would you use the "Add funds to this deposit" grid in a bank deposit?

Answers

What??, please submit the full question

Vanessa shot a picture and submitted it to a photography website. Her submission was rejected due to a lack of sharpness and irregular tone reproduction in the image. What are these issues collectively called? She took note of these issues and shot a better photograph. Her submission was accepted and developed into a digital image. What is the method of developing digital images from a photograph called? Issues such as lack of sharpness and irregular tone reproduction are collectively called . The method of developing digital images from a photograph is called

Answers

Answer:

I know the answer just search it up on brainly

Explanation: brainly ,ω,

Answer:

visual artifacts         digital graphics

Explanation:

i just took the test and got it right

what is the importance and used of proportion in graphic design?​

Answers

Answer:

Good proportion adds harmony, symmetry, or balance among the parts of a design. The effective use of proportion in design is often referred to as harmony, a relationship in which the various elements of the composition appear as if they belong together in size and distribution.

Explain that is internet and how it function​

Answers

The internet is a worldwide computer network that transmits a variety of data and media across interconnected devices. It works by using a packet routing network that follows Internet Protocol (IP) and Transport Control Protocol (TCP).

Source : HP TECH TAKES

Answer: The Internet is a network of networks. It works by using a technique called packet switching, and by relying on standardized networking protocols that all computers can interpret.

Have a nice day ahead :)

VAX is an example of a:​

Answers

Answer:

VAX architecture is an example of the CISC (Complex Instruction Set Computers) therefore there are large and complicated instruction sets used in the system. Memory: VAX architecture consists of 8- bit bytes memory

what type of network architecture incorporates hardware and software components ?

Answers

Network architecture is the design of a computer network. It is a framework for the specification of a network's physical components and their functional organization and configuration, its operational principles and procedures, as well as communication protocols used.

In telecommunication, the specification of a network architecture may also include a detailed description of products and services delivered via a communications network, as well as detailed rate and billing structures under which services are compensated.

The network architecture of the Internet is predominantly expressed by its use of the Internet protocol suite, rather than a specific model for interconnecting networks or nodes in the network, or the usage of specific types of hardware links.

How are you going to use computer in your career/field?

Answers

Answer:

Well, I am studying software engineering and ethical hacking, with the terms I mentioned it is very self explanatory how I use computers for those fields. In case it is still not self explanatory, we use computers to make software and websites accessing tools that can only be access using a computer and a working internet connection is required. Ethical hacking requires a computer to test the website or application security in order to do that we need a active internet connection in order to access the website itself.

Explanation:

i dont really know i am not really sure what i qill be in the future

In this exercise, we examine how pipelining affects the clock cycle time of the processor. Problems in this exercise assume that individual stages of the datapath have the following latencies:
IF ID EX MEM WB
250ps 350ps 150ps 300ps 200ps
Also, assume that instructions executed by the processor are broken down as follows:
alu beq sw sw
45% 20% 20% 15%
1. What is the clock cycle time in a pipelined and non-pipelined processor?
2. What is the total latency of an LW instruction in a pipelined and non-pipelined processor?
3. If we can split one stage of the pipelined datapath into two new stages, each with half the latency of the original stage, which stage would you split and what is the new clock cycle time of the processor?
4. Assuming there was are no stalls or hazards, what is the utilization of the data memory?
5. Assuming there are no stalls or hazards, what is the utilization of the write-register port of the "Registers" unit?
6. Instead of a single-cycle organization, we can use a multi-cycle organization where each instruction takes multiple cycles but one instruction finishes before another is fetched. In this organization, an instruction only goes through stages it actually needs (e.g., ST only takes 4 cycles because it does not need the WB stage). Compare clock cycle times and execution times with single-cycle, multi-cycle, and pipelined organization

Answers

The clock cycle time in a pipelined and non-pipelined processor will be 350ps and 1250ps respectively.

1. The clock cycle time in a pipelined processor will be the slowest instruction decode which is 350ps. The clock cycle time in a non-pipelined processor will be:

= 250 + 350 + 150 + 300 + 200

= 1250ps

2. The total latency of an LW instruction in a pipelined processor will be:

= 5 × 350 = 1750ps.

The total latency of an LW instruction in a non-pipelined processor will be:

= 250 + 350 + 150 + 300 + 200

= 1250ps

3. Based on the information asked, the stage to be split will be the cycle time. Now, the new cycle time will be based on the longest stage which will be 300ps.

4. It should be noted that the store and load instruction is used for the utilization of memory. The load instruction is 20% of the time while the store instruction is 15% of the time. Therefore, the utilization of data memory will be:

= 20% + 15% = 35%

5. The utilization of the write-register port of the "Registers" unit will be:

= 20% + 45% = 65%

6. The multi cycle execution time will be:

= (5 × 20%) + [4 × (45% + 20% + 15%)]

= (5 × 0.2) + (4 × 0.8)

= 1 + 3.2

= 4.2

The single cycle execution time will be:

= Cycle time non-pipeline / Cycle time pipeline

= 1250/350

= 3.5

Read related link on:

https://brainly.com/question/25231696

do you think that dealing with bigdata demand high ethical regulations,accountability,and responsibility of the person as well as the company? why?​

Answers

Yes, dealing with a lot of bigdata requires a lot of security and should be handled correctly. If not it will cause catastrophies that causes a lot of hacking issues which could lead to ruin the people in terms of financial and social life.

_________ is designed to support the most common workflows and tasks to close a client's monthly books. It consists of the following three workflow tabs:

Answers

Overview, Transaction review and Accountant reconciliation.

For a function with prototype
long decode2(long x, long y, long z);
GCC generates the following assembly code:

1. decode 2:
2. subq %rdx, %rsi
3. imulq %rsi, %rdi
4. movq %rsi, %rax
5. salq $63, %rax
6. sarq $63, %rax
7. xorq %rdi, %rax
8. ret

Parameters x, y, and z are passed in registers %rdi, %rsi, and %rdx. The code
stores the return value in register %rax.
Write C code for decode2 that will have an effect equivalent to the assembly
code shown.

Answers

Go through make sure you good with it

write the full forms of the following

a.) ASCC
b.)CDC
c.)HLCIT
d.)IT
e.)IBM
f.)GUI
g.)AI
h.)IC
i.)EDSAC
j.)NCC
k.)ABC​

Answers

Ia.) ASCC=Automatic sequence controlled calculator

b.)CDC=control data corporation

c.)HLCIT=high level commission for information technology

d.)IT=information technology

e.)IBM= international business machine

f.)GUI=graphic user interface

g.)AI=Artificial intelligence

h.)IC=integrated circuit

i.)EDSAC=Electronic delay storage automatic calculator

j.)NCC=national computer center

k.)ABC= Atanasoff berry computer

Martin plays video games for 9 hours a day. He spends 3 hours sitting on a dining chair playing games on his X-Box Series X, and 6 hours sitting on his bed playing games on his laptop. He has started to complain about excruciating pain in his back. What advice would you give him to reduce this pain, based on his daily gaming activities?​

Answers

Martin seems to play too much on his devices. Furthermore, it isn't shocking to hear his back hurts. I would advise him to cut the game time he exerts in a row. In other words, he needs to stop playing games for that long straight. He should not play for 9 hours straight.

The main reason Martin's back aches is because of the lack of movement and placing his back on a surface for an extended amount of time.

If he takes breaks between his 6-hour game time, he would have done other activities causing him to move around.

I would tell him to sit himself up, get pills, go to the doctor, get some kind of back brace, etc

Read a number, add 10% and output the result.

Answers

Let's use python

Program:-

[tex]\tt num=(int(input("Enter\:the\: number:")))[/tex]

[tex]\tt p=0.1*num[/tex]

[tex]\tt print("The\: result\:is",p)[/tex]

Sample output:-

Enter the number: 100

The result is 10

Pls answer 10 points ​

Answers

Answer:

1. C

5.b

Explanation:

1. Is c because it is in the short cut key

5. Is B because it is the last choice

1. C

5.b

Explanation:

1. Is c because it is in the short cut key

5. Is B because it is the last choice

Which of the following are parts of the physical layer?

pins
pointers
connectors
cables

Answers

Answer:pointers and connectors im pretty sure

Explanation:

my teacher said it was right

The following are parts of the physical layer:

ConnectorsCables



What is physical layer?
In computer networking, the physical layer is the first and lowest layer in the OSI (Open Systems Interconnection) model, which describes how data is transmitted over a network. The physical layer is responsible for transmitting raw bits over a communication channel, such as cables or wireless transmission, without any regard for the meaning or structure of those bits. It is concerned with the mechanical, electrical, and timing aspects of the physical transmission of data, including the physical characteristics of the transmission medium, such as voltage levels, signaling speed, modulation, and encoding.

The following options are parts of the physical layer in computer networks:

Connectors: These are physical interfaces that connect two devices or systems to enable communication. Examples include Ethernet ports, USB ports, and HDMI ports.

Cables: These are physical transmission media that carry signals between devices. Examples include copper cables, fiber optic cables, and coaxial cables.

"Pins" and "pointers" are not typically considered parts of the physical layer in computer networks. "Pins" is a term that can refer to the metal contacts in a connector or the protrusions on an integrated circuit. "Pointers" are variables in programming that store memory addresses, used to access data stored in memory.


To know more about memory visit:
https://brainly.com/question/29767256
#SPJ1

Other Questions
What are goblet cells and in what type of epithelial tissue are they most commonly found the anser is the second picture on moby max Can someone please help? :) Write your research question below.Remember, you can go back to take another look at your prompt. Translate the word in brackets with the correct form of ser or estar . She (is) happier now. Multiple choice!1es 2son 3esta 4estan Need help ASAP will mark brainliest Find the number described. What number is 16% of 70? 15 + ______ = 7 + 15 Commutative Property of Addition * Please can someone help with this question. I don't understand What inequality represents each verbal expression?a all real numbers x greater than 2b. 6 more than a number k is less than or equal to 12OA a. x 12O D. a.xs2b. k + 6 2 12 After my work in this chapter, I am ready to communicate about holidays and special events.To find out how Ana's party went last night, complete the following paragraph with the appropriate word from the list. OJO! You will have to conjugate some of the verbs.| reunirse | entremeses | celebrar | cumplir | disfraz | disfrazarse | invitados | llorar | mscara |Ayer Silvia _______ treinta aos y Ana le hizo una fiesta divertida. Haba mucha cerveza, vino y sodas. Tambin Ana prepar varios _____ y todos comieron un montn. Todos los _____ tuvieron que _____ de su personaje histrico favorito. Ana se puso una _____ de Mara Antonieta (Marie Antoinette) y su esposo, Jorge, se puso un _______ de Simn Bolvar. A las once de la noche, a la misma hora en que naci Silvia, todos _____ para ______el momento.Assessment questionContinue reading about Ana's party. Complete the paragraph with the appropriate word from the list. OJO! You will have to conjugate some of the verbs.| velas | brindis | pasarlo | pastel | anfitriona | gritar | recordar | felicidades | regalos |Hicieron un _____ y todos: __________!. Luego, empezaron a comer el _______ de cumpleaos. Esta vez no tena _____, porque Silvia no quera ______ cuntos aos cumpla. A la medianoche, Silvia abri sus ______. Su novio, Ral, le dio un iPod y Silvia empez a ______. La fiesta acab a las tres de la maana. Todos ______ muy bien y, antes de salir, todos le dieron las gracias a la ______, que haba preparado (had prepared) una fiesta tan buena. La celebracin fue un xito total! why is it more difficult to get out of debt when only paying the minimum payment? flow chart of orpheuse AND EURYDICE You are at your friends house when you find a six-pack of beer in the garage. Your friend suggests you take the beer and drink it at the park down the road. Which responses demonstrate good refusal strategies in this situation? Check all that apply.No, that doesnt sound good to me.How about we just drink one?Lets just play basketball at the park instead.I think I am just going to go home.All right, if you think its okay. Which sentence most clearly describes the structure of a story (Explain you answer)A. All of the problems the charcters stem from their immaturityB. Science Fiction elements fills a story thats mostly abot growing upC. Exposition is thin in the story; the audince has to do a lot of guessingD. The main conflict is between a hiker and the dangers of nature Helppppppp! In one paragraph describe how Beowulf influenced modern literature f(x)=x+2, g(x)=3x-5, find (f* g)(x) Please help me!!20points!! Slove 4x - c = k for x Need the following answers for Calcium bromide + potassium hydroxide A) Balanced chem equation B) TIE C) NIE