Question: all in c ECE 321 Introduction to Software Engineering Homework 3 DEADLINE: Monday April 9h 11:59 pm Exercise 1 - Word printing in box Write

 all in c ECE 321 Introduction to Software Engineering Homework 3

DEADLINE: Monday April 9h 11:59 pm Exercise 1 - Word printing in

box Write a program which will ask from the user to type

all in c

ECE 321 Introduction to Software Engineering Homework 3 DEADLINE: Monday April 9h 11:59 pm Exercise 1 - Word printing in box Write a program which will ask from the user to type a word and it will print the word in capital letters inside a box of . For example, the word Hello" should be displayed as: The program should be continuous (ask for a new word) and it should end only when the user types the word "exit" Note: In order to manipulate strings, you will need to use the already existing functions. Also you might need the toupper function. Exercise 2- Frequency of letters in text in C which reads a text from the keyboard and calculates (prints in percentage and Write a program in number) how many times each letter was typed. Capital and lower letters should be considered the same. Be as efficient as possible! Exercise 3 Encryption and decryption of a text A simple cryptography method is the following one (Vigenere cipher): . We take the text we want to enerypt and the key P. We suppose that P has length equal to n. . We assign to each letter, both for the text and the key, the corresponding number (a 1, b 2, c 3, d- 4, 26) Encoding: We take the first letter of the text and the first letter of the key and we add their number representations. Then we find which character corresponds to the sum and we replace er of the text. Then we take the second character of the text and the second the first charact character of the key and we do the same etc. If the sum is above 26, we sub 26 .Decoding: We take the first letter of the encoded text and the first letter of the key and we subtract their number representations. Then we find which character corresponds to the result and we replace the first character of the encoded text. Then we take the second character of the encoded text and the second character of the key etc. If the result is below 0, we add 26. . In any case, if the key ends, we start from the beginning

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!