InterviewSolution
Saved Bookmarks
| 1. |
A, B, C, ......... Z represent the numbers from 1, 2, 3,...... 26. There is an encryption technique which uses a key. Key can be any number less than 26 and greater than 0. For a message ABCD, if key is 1, encrypted message becomes BCDE. Similarly, if the key is 5, and message is XYZA, the encrypted message becomes CDEF. If you get an encrypted message from a friend as 'FCJN'. This was encrypted using key = 24. The original message is ___ . |
|
Answer» A, B, C, ......... Z represent the numbers from 1, 2, 3,...... 26. There is an encryption technique which uses a key. Key can be any number less than 26 and greater than 0. For a message ABCD, if key is 1, encrypted message becomes BCDE. Similarly, if the key is 5, and message is XYZA, the encrypted message becomes CDEF. If you get an encrypted message from a friend as 'FCJN'. This was encrypted using key = 24. The original message is |
|