Problem specification: kynet became self-aware and Judgement Day happened, inevitably. The machines are narching against the human race wielding futuristic weapons. But the humans will not go gentle nto the good night and the fight for survival is fierce. While many humans meet the cold hard teel at the front line with plasma cannons, you work for the resistance as a specialist in cyber varfare. Skynet uses radio communication to transmit binary numbers and thus coordinate its roops on the ground. However, before transmitting the number, it is heavily encrypted. The inary number is first converted to an alphabetic string (for example, 110 is converted to neonezero) and then as an added layer of security, the letters in the string are rearranged (for xample, oneonezero is rearranged to nznooeeoer). Being a legendary hacker, your task is to atercept these messages and attempt to decipher them. Given an encrypted alphabetic string, ou want to calculate the number of possible binary values it can represent. For example, the tring nznooeeoer can represent a total of 3 binary values (011, 101 and 110). nput specification: he input is a string composed of the English lowercase letters: 'z', 'e', 'r', 'o' and 'n'. You can safely assume that it is possibi o rearrange the letters in such a way that they form a sequence of words, each word being either "zero" which correspond o the digit 0 or "one" which corresponds to the digit 1. The number of letters in the string will not exceed 90. Dutput specification: he output of your program is a single integer that represents the number of binary values that the input string can represen lote: You must not print anything extraneous (such as “Please enter string" or “the result is"). Sample input: Sample output: ozer 1 oneonezero

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question
100%
Problem specification:
Skynet became self-aware and Judgement Day happened, inevitably. The machines are
marching against the human race wielding futuristic weapons. But the humans will not go gentle
into the good night and the fight for survival is fierce. While many humans meet the cold hard
steel at the front line with plasma cannons, you work for the resistance as a specialist in cyber
warfare. Skynet uses radio communication to transmit binary numbers and thus coordinate its
troops on the ground. However, before transmitting the number, it is heavily encrypted. The
binary number is first converted to an alphabetic string (for example, 110 is converted to
oneonezero) and then as an added layer of security, the letters in the string are rearranged (for
example, oneonezero is rearranged to nznooeeoer). Being a legendary hacker, your task is to
intercept these messages and attempt to decipher them. Given an encrypted alphabetic string,
you want to calculate the number of possible binary values it can represent. For example, the
string nznooeeoer can represent a total of 3 binary values (011, 101 and 110).
Input specification:
The input is a string composed of the English lowercase letters: 'z', 'e', 'r', 'o' and 'n'. You can safely assume that it is possible
to rearrange the letters in such a way that they form a sequence of words, each word being either "zero" which corresponds
to the digit 0 or "one" which corresponds to the digit 1. The number of letters in the string will not exceed 90.
Output specification:
The output of your program is a single integer that represents the number of binary values that the input string can represent.
Note: You must not print anything extraneous (such as “Please enter string" or “the result is").
Sample input:
Sample output:
ozer
oneonezero
3
Transcribed Image Text:Problem specification: Skynet became self-aware and Judgement Day happened, inevitably. The machines are marching against the human race wielding futuristic weapons. But the humans will not go gentle into the good night and the fight for survival is fierce. While many humans meet the cold hard steel at the front line with plasma cannons, you work for the resistance as a specialist in cyber warfare. Skynet uses radio communication to transmit binary numbers and thus coordinate its troops on the ground. However, before transmitting the number, it is heavily encrypted. The binary number is first converted to an alphabetic string (for example, 110 is converted to oneonezero) and then as an added layer of security, the letters in the string are rearranged (for example, oneonezero is rearranged to nznooeeoer). Being a legendary hacker, your task is to intercept these messages and attempt to decipher them. Given an encrypted alphabetic string, you want to calculate the number of possible binary values it can represent. For example, the string nznooeeoer can represent a total of 3 binary values (011, 101 and 110). Input specification: The input is a string composed of the English lowercase letters: 'z', 'e', 'r', 'o' and 'n'. You can safely assume that it is possible to rearrange the letters in such a way that they form a sequence of words, each word being either "zero" which corresponds to the digit 0 or "one" which corresponds to the digit 1. The number of letters in the string will not exceed 90. Output specification: The output of your program is a single integer that represents the number of binary values that the input string can represent. Note: You must not print anything extraneous (such as “Please enter string" or “the result is"). Sample input: Sample output: ozer oneonezero 3
Expert Solution
steps

Step by step

Solved in 4 steps with 4 images

Blurred answer
Knowledge Booster
Types of Database Architectures
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education