From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on ip-172-31-65-14.ec2.internal X-Spam-Level: * X-Spam-Status: No, score=1.6 required=3.0 tests=BAYES_40,FREEMAIL_FROM, SCC_BODY_URI_ONLY,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Received: by 2002:a0c:eecd:0:b0:4c6:d796:1b0f with SMTP id h13-20020a0ceecd000000b004c6d7961b0fmr59603450qvs.122.1670944526876; Tue, 13 Dec 2022 07:15:26 -0800 (PST) X-Received: by 2002:a05:620a:1524:b0:6ff:b61f:97f4 with SMTP id n4-20020a05620a152400b006ffb61f97f4mr114468qkk.309.1670944525761; Tue, 13 Dec 2022 07:15:25 -0800 (PST) Path: eternal-september.org!reader01.eternal-september.org!usenet.blueworldhosting.com!feed1.usenet.blueworldhosting.com!peer02.iad!feed-me.highwinds-media.com!news.highwinds-media.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail Newsgroups: comp.lang.ada Date: Tue, 13 Dec 2022 07:15:25 -0800 (PST) In-Reply-To: Injection-Info: google-groups.googlegroups.com; posting-host=154.124.188.240; posting-account=sDOQCQoAAABaKV_4TS_FSa68WN1mwjoe NNTP-Posting-Host: 154.124.188.240 References: User-Agent: G2/1.0 MIME-Version: 1.0 Message-ID: <266bba4d-a451-4558-b1b3-428f3c43b7e1n@googlegroups.com> Subject: Re: ADA program From: viviane ghada Injection-Date: Tue, 13 Dec 2022 15:15:26 +0000 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Received-Bytes: 2119 Xref: reader01.eternal-september.org comp.lang.ada:64705 List-Id: On Tuesday, December 13, 2022 at 2:24:59 PM UTC, Jeffrey R.Carter wrote: > On 2022-12-12 21:21, Dirrm wrote:=20 > > I need help on writing this code? any pointers on where to begin=20 > > " go through a set of .txt and use them to develop a pattern of appeara= nces of letters. You will need to make every lowercase letter into its uppe= rcase equivalent and count the letter appearances. Using your results, you = are to go through an encrypted file and try to decrypt it using letter subs= titution. Then decrypt the same encrypted file using the standard table. Yo= u also have access to the original text. Output should go to a .txt file" > First you need to know how to read a text file. Familiarity with the stan= dard=20 > library (http://www.ada-auth.org/standards/aarm12_w_tc1/html/AA-A.html) i= s helpful.=20 >=20 > --=20 > Jeff Carter=20 > "Measure before making 'efficiency' changes."=20 > Elements of Programming Style=20 > 202