Переглянути джерело

README-en.md edited online with Bitbucket

Jose R Ortiz Ubarri 8 роки тому
джерело
коміт
fe6fac37b9
1 змінених файлів з 3 додано та 3 видалено
  1. 3
    3
      README-en.md

+ 3
- 3
README-en.md Переглянути файл

@@ -63,7 +63,7 @@ The Caesar Cypher is a substitution encryption technique that is said to have be
63 63
 
64 64
 ---
65 65
 
66
-###Using the modulo operator
66
+###Using the Modulo Operator
67 67
 
68 68
 Modular addition is essential for implementing ciphering systems in programming. In the Caesar Cypher application above we could think that every letter of the (English) alphabet is assigned a number between 0 and 25 (‘A’ is 0, ‘B’ is 1, .., ‘Z’ is 25). The Caesar Cypher transforms every letter we convert to its corresponding number in the range [0,25], then add the displacement. To do the cyclic displacement, every time our displacement gives us a letter that corresponds to a number greater than 25, we take the remainder of the number divided by 26 and use the letter that corresponds to the remainder. Note that taking the remainder by dividing the number by 26 gives us results that will be between 0 and 25, which are the values associated with the alphabet. 
69 69
 
@@ -90,7 +90,7 @@ Figure 3 shows the pseudocode of an algorithm for the Caesar cypher. Each letter
90 90
     3. return cypheredText 
91 91
 ```
92 92
 
93
-**Figure 3.** Pseudocode for a Caesar cypher algorithm.
93
+**Figure 3.** Pseudocode for a Caesar Cypher Algorithm.
94 94
 
95 95
 ---
96 96
 
@@ -173,7 +173,7 @@ We will also use the following functions:
173 173
 ---
174 174
 
175 175
 
176
-## Laboratory session:
176
+## Laboratory Session:
177 177
 
178 178
 You will be completing an application to cypher a message using the Vigenere technique. To simplify coding, the keyword and clear text must consist exclusively of letters. Furthermore, your program must change both the cleartext and keyword to uppercase before ciphering. 
179 179