ISTE Week Overnite Programming Contest 1 ISTE WEEKOVERNIGHT PROGRAMMING CONTEST RULES: 1) All questions carr y equal weight. 2) T eams found indulg ing in unethical acts su ch as sharing o f solutions or ideas will be disqualified. 3) Approaching the judges table is not allowe d, you ar e supposed to call an organizer to you. 4) Decisions of the judges are final and any team found arguing will be disqualified immediately. 5) Do not close the PC ^2 window. 6) G++/GCC is the C/C++ compiler to be used and the file should be cor rectly compiled in that. 7) If usin gJava, use the file name strictly as per the question. For question no 1, use q1.java(note small caps), for 2 q2.java and so on...... 8) Y ou are no t allowed to leave th e lab in between the conte st unless they wish to quit. 9) Girls are not supposed to leave the lab without informing the organizers, as they will have to be provided appropriate permissions. 10)Usage of books is allowed but no (soft copies /internet) is allowed. For the code: – Do not use conio.h – The so ln. sho uld be ex act as t he que stio n. Mino r discr epan cies will lead t o failu re. – Plea se use #includ e<io stream> a nd not #inclu de<i ostr eam.h> fo r C++ he ader s. C headers go as usual. – Do not use ff lush , ex it Scoring: – The team with maximum number of cor rect submissions win – In cas e of t ies, t he indiv idual submi ssion time o f all t he su bmiss ions will be a dded and then the team with the lesser time wins. Which means it does not mean that you submit the last question first, you win, but in case of a tie, the team having a lead early on may carry an advantage. – The scores will not be displayed instantaneousl y . It requires calculation time. The results will be displayed on the ISTE notice board on Wednesday, 20 th Feb. at 12:00PM. Y ou are allowed to carry bo oks in the finals.
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Victory seemed eminent, but the power of the ring could not be
undone.
I am certainly not talking of the ring in the Lord of TheRings. The Dark Dominators were great I should say intheir own sense. They had set up a ring of oblivion, thedeeper you go, the more you forget. Even the wirelessnetworks seemed to lose everything (As for the wired
circuits, they went out of fashion like a million years ago!). However theforces of Darkness seem to be operating in all their fervour, seeminglyimmune to this ring. Yet luck has its own strange way. A faithful informantshared a very important piece of information with the Light Warriors. The
enemy machines seem to be catching words through their iCode value, avalue based on the punctuations present in the message sent. So thatmeans, if we can remove all punctuations, the message will go through.
The Light forces have a set of codes which must be transmitted if they areto survive in this chaos. The spaces pass luckily, but aaaargghhhh, thefull-stops, the colons, the commas don’t go through. There may be manymore that may not cross through. As far as they know for sure, onlynumbers, spaces and letters will pass. We can’t risk any more, lest theenemy might intercept and decipher. So now you’ve gotta plug in a
program to do that for the Light Warriors. Time is slipping through yourfingers, and the enemy forces are growing...(The maximum length of the input code is 500 characters)Input Format:
<The number of testcases>
<A string to represent the code for testcase 1>
< A string to represent the code for testcase 2>
.< A string to represent the code for testcase n>
Output Format:
<A string to represent the send-able code for testcase 1.>
.
<A string to represent the send-able code for testcase n>
Sample Input:
“This is important!”!!. Encoded hereby: @JTHFKE**0933 $5 FFGHB