Skip to content

Commit a1f80b4

Browse files
🤖 Auto-sync docs, metadata, and filepaths (#2433)
1 parent 9ddcbd5 commit a1f80b4

File tree

9 files changed

+69
-96
lines changed

9 files changed

+69
-96
lines changed

exercises/practice/dot-dsl/.docs/instructions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Write a Domain Specific Language similar to the Graphviz dot language.
2222
Our DSL is similar to the Graphviz dot language in that our DSL will be used to create graph data structures.
2323
However, unlike the DOT Language, our DSL will be an internal DSL for use only in our language.
2424

25-
More information about the difference between internal and external DSLs can be found [here][fowler-dsl].
25+
[Learn more about the difference between internal and external DSLs][fowler-dsl].
2626

2727
[dsl]: https://en.wikipedia.org/wiki/Domain-specific_language
2828
[dot-language]: https://en.wikipedia.org/wiki/DOT_(graph_description_language)

exercises/practice/flower-field/.meta/config.json

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,9 @@
1818
],
1919
"example": [
2020
".meta/Example.cs"
21+
],
22+
"invalidator": [
23+
"FlowerField.csproj"
2124
]
2225
},
2326
"blurb": "Mark all the flowers in a garden."

exercises/practice/intergalactic-transmission/.docs/instructions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ Your job is to help implement
77

88
A parity bit is simple way of detecting transmission errors.
99
The transmitters and receivers can only transmit and receive _exactly_ eight bits at a time (including the parity bit).
10-
The parity bit is set so that there is an _even_ number 1s in each transmission and is always the first bit from the right.
10+
The parity bit is set so that there is an _even_ number of 1 bits in each transmission, and the parity bit is always the first bit from the right.
1111
So if the receiver receives `11000001`, `01110101` or `01000000` (i.e. a transmission with an odd number of 1 bits), it knows there is an error.
1212

1313
However, messages are rarely this short, and need to be transmitted in a sequence when they are longer.
@@ -40,7 +40,7 @@ Their parity bits are set to 1 so that they have an even number of 1 bits in the
4040
They are transmitted as `01110001` and `00011011` (or `71` and `1B` in hex).
4141

4242
The last transmission (`1110`) has only four bits of data.
43-
Since exactly eight bits are transmitted at a time and the parity bit is the right most bit, three 0 bits and then the parity bit are added to make up eight bits.
43+
Since exactly eight bits are transmitted at a time and the parity bit is the rightmost bit, three 0 bits and then the parity bit are added to make up eight bits.
4444
It now looks like this (where `_` is the parity bit):
4545

4646
```text

exercises/practice/luhn/.docs/instructions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ If the sum is evenly divisible by 10, the original number is valid.
4141

4242
### Invalid Canadian SIN
4343

44-
The number to be checked is `066 123 468`.
44+
The number to be checked is `066 123 478`.
4545

4646
We start at the end of the number and double every second digit, beginning with the second digit from the right and moving left.
4747

Lines changed: 20 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -1,36 +1,17 @@
11
# Instructions
22

3-
Translate RNA sequences into proteins.
3+
Your job is to translate RNA sequences into proteins.
44

5-
RNA can be broken into three-nucleotide sequences called codons, and then translated to a protein like so:
5+
RNA strands are made up of three-nucleotide sequences called **codons**.
6+
Each codon translates to an **amino acid**.
7+
When joined together, those amino acids make a protein.
68

7-
RNA: `"AUGUUUUCU"` => translates to
8-
9-
Codons: `"AUG", "UUU", "UCU"`
10-
=> which become a protein with the following sequence =>
11-
12-
Protein: `"Methionine", "Phenylalanine", "Serine"`
13-
14-
There are 64 codons which in turn correspond to 20 amino acids; however, all of the codon sequences and resulting amino acids are not important in this exercise.
15-
If it works for one codon, the program should work for all of them.
16-
However, feel free to expand the list in the test suite to include them all.
17-
18-
There are also three terminating codons (also known as 'STOP' codons); if any of these codons are encountered (by the ribosome), all translation ends and the protein is terminated.
19-
20-
All subsequent codons after are ignored, like this:
21-
22-
RNA: `"AUGUUUUCUUAAAUG"` =>
23-
24-
Codons: `"AUG", "UUU", "UCU", "UAA", "AUG"` =>
25-
26-
Protein: `"Methionine", "Phenylalanine", "Serine"`
27-
28-
Note the stop codon `"UAA"` terminates the translation and the final methionine is not translated into the protein sequence.
29-
30-
Below are the codons and resulting amino acids needed for the exercise.
9+
In the real world, there are 64 codons, which in turn correspond to 20 amino acids.
10+
However, for this exercise, you’ll only use a few of the possible 64.
11+
They are listed below:
3112

3213
| Codon | Amino Acid |
33-
| :----------------- | :------------ |
14+
| ------------------ | ------------- |
3415
| AUG | Methionine |
3516
| UUU, UUC | Phenylalanine |
3617
| UUA, UUG | Leucine |
@@ -40,6 +21,18 @@ Below are the codons and resulting amino acids needed for the exercise.
4021
| UGG | Tryptophan |
4122
| UAA, UAG, UGA | STOP |
4223

24+
For example, the RNA string “AUGUUUUCU” has three codons: “AUG”, “UUU” and “UCU”.
25+
These map to Methionine, Phenylalanine, and Serine.
26+
27+
## “STOP” Codons
28+
29+
You’ll note from the table above that there are three **“STOP” codons**.
30+
If you encounter any of these codons, ignore the rest of the sequence — the protein is complete.
31+
32+
For example, “AUGUUUUCUUAAAUG” contains a STOP codon (“UAA”).
33+
Once we reach that point, we stop processing.
34+
We therefore only consider the part before it (i.e. “AUGUUUUCU”), not any further codons after it (i.e. “AUG”).
35+
4336
Learn more about [protein translation on Wikipedia][protein-translation].
4437

4538
[protein-translation]: https://en.wikipedia.org/wiki/Translation_(biology)

exercises/practice/relative-distance/.docs/instructions.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
# Instructions
22

33
Your task is to determine the degree of separation between two individuals in a family tree.
4+
This is similar to the pop culture idea that every Hollywood actor is [within six degrees of Kevin Bacon][six-bacons].
45

56
- You will be given an input, with all parent names and their children.
67
- Each name is unique, a child _can_ have one or two parents.
@@ -13,22 +14,21 @@ Your task is to determine the degree of separation between two individuals in a
1314
Given the following family tree:
1415

1516
```text
16-
┌──────────┐ ┌──────────┐ ┌───────────┐
17-
│ Helena │ │ Erdős │ │ Shusaku │
18-
└───┬───┬──┘ └─────┬────┘ └──────┬────┘
19-
┌───┘ └───────┐ └──────┬──────┘
20-
▼ ▼ ▼
21-
┌──────────┐ ┌────────┐ ┌──────────┐
22-
│ Isla │ │ Tariq │ │ Kevin │
23-
└────┬─────┘ └────┬───┘ └──────────┘
24-
▼ ▼
25-
┌─────────┐ ┌────────┐
17+
┌──────────┐ ┌──────────┐ ┌───────────┐
18+
│ Helena │ │ Erdős ├─────┤ Shusaku │
19+
└───┬───┬──┘ └─────┬────┘ └────┬──────┘
20+
┌───┘ └───────┐ └───────┬───────┘
21+
┌─────┴────┐ ┌────┴───┐ ┌─────┴────┐
22+
│ Isla ├─────┤ Tariq │ │ Kevin │
23+
└────┬─────┘ └────┬───┘ └──────────┘
24+
│ │
25+
┌────┴────┐ ┌────┴───┐
2626
│ Uma │ │ Morphy │
2727
└─────────┘ └────────┘
2828
```
2929

30-
The degree of separation between Tariq and Uma is 3 (Tariq → Helena → Isla → Uma).
31-
There's no known relationship between Isla and [Kevin][six-bacons], as there is no connection in the given data.
30+
The degree of separation between Tariq and Uma is 2 (Tariq → Isla → Uma).
31+
There's no known relationship between Isla and Kevin, as there is no connection in the given data.
3232
The degree of separation between Uma and Isla is 1.
3333

3434
~~~~exercism/note

exercises/practice/relative-distance/.meta/config.json

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,9 @@
1111
],
1212
"example": [
1313
".meta/Example.cs"
14+
],
15+
"invalidator": [
16+
"RelativeDistance.csproj"
1417
]
1518
},
1619
"blurb": "Given a family tree, calculate the degree of separation.",
Lines changed: 26 additions & 52 deletions
Original file line numberDiff line numberDiff line change
@@ -1,66 +1,40 @@
11
# Instructions
22

3-
Implement a simple shift cipher like Caesar and a more secure substitution cipher.
3+
Create an implementation of the [Vigenère cipher][wiki].
4+
The Vigenère cipher is a simple substitution cipher.
45

5-
## Step 1
6+
## Cipher terminology
67

7-
"If he had anything confidential to say, he wrote it in cipher, that is, by so changing the order of the letters of the alphabet, that not a word could be made out.
8-
If anyone wishes to decipher these, and get at their meaning, he must substitute the fourth letter of the alphabet, namely D, for A, and so with the others."
9-
—Suetonius, Life of Julius Caesar
8+
A cipher is an algorithm used to encrypt, or encode, a string.
9+
The unencrypted string is called the _plaintext_ and the encrypted string is called the _ciphertext_.
10+
Converting plaintext to ciphertext is called _encoding_ while the reverse is called _decoding_.
1011

11-
Ciphers are very straight-forward algorithms that allow us to render text less readable while still allowing easy deciphering.
12-
They are vulnerable to many forms of cryptanalysis, but Caesar was lucky that his enemies were not cryptanalysts.
12+
In a _substitution cipher_, each plaintext letter is replaced with a ciphertext letter which is computed with the help of a _key_.
13+
(Note, it is possible for replacement letter to be the same as the original letter.)
1314

14-
The Caesar cipher was used for some messages from Julius Caesar that were sent afield.
15-
Now Caesar knew that the cipher wasn't very good, but he had one ally in that respect: almost nobody could read well.
16-
So even being a couple letters off was sufficient so that people couldn't recognize the few words that they did know.
15+
## Encoding details
1716

18-
Your task is to create a simple shift cipher like the Caesar cipher.
19-
This image is a great example of the Caesar cipher:
17+
In this cipher, the key is a series of lowercase letters, such as `"abcd"`.
18+
Each letter of the plaintext is _shifted_ or _rotated_ by a distance based on a corresponding letter in the key.
19+
An `"a"` in the key means a shift of 0 (that is, no shift).
20+
A `"b"` in the key means a shift of 1.
21+
A `"c"` in the key means a shift of 2, and so on.
2022

21-
![Caesar cipher][img-caesar-cipher]
23+
The first letter of the plaintext uses the first letter of the key, the second letter of the plaintext uses the second letter of the key and so on.
24+
If you run out of letters in the key before you run out of letters in the plaintext, start over from the start of the key again.
2225

23-
For example:
26+
If the key only contains one letter, such as `"dddddd"`, then all letters of the plaintext are shifted by the same amount (three in this example), which would make this the same as a rotational cipher or shift cipher (sometimes called a Caesar cipher).
27+
For example, the plaintext `"iamapandabear"` would become `"ldpdsdqgdehdu"`.
2428

25-
Giving "iamapandabear" as input to the encode function returns the cipher "ldpdsdqgdehdu".
26-
Obscure enough to keep our message secret in transit.
29+
If the key only contains the letter `"a"` (one or more times), the shift distance is zero and the ciphertext is the same as the plaintext.
2730

28-
When "ldpdsdqgdehdu" is put into the decode function it would return the original "iamapandabear" letting your friend read your original message.
31+
Usually the key is more complicated than that, though!
32+
If the key is `"abcd"` then letters of the plaintext would be shifted by a distance of 0, 1, 2, and 3.
33+
If the plaintext is `"hello"`, we need 5 shifts so the key would wrap around, giving shift distances of 0, 1, 2, 3, and 0.
34+
Applying those shifts to the letters of `"hello"` we get `"hfnoo"`.
2935

30-
## Step 2
36+
## Random keys
3137

32-
Shift ciphers quickly cease to be useful when the opposition commander figures them out.
33-
So instead, let's try using a substitution cipher.
34-
Try amending the code to allow us to specify a key and use that for the shift distance.
38+
If no key is provided, generate a key which consists of at least 100 random lowercase letters from the Latin alphabet.
3539

36-
Here's an example:
37-
38-
Given the key "aaaaaaaaaaaaaaaaaa", encoding the string "iamapandabear"
39-
would return the original "iamapandabear".
40-
41-
Given the key "ddddddddddddddddd", encoding our string "iamapandabear"
42-
would return the obscured "ldpdsdqgdehdu"
43-
44-
In the example above, we've set a = 0 for the key value.
45-
So when the plaintext is added to the key, we end up with the same message coming out.
46-
So "aaaa" is not an ideal key.
47-
But if we set the key to "dddd", we would get the same thing as the Caesar cipher.
48-
49-
## Step 3
50-
51-
The weakest link in any cipher is the human being.
52-
Let's make your substitution cipher a little more fault tolerant by providing a source of randomness and ensuring that the key contains only lowercase letters.
53-
54-
If someone doesn't submit a key at all, generate a truly random key of at least 100 lowercase characters in length.
55-
56-
## Extensions
57-
58-
Shift ciphers work by making the text slightly odd, but are vulnerable to frequency analysis.
59-
Substitution ciphers help that, but are still very vulnerable when the key is short or if spaces are preserved.
60-
Later on you'll see one solution to this problem in the exercise "crypto-square".
61-
62-
If you want to go farther in this field, the questions begin to be about how we can exchange keys in a secure way.
63-
Take a look at [Diffie-Hellman on Wikipedia][dh] for one of the first implementations of this scheme.
64-
65-
[img-caesar-cipher]: https://upload.wikimedia.org/wikipedia/commons/thumb/4/4a/Caesar_cipher_left_shift_of_3.svg/320px-Caesar_cipher_left_shift_of_3.svg.png
66-
[dh]: https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange
40+
[wiki]: https://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher

exercises/practice/simple-cipher/.meta/config.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@
2525
"SimpleCipher.csproj"
2626
]
2727
},
28-
"blurb": "Implement a simple shift cipher like Caesar and a more secure substitution cipher.",
28+
"blurb": "Implement the Vigenère cipher, a simple substitution cipher.",
2929
"source": "Substitution Cipher at Wikipedia",
3030
"source_url": "https://en.wikipedia.org/wiki/Substitution_cipher"
3131
}

0 commit comments

Comments
 (0)