Mike and Jennifer, Previous chain getting too long (bounce long!), and none of us truncated - sorry!
Re Quiz Answers, Shhhh, tell no one... This is a classic encryption technique that’s weak and easy for cryptographers to break. Your students will never figure it out! It makes use of the obscure (and obtuse) XOR logic operator (^). Basically, it diddles ascii character binary bits in such a way that the encryption and decryption functions are one and the same. The encrypted data (see code below) is stored in globalAnswerHolder. While this is a string, don’t try to view it. It can contain many non-printable characters. The intKey argument is simply an integer encryption key - e.g. 100. Actually, it’s the integer’s binary equivalent that is the key. var globalAnswerHolder; function encryptAndDecrypt(strDataToProcess, intKey) { var strBuilder = ""; for(i=0;i < strDataToProcess.length;i++) { strBuilder += String.fromCharCode(intKey ^ strDataToProcess.charCodeAt(i)); } globalAnswerHolder = strBuilder; } Just pass globalAnswerHolder through the function again to decrypt. Of course your students could do this also, so obscure the function: var theBoyCouldPlay; function Ish(Mark, Knopfler) { var Kabbible = ""; for(i=0;i < Mark.length;i++) { Kabbible += String.fromCharCode(Knopfler ^ Mark.charCodeAt(i)); } theBoyCouldPlay = Kabbible; } Your students will be in Comedic Dire Straits (ouch)! Otis -- Otis Rothenberger o...@chemagic.org http://chemagic.org ------------------------------------------------------------------------------ What NetFlow Analyzer can do for you? Monitors network bandwidth and traffic patterns at an interface-level. Reveals which users, apps, and protocols are consuming the most bandwidth. Provides multi-vendor support for NetFlow, J-Flow, sFlow and other flows. Make informed decisions using capacity planning reports.http://sdm.link/zohodev2dev _______________________________________________ Jmol-users mailing list Jmol-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/jmol-users