Examplify is an excellent way to secure your computer and prevent obvious cheating methods from being abused. Unfortunately, ExamSoft overlooked one very common cheating technique: the Universal Clipboard. This feature allows you to copy content from one device and paste it on another.
This assignment demonstrates the use of a key encoding algorithm and key decoding to reassemble text-based files. It also demonstrates the use of randomness and lists in programming. In this assignment, students write two separate programs to decrypt and decode a text-based file.
There are two basic methods for decrypting an example file. The first method is the Encrypt method, which will decrypt files encrypted by the current user account. It works with the cryptographic service provider that is installed on the computer, and uses the file encryption keys from the process calling the method. To use this method, your computer must be running Microsoft Windows NT or a later version of the operating system.
In Python, encryption and decryption can be accomplished with KMS keys. KMS keys are essentially keys that are used to encrypt and decrypt files. An encrypted file contains a master key and a set of data keys. To decrypt an encrypted file, you need to have both the master key and the data key. You can do this by using the Python cryptography package.