Oliver Eyton-Williams ee1e8abd87
feat(curriculum): restore seed + solution to Chinese (#40683)
* feat(tools): add seed/solution restore script

* chore(curriculum): remove empty sections' markers

* chore(curriculum): add seed + solution to Chinese

* chore: remove old formatter

* fix: update getChallenges

parse translated challenges separately, without reference to the source

* chore(curriculum): add dashedName to English

* chore(curriculum): add dashedName to Chinese

* refactor: remove unused challenge property 'name'

* fix: relax dashedName requirement

* fix: stray tag

Remove stray `pre` tag from challenge file.

Signed-off-by: nhcarrigan <nhcarrigan@gmail.com>

Co-authored-by: nhcarrigan <nhcarrigan@gmail.com>
2021-01-12 19:31:00 -07:00

1.1 KiB
Raw Blame History

id, title, challengeType, videoUrl, dashedName
id title challengeType videoUrl dashedName
5900f3bb1000cf542c50fece 问题79密码派生 5 problem-79-passcode-derivation

--description--

用于在线银行业务的常见安全方法是向用户询问密码中的三个随机字符。例如如果密码是531278他们可能会要求输入第2第3和第5个字符;预期的回复是317。文本文件keylog.txt包含50次成功的登录尝试。鉴于总是按顺序询问三个字符分析该文件以确定未知长度的最短可能秘密密码。

--hints--

euler79()应该返回73162890。

assert.strictEqual(euler79(), 73162890);

--seed--

--seed-contents--

function passcodeDerivation(arr) {

  return true;
}

// Only change code above this line

const keylog = [
  319,680,180,690,129,620,762,689,762,318,368,710,720,710,629,168,160,689,716,731,736,729,316,729,729,710,769,290,719,680,318,389,162,289,162,718,729,319,790,680,890,362,319,760,316,729,380,319,728,716,
];

passcodeDerivation(keylog);

--solutions--

// solution required