All in All

You have devised a new encryption technique which encodes a message by inserting between its characters randomly generated strings in a clever way. Because of pending patent issues we will not discuss in detail how the strings are generated and inserted into the original message. To validate your method, however, it is necessary to write a program that checks if the message is really encoded in the final string.

Given two strings s and t, you have to decide whether s is a subsequence of t, i.e. if you can remove characters from t such that the concatenation of the remaining characters is s.

 

Input Specification

The input contains several test cases. Each is specified by two strings s, t of alphanumeric ASCII characters separated by whitespace. Input is terminated by EOF.

 

Output Specification

For each test case output, if s is a subsequence of t.

 

Sample Input

Sequence subsequence
person compression
VERDI vivaVittorioEmanueleReDiItalia
caseDoesMatter CaseDoesMatter

 

Sample Output

Yes
No
Yes
No

 

using System;

using System.Collections.Generic;

using System.Linq;

using System.Text;

 

namespace ConsoleApplication1

{

    class Program

    {

        static void Main(string[] args)

        {

            string s = "VERDI";

            string t = "vivaVittorioEmanueleReDiItalia";

            int flag = 0;

            for (int i = 0, j = 0; i < s.Length; i++)

            {

                flag = 0;

                for (; j < t.Length; j++)

                {

                    if (s[i] == t[j])

                    {

                        j++;

                        flag = 1;

                        break;

                    }

                }

                if (flag == 0)

                {

                    Console.WriteLine("No");

                    break;

                }

            }

            if (flag == 1)

            {

                Console.WriteLine("Yes");

            }

        }

    }

}

Advertisements
This entry was posted in Information Technology. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s