博客
关于我
CSUOJ 1018 Avatar
阅读量:428 次
发布时间:2019-03-06

本文共 1477 字,大约阅读时间需要 4 分钟。

Description

In the planet Pandora, Jake found an old encryption algorithm. The plaintext, key and ciphertext are all four decimal numbers and all greater than 0. The way to get the ciphertext from the plaintext and the key is very simple: the ciphertext is the last four digits of the product of the plaintext and the key (for example: the plaintext is 2010 and the key is 4024, and then the product is 8088240. So the ciphertext is 8240).

Note that the plaintext and the key don’t have leading 0, while the ciphertext might have. Now given the plaintext and the key, you are asked to figure out the ciphertext for Jake quickly.

Input

The first line is an integer T, which presents the number of test cases. Then there are T lines, each line has two integers, the first integer is the plaintext and the second is the key.

Output

For each test case, output the ciphertext.

Sample Input

22010 40241234 1111

Sample Output

82400974

Hint


两数相乘,取模10000就可以了
#include<stdio.h>#include<string>#include<string.h>#include<algorithm>#include<iostream>typedef long long ll;using namespace std;ll x, y;int main(){	int t;	while (~scanf("%d", &t))	{		while (t--)		{			scanf("%lld%lld", &x, &y);			ll num = x*y;			num = num % 10000;			printf("%.4lld\n", num);		}	}	return 0;}/**********************************************************************	Problem: 1018	User: leo6033	Language: C++	Result: AC	Time:0 ms	Memory:2024 kb**********************************************************************/

转载地址:http://tzwuz.baihongyu.com/

你可能感兴趣的文章
netframework 4.0内置处理JSON对象
查看>>
Netgear WN604 downloadFile.php 信息泄露漏洞复现(CVE-2024-6646)
查看>>
Netgear wndr3700v2 路由器刷OpenWrt打造全能服务器(十一)备份
查看>>
netlink2.6.32内核实现源码
查看>>
netmiko 自动判断设备类型python_Python netmiko模块的使用
查看>>
NetMizer 日志管理系统 多处前台RCE漏洞复现
查看>>
NetMizer-日志管理系统 dologin.php SQL注入漏洞复现(XVE-2024-37672)
查看>>
Netpas:不一样的SD-WAN+ 保障网络通讯品质
查看>>
netron工具简单使用
查看>>
NetScaler MPX Gateway Configuration
查看>>