[BOJ 11473] Hash Code Hacker

View as PDF

Submit solution

Points: 3
Time limit: 2.0s
Memory limit: 256M

Problem type
Allowed languages
Assembly, Awk, C, C++, Java, Pascal, Perl, Python, Sed, Text

According to Java standard library documentation, the hash code of String is computed as</p>

s[0]31 ^ (n -1) + s[1]31 ^ (n -2) + ... + s[n -1]

Here s[i] is the i-th character of the string, n is the length of the string, and ^ indicates exponentiation. Computation uses signed 32-bit integers in two’s complement form.

Heather is going to hack the servers of Not Entirely Evil Recording Company (NEERC). To perform an attack she needs k distinct query strings that have equal hash codes. Unfortunately, NEERC servers accept query string containing lower- and uppercase English letters only.

Heather hired you to write a program that generates such query strings for her.

입력 형식

The single line of the input file contains integer k — the number of required query strings to generate (2 ≤ k ≤ 1000).

출력 형식

Output k lines. Each line should contain a single query string. Each query string should be non-empty and its length should not exceed 1000 characters. Query string should contain only lower- and uppercase English letters. All query strings should be distinct and should have equal hash codes.

예제 입력

4

예제 출력

edHs
mENAGeS
fEHs
edIT

Comments

There are no comments at the moment.