# 计蒜客 ACM-ICPC 2018 徐州赛区网络预赛 I. Characters with Hash

• 2018-09-10
• 11
• 0

## Description:

Mur loves hash algorithm, and he sometimes encrypt another one’s name, and call him with that encrypted value. For instance, he calls Kimura KMR, and calls Suzuki YJSNPI. One day he read a book about SHA-256 , which can transit a string into just 256 bits. Mur thought that is really cool, and he came up with a new algorithm to do the similar work. The algorithm works this way: first we choose a single letter L as the seed, and for the input(you can regard the input as a string s, s[i] represents the ith character in the string) we calculates the value(|(int) L – s[i]|), and write down the number(keeping leading zero. The length of each answer equals to 2 because the string only contains letters and numbers). Numbers writes from left to right, finally transfer all digits into a single integer(without leading zero(s)). For instance, if we choose ‘z’ as the seed, the string “oMl” becomes “11 45 14“.It’s easy to find out that the algorithm cannot transfer any input string into the same length. Though in despair, Mur still wants to know the length of the answer the algorithm produces. Due to the silliness of Mur, he can even not figure out this, so you are assigned with the work to calculate the answer.

## Input:

First line a integer T , the number of test cases (T \le 10).

For each test case:

First line contains a integer N and a character z, (N \le 1000000).

Second line contains a string with length N . Problem makes sure that all characters referred in the problem are only letters.

## Output:

A single number which gives the answer.

2
3 z
oMl
6 Y
YJSNPI

## Sample Output:

6
10

### 题目链接

1. 去掉前导0(包含第一个有效数字为一位数的第一个0)
2. 若拼凑的数为0则0是一位数